Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Device Imaging and Windows Autopilot

It is strongly recommended to update your Windows clients to the latest version of Windows 10 as soon as possible. Windows 10 is rich with security features, a great productivity tool for your users, and is optimized for modern management, including support for a bring your own device (BYOD) scenario. The BYOD trend promises to significantly reduce cost and resource overhead for the IT department. While this is an effective approach in some scenarios, it still raises challenges from both a security aspect and the support and operational perspectives. Depending on the application payload and the customization of your line of business apps, it may not be suitable to offer BYOD. Factors that may influence this decision include compliance requirements, the complexity of application configurations, and delivery such as bandwidth requirements for large application payloads.

From a security perspective, you will not have as fine-grained control of...