Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
Section 1: Getting Started
Section 2: Applying Security and Hardening
Section 3: Protecting, Detecting, and Responding for Windows Environments

Intune Mobile Device Management (MDM)

Microsoft Intune is an Azure-based device management solution that integrates with many Microsoft services and is a standard for Mobile Device Management (MDM) and Mobile Application Management (MAM). Intune can manage and secure not only Windows devices, but macOS, iPadOS, and mobile devices built on iOS and Android. It is a single solution to enforce your security baselines by applying device configuration profiles, device restrictions, security policies, application and protection policies, and many more depending on the platform in scope.

Intune can be integrated with Configuration Manager for co-management or you can choose to be 100% Intune. Using compliance policies, security teams can define rules and settings that must be properly configured on your devices in order to meet compliance requirements. In conjunction with conditional access, organizations can assess the risk of a device and choose actions based on this condition such as...