40,10 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Chapter 1: Implement server hardening solutions
1.1 Configure disk and file encryption
1.2 Implement server patching and updating solutions
1.3 Implement malware protection
1.4 Protect credentials
1.5 Create security baselines
Chapter 2: Secure a virtualization infrastructure
2.1 Implement a Guarded Fabric solution
2.2 Implement Shielded and encryption-supported VMs
Chapter 3: Secure a network infrastructure
3.1 Configure Windows Firewall
3.2 Implement a Software Defined Distributed Firewall
3.3 Secure network traffic
Chapter 4: Manage privileged identities
4.1 Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach
4.2 Implement Just-In-Time (JIT) Administration
4.3 Implement Just-Enough-Administration (JEA)
4.4 Implement Privileged Access Workstations (PAWs) and User Rights Assignments
4.5 Implement Local Administrator Password Solution (LAPS)
Chapter 5: Implement threat detection solutions
5.1 Configure advanced audit policies
5.2 Install and configure Microsoft Advanced Threat Analytics (ATA)
5.3. Determine threat detection solutions using Operations Management Suite (OMS)
Chapter 6: Implement workload-specific security
6.1 Secure application development and server workload infrastructure
6.2 Implement a secure file services infrastructure and Dynamic Access Control (DAC)Erscheinungsjahr: | 2017 |
---|---|
Fachbereich: | Anwendungs-Software |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9781509304264 |
ISBN-10: | 1509304266 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Zacker, Craig
Warner, Timothy |
Hersteller: | Microsoft Press,U.S. |
Maße: | 228 x 187 x 25 mm |
Von/Mit: | Craig Zacker (u. a.) |
Erscheinungsdatum: | 06.02.2017 |
Gewicht: | 0,574 kg |
Chapter 1: Implement server hardening solutions
1.1 Configure disk and file encryption
1.2 Implement server patching and updating solutions
1.3 Implement malware protection
1.4 Protect credentials
1.5 Create security baselines
Chapter 2: Secure a virtualization infrastructure
2.1 Implement a Guarded Fabric solution
2.2 Implement Shielded and encryption-supported VMs
Chapter 3: Secure a network infrastructure
3.1 Configure Windows Firewall
3.2 Implement a Software Defined Distributed Firewall
3.3 Secure network traffic
Chapter 4: Manage privileged identities
4.1 Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach
4.2 Implement Just-In-Time (JIT) Administration
4.3 Implement Just-Enough-Administration (JEA)
4.4 Implement Privileged Access Workstations (PAWs) and User Rights Assignments
4.5 Implement Local Administrator Password Solution (LAPS)
Chapter 5: Implement threat detection solutions
5.1 Configure advanced audit policies
5.2 Install and configure Microsoft Advanced Threat Analytics (ATA)
5.3. Determine threat detection solutions using Operations Management Suite (OMS)
Chapter 6: Implement workload-specific security
6.1 Secure application development and server workload infrastructure
6.2 Implement a secure file services infrastructure and Dynamic Access Control (DAC)Erscheinungsjahr: | 2017 |
---|---|
Fachbereich: | Anwendungs-Software |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9781509304264 |
ISBN-10: | 1509304266 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Zacker, Craig
Warner, Timothy |
Hersteller: | Microsoft Press,U.S. |
Maße: | 228 x 187 x 25 mm |
Von/Mit: | Craig Zacker (u. a.) |
Erscheinungsdatum: | 06.02.2017 |
Gewicht: | 0,574 kg |