Getting Started with Windows Server Security Front Cover

Getting Started with Windows Server Security

  • Length: 247 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2015-02-27
  • ISBN-10: 1784398721
  • ISBN-13: 9781784398729
  • Sales Rank: #1635428 (See Top 100 Books)

Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

About This Book

  • Learn how to identify and mitigate security risks in your Microsoft Server infrastructure
  • Develop a proactive approach to common security threats to prevent sensitive data leakage and unauthorized access
  • Step-by-step tutorial that provides real-world scenarios and security solutions

Who This Book Is For

If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.

In Detail

Windows Server 2012 provides security features and solutions that can be used as standalone security solutions as well as integrated solutions with your existing security or auditing tools.

To begin, you will learn how to implement baseline security using Microsoft Security Configuration Wizard and how to lock down unwanted services, along with how to configure your Windows firewall. You will see how to enable and use native tools including AppLocker to identify and mitigate risks and tighten up your Windows Server infrastructure security.

This book also walks you through best practices for designing and building a secure Microsoft server platform, with instructions on configuration and managing Dynamic Access Control and polices.

At the end of the book, installation and configuration of Windows Server Update Services, which plays a crucial role in the security space, is covered.

Table of Contents

Chapter 1. Operating System and Baseline Security
Chapter 2. Native MS Security Tools and Configuration
Chapter 3. Server Roles and Protocols
Chapter 4. Application Security
Chapter 5. Network Service Security
Chapter 6. Access Control
Chapter 7. Patch Management
Chapter 8. Auditing and Monitoring

To access the link, solve the captcha.