Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Security and the future

In this section, we will provide some thoughts on the growth and future of security and the role it will play in a world that becomes more connected every day. Technology continues to evolve at a significant pace and, as this technology grows, we need to get ahead of security, not only within the enterprise but also within the consumer space. Devices, gadgets, household items, entertainment, automobiles, accessories, and drones are all examples of the types of internet-connected "things" we are able to consume today. Unfortunately, security has been an afterthought for a lot of these items as usability becomes the focus and exposes a significant gap. Hopefully, as we continue to evolve in this space, we will see the creation of a more universal standardization that can be followed with some form of certification showing whether a device meets the minimum-security specifications for both enterprise and consumer usage. A few standardized examples include...