Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
Section 1: Getting Started
Section 2: Applying Security and Hardening
Section 3: Protecting, Detecting, and Responding for Windows Environments

The future of device security and management

As the technology we consume continues to evolve, and the access model continues to become more internet-centric, the better our security posture and defense must be. Not only does our security need to be better, but a complete shift needs to occur in the way security has been implemented in the past. Protecting our users within a traditional network is no longer the norm, as our users are far more dynamic today than they were in the past. With accessibility to the internet available from almost anywhere, we are being forced to change our security strategies from within the four walls of the office towards an anywhere at anytime access model. Not only are we challenged with users accessing data from corporate devices, but also from personally owned mobile devices in addition to a bring-your-own (BYO) laptop/tablet model. Ensuring that your corporate data is protected and is not exfiltrating from your environment requires many security tools...