دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Mark Dunkerley, Matt Tumbarello سری: ISBN (شابک) : 9781839214288, 1839214287 ناشر: Packt Publishing Ltd سال نشر: 2020 تعداد صفحات: 573 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 27 مگابایت
در صورت تبدیل فایل کتاب Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تسلط بر امنیت و سختسازی ویندوز: محیط ویندوز خود را در برابر مزاحمان، حملات بدافزار و سایر تهدیدات سایبری ایمن و محافظت کنید. نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
امنیت ویندوز را افزایش دهید و از سیستمها و سرورهای خود در برابر حملات سایبری مختلف محافظت کنید ویژگیهای کلیدی محافظت از دستگاه خود با استفاده از رویکرد اعتماد صفر و تکنیکهای امنیتی پیشرفته اجرای اقدامات امنیتی کارآمد با استفاده از Microsoft Intune، Configuration Manager و راهحلهای Azure نحوه ایجاد دفاع در برابر تهدیدات سایبری را بدانید. راهکارهای موثر شرح کتاب آیا به دنبال راههای مؤثری برای محافظت از سیستمهای مبتنی بر ویندوز در برابر به خطر افتادن کاربران غیرمجاز هستید؟ تسلط بر امنیت و سختسازی ویندوز راهنمای دقیقی است که به شما کمک میکند هنگام اجرای اقدامات امنیتی کارآمد و ایجاد راهحلهای دفاعی قوی، تخصص کسب کنید. ما با مقدمهای بر اصول امنیتی ویندوز، پایهگذاری و اهمیت ایجاد خط پایه برای یک سازمان شروع میکنیم. با پیشرفت، یاد خواهید گرفت که چگونه سیستم مبتنی بر ویندوز خود را به طور موثر ایمن و سخت کنید، از هویت ها محافظت کنید و حتی دسترسی را مدیریت کنید. در فصل های پایانی، کتاب شما را از طریق آزمایش، نظارت و عملیات امنیتی راهنمایی می کند. علاوه بر این، شما به ابزارهای مورد نیاز برای اطمینان از انطباق و نظارت مستمر از طریق عملیات امنیتی مجهز خواهید شد. در پایان این کتاب، شما درک کاملی از فرآیندها و ابزارهای دخیل در ایمن سازی و سخت کردن محیط ویندوز خود خواهید داشت. آنچه می آموزید درک پایه و بهترین روش ها برای ایجاد خط مبنا با مدیریت هویت و مدیریت دسترسی در سیستم های مبتنی بر ویندوز آشنا شوید مدیریت دستگاه و مدیریت از راه دور سیستم های مبتنی بر ویندوز را بررسی کنید نکات امنیتی را برای سخت تر کردن سرور ویندوز خود کاوش کنید. و مشتریان را ایمن نگه دارید حسابرسی، ارزیابی و آزمایش برای اطمینان از اعمال موفقیت آمیز کنترل ها و اعمال نظارت بر فعالیت ها و گزارش دادن برای حفظ آسیب پذیری ها. علاقه مند به یادگیری نحوه ایمن سازی سیستم های مبتنی بر ویندوز خود هستند. درک ابتدایی مفاهیم امنیتی ویندوز، Intune، Configuration Manager، Windows PowerShell و Microsoft Azure به شما کمک می کند تا بهترین بهره را از این کتاب ببرید.
Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment. What you will learn Understand baselining and learn the best practices for building a baseline Get to grips with identity management and access management on Windows-based systems Delve into the device administration and remote management of Windows-based systems Explore security tips to harden your Windows server and keep clients secure Audit, assess, and test to ensure controls are successfully applied and enforced Monitor and report activities to stay on top of vulnerabilities Who this book is for This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.
Cover Title page Copyright and Credits About Packt Contributors Table of Contents Preface Section 1: Getting Started Chapter 1: Fundamentals of Windows Security Understanding the security transformation Living in today's digital world Today's threats Identifying vulnerabilities Recognizing breaches Current security challenges Implementing a Zero Trust approach Summary Chapter 2: Building a Baseline Introduction to baselining Policies, standards, procedures, and guidelines Defining policies Setting standards Creating procedures Recommending guidelines Incorporating change management Implementing a security framework Building baseline controls CIS Windows security baselines Implementing a baseline CIS Microsoft SCT Incorporating best practices Summary Chapter 3: Server Infrastructure Management Technical requirements Overview of the data center and the cloud Types of data center Implementing access management in Windows servers Physical and user access security Privileged Access Management, Just-in-Time Access, and Privileged Identity Management Using a tiered model for privileged access Enhanced security administrative environment Access management best practices Understanding Windows Server management tools Introducing Server Manager Looking at Event Viewer Using Windows Server Update Services Introducing Windows Admin Center Using Azure services to manage Windows servers The Azure portal and Marketplace Implementing role-based access control Azure Resource Manager Understanding Azure Backup Introducing Azure Update Management Leveraging Azure Site Recovery Summary Chapter 4: End User Device Management Technical requirements Device management evolution Device Imaging and Windows Autopilot Windows Assessment and Deployment Kit (Windows ADK) Windows Configuration Designer Microsoft Deployment Toolkit Windows Deployment Services MDT and Configuration Manager Windows Autopilot Microsoft Endpoint Configuration Manager Securely deploying clients for Configuration Manager Client collections, settings, and communications Intune Mobile Device Management (MDM) Configuration Service Provider Mobile Device Management versus Mobile Application Management Windows enrollment methods Introducing Microsoft Endpoint Manager Summary Section 2: Applying Security and Hardening Chapter 5: Hardware and Virtualization Technical requirements Physical servers and virtualization Microsoft virtualization Hardware security concerns Virtualization security concerns Cloud hardware and virtualization Introduction to hardware certification BIOS and UEFI, TPM 2.0, and Secure Boot Unified Extensible Firmware Interface UEFI Secure Boot Trusted Platform Module (TPM 2.0) Advanced protection with VBS Credential Guard Device Guard Windows Defender Application Guard Hypervisor-Protected Code Integrity Windows Defender System Guard Hardware security recommendations and best practices Summary Chapter 6: Network Fundamentals for Hardening Windows Technical requirements Network security fundamentals Understanding Windows Network Security Network baselining Windows 10 Windows Server Networking and Hyper-V Network troubleshooting Windows Defender Firewall and Advanced Security Configuring a firewall rule with Group Policy Windows Defender Exploit Guard Network Protection Introducing Azure network security Network Security Groups (NSGs) Summary Chapter 7: Identity and Access Management Technical requirements Identity and access management overview Identity Authentication Authorization Accountability Implementing account and access management HR and identity management Integrating directory services Using local administrative accounts Managing Azure external user access (B2B) Understanding the Azure cloud administrative roles Implementing PAM security tools (PAM, PIM, and JIT) Using Azure RBAC Understanding authentication, MFA, and going passwordless Securing your passwords Introducing SSPR Using Azure AD Seamless SSO Configuring Azure SSO Configuring MFA Introducing Windows Hello Understanding going passwordless Using Conditional Access and Identity Protection Summary Chapter 8: Administration and Remote Management Technical requirements Understanding device administration Differences between domain join, hybrid, and Azure AD joined devices Enforcing policies with MDM Creating compliance settings with Configuration Manager Creating Policies with Intune Building security baselines Using the Microsoft Security Compliance Toolkit Creating a Configuration Baseline from a GPO Connecting securely to servers remotely Remote management and support tools Using Azure Security Center Just-in-Time access Connecting with Azure Bastion Introducing PowerShell security Configuring PowerShell logging Using PowerShell Constrained Language Mode Enabling script execution Summary Chapter 9: Keeping Your Windows Client Secure Technical requirements Securing your Windows clients Introducing Windows Update for Business Configuring Windows updates in Intune Advanced Windows hardening configurations Enabling Windows Hello for Business Managing BitLocker encryption Configuring Windows Defender AV Enabling Microsoft Defender SmartScreen Preventing name resolution poisoning Disabling the Web Proxy Autodiscovery Protocol (WPAD) Configuring Office security baselines Hardening Google Chrome Preventing user access to the registry Windows Defender Application Control Windows 10 privacy Controlling the privacy settings for each app Additional privacy settings Privacy settings for Microsoft Edge Summary Chapter 10: Keeping Your Windows Server Secure Technical requirements Windows Server versions Installing Windows Server roles and features Reducing the Windows Server footprint Installing Nano Server 2019 Configuring Windows updates Implementing Windows Server Update Services (WSUS) Deploying Azure Update Management Connecting to Microsoft Defender ATP Onboarding with Group Policy Onboarding with Configuration Manager Hardening Windows Server Implementing a security baseline Using Azure Disk Encryption Deploying Windows Defender Application Control Summary Section 3: Protecting, Detecting, and Responding for Windows Environments Chapter 11: Security Monitoring and Reporting Technical requirements Monitoring with MDATP Investigating an alert Onboarding workstations to the MDATP service Enabling the Microsoft Intune connection Creating a machine risk compliance policy Enabling advanced features Deploying Log Analytics Installing gallery solutions Monitoring with Azure Monitor and activity logs Secure access to Azure Monitor Monitoring Azure activity logs Configuring ASC Creating performance baselines Summary Chapter 12: Security Operations Technical requirements Introducing the SOC Using the M365 security portal Understanding Microsoft Secure Score Classifying your data Using MCAS Reviewing the activity log Looking at a user’s activity Configuring Azure ATP Planning for Azure ATP Activating your instance Understanding the kill chain Looking at alerts Investigating threats with Azure Security Center Introducing Azure Sentinel Creating the connection Microsoft Defender Security Center Assigning permissions and machine groups Reviewing the alerts queue Automated Investigations Planning for business continuity and DR Summary Chapter 13: Testing and Auditing Technical requirements Validating controls Vulnerability scanning Preparing for a vulnerability scan Planning for penetration testing Executing a penetration test Reviewing the findings Security awareness and training Summary Chapter 14: Top 10 Recommendations and the Future The 10 most important to-dos Implementing identity protection and privileged access Enact a Zero Trust access model Define a security framework Get current and stay current Make use of modern management tools Certify your physical hardware devices Administer network security Always encrypt your devices Enable endpoint protection Deploy security monitoring solutions Other important items The future of device security and management Security and the future Summary Other Books You May Enjoy Leave a review - let other readers know what you think Index