Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
Section 1: Getting Started
Section 2: Applying Security and Hardening
Section 3: Protecting, Detecting, and Responding for Windows Environments

Windows 10 privacy

Windows 10 has many great features that provide an enhanced and connected experience for its users. As a result, there are many data- and privacy-related settings that are enabled by default that could pose a potential security risk for some organizations. While many of these features are great for consumer use, they may not be applicable to work organizations. Let's run through a few settings and look where to disable them if needed. To configure these privacy settings, we will leverage Intune device configuration profiles. All of the settings in the following table are available via a Windows 10, and later, platform using the Device Restrictions profile type.

This table is a compiled list of base recommendations:

Figure 9.43 – Recommended privacy settings in Intune

For a full list of settings that can be configured using Device Restriction profiles, including the preceding setting definitions, refer to