Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
Section 1: Getting Started
Section 2: Applying Security and Hardening
Section 3: Protecting, Detecting, and Responding for Windows Environments

Chapter 4: End User Device Management

The device management model has been static for many years within enterprises. Before the advancement of some of the currently utilized enterprise device management tools, companies were challenged with efficiently deploying a consistently configured device to their users.

Companies may have utilized out-of-the-box images with the layering of Group Policy or even scripts to pre-configure specific settings for users. For many, this evolved into standalone imaging tools that allowed the organization to capture a pre-configured image or baseline that could be pushed out to new devices as part of a deployment. Traditionally, these methods were extremely time-consuming and resource-intense on organizations but still serve a valuable purpose for securing and hardening your Windows systems. In this chapter, we're going to cover the tools used to build and deploy a secured hardened image. We will provide an overview of the latest deployment model...