Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Chapter 14: Top 10 Recommendations and the Future

You made it to the final chapter! We hope that, up to this point, you have been able to gain a much better understanding of not just the tools needed to protect your Windows operating systems, but of everything involved in an overall security program to ensure your users and devices are secure. The primary focus of this book has been on the cloud technology that is at your disposal today. We often hear of the challenges of keeping up to date with today's fast-growing technology and cloud environments. Hopefully, we have been able to provide you with the necessary knowledge to better understand the fundamentals of shifting to a cloud-managed environment and, more importantly, the security tools to support and maintain that transition.

In this chapter, we will provide an overview of what we believe to be the 10 most important topics that were covered in this book. We hope these top 10 recommendations will provide you with an actionable...