Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Chapter 9: Keeping Your Windows Client Secure

In this chapter, you will learn about the best practices and techniques that are used to keep the Windows operating system (OS) secure. So far, we have covered many technologies that make up a robust and well-rounded security program. This includes administration and management tools, hardware security, network security, and an identity management program. This chapter, along with Chapter 10, Keeping Your Windows Server Secure, will cover the core of what this book is about, directly securing and hardening the OS that your users use.

Securing your Windows client is a critical task, and it is one that requires ongoing maintenance and operation in order to protect your devices as vulnerabilities continue to evolve and grow. In this chapter, we will cover how to keep your Windows devices up to date by deploying Windows Update for Business and securing your devices with advanced hardening configurations. Then, we will finish the chapter...