Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
Section 1: Getting Started
Section 2: Applying Security and Hardening
Section 3: Protecting, Detecting, and Responding for Windows Environments


In this chapter, we covered end user device management with a focus on the importance of security as it relates to end user device management. In short, you simply cannot efficiently and securely manage your end user devices without a well-rounded management solution to ensure and enforce compliance. We introduced the chapter with a brief overview of the evolution of device management and the shift from traditional management tools to where we are today. We then shifted our focus toward device imaging and Windows Autopilot by discussing in-place upgrades and migrations. That section then covered Windows Assessment and Deployment Kit, Windows Configuration Designer, Microsoft Deployment Toolkit (MDT), Windows Deployment Services (WDS), MDT and Configuration Manager, and finally, Windows Autopilot.

The next section covered Microsoft Endpoint Configuration Manager, which was formerly known as SCCM. Within that section, we reviewed how to securely deploy clients for configuration...