Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
Section 1: Getting Started
Section 2: Applying Security and Hardening
Section 3: Protecting, Detecting, and Responding for Windows Environments


In this chapter, we provided an overview of the 10 most important to-do's and takeaways from this book. In addition to the 10 most important to-do's, we covered some additional items to remind you of as you continue to harden and secure your Windows workstations and servers. Each of these items includes a reference back to the original chapter where you can review the material to gain more understanding.

We then provided an overview, using our personal insights, of the future of device security and management. Here, we covered a few essential areas that relate to device security along with a brief overview of IoT and the importance of security management as this space evolves. We finished the chapter with more personal insights on security and the future, especially as they relate to the ever-evolving innovation of new and futuristic technologies.

This chapter concludes the content of this book and Windows security and hardening. We hope you enjoyed the content...