Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Vulnerability scanning

In addition to auditing, which only validates controls, you need to ensure you have an on-going vulnerability scanning program. This will provide a lot of insight into your environment and will help to surface any vulnerabilities or weaknesses that exist. Let's take a look at what a vulnerability scan involves.

Preparing for a vulnerability scan

These scans or assessments look for, and identify, known vulnerabilities within your environment or systems. For example, a vulnerability scan may detect that a version and/or file that has been identified has a known vulnerability. Once a scan is complete, a report is generated that highlights any identified vulnerabilities and improvement actions. They are typically scheduled to run automatically. The following is a list of common types of vulnerability assessments that are used:

  • Network/wireless assessments
  • Web application assessments
  • Application assessments
  • Database assessments
  • Host...