Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Implementing account and access management

One of the most important tasks with your identity and access management program is the management of accounts and the access they have. There is a whole life cycle process that relates to account and access management and may involve multiple teams to make the process a success. There's also a chance that multiple systems and tools are involved in the life cycle, including manual human processes that have room for error and increase vulnerability due to poor housekeeping. The account and access management life cycle is a complex process and has only become more challenging with the ongoing expansion of more apps, as well as the shift to the cloud. A typical account and access management program may involve resources from HR, the identity and security teams, technical operations teams, hiring managers, and potentially others.

To ensure success with your account and management program, it is critical that you have well-defined policies...