Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
Section 1: Getting Started
Section 2: Applying Security and Hardening
Section 3: Protecting, Detecting, and Responding for Windows Environments

Chapter 11: Security Monitoring and Reporting

In this chapter, we will provide solutions for security monitoring and reporting within your environment. In previous chapters, we learned about what is needed to implement and enforce a secure environment for your users and Windows systems. Now that the baselines have been enforced and documented controls are in place, we need to ensure that monitoring and reporting programs are available to alert you of potential vulnerabilities or weaknesses within your environment. Next, we will review the different solutions used to capture telemetry and query data to provide insights and recommendations for keeping our environment secure.

First, we will review monitoring with Microsoft Defender Advanced Threat Protection (MDATP). Within this section, we will cover areas such as investigating an alert, as well as provide an overview of the different dashboards used to report on threats and the overall exposure of your environment. Next, we will...