Book description
Go deep into Windows security tools to implement more robust protocols and processesWindows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security program manager, DEFCON organizer and CISSP, this book digs deep into the underused tools that help you keep Windows systems secure. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful native tools, while scenario-based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event detection to incident response procedures and best practices, this book provides detailed information on all of the security tools your Windows system has to offer.
Windows includes many native tools that can help IT professionals and security experts spot and remedy suspicious activities on servers, networks, and end-user computers. If you're like many Windows pros, you're probably not taking full advantage of these features. This book takes you deep into Windows' underutilized built-in security tools to help you beef up your monitoring, detection, and response processes.
- Detect anomalous events and implement centralized alerting infrastructure
- Dig into the native Windows tools that enable robust security measures
- Understand the details of Powershell, Applocker, LogParser, and other tools
- Adopt effective incident response processes for various common scenarios
Fully applicable to a range of Windows versions—back to Windows Vista and Windows Server 2008—this book is designed for real-world implementation. As the threats to your data grow more numerous by the day, it becomes ever more critical to use every security tool at your disposal. Windows Security Monitoring offers complete, expert guidance toward robust security with specialist-level use of powerful Windows tools.
Table of contents
- Cover
- Title Page
- Introduction
- Part I: Introduction to Windows Security Monitoring
- Part II: Windows Auditing Subsystem
-
Part III: Security Monitoring Scenarios
- CHAPTER 4: Account Logon
- CHAPTER 5: Local User Accounts
- CHAPTER 6: Local Security Groups
- CHAPTER 7: Microsoft Active Directory
- CHAPTER 8: Active Directory Objects
- CHAPTER 9: Authentication Protocols
- CHAPTER 10: Operating System Events
- CHAPTER 11: Logon Rights and User Privileges
- CHAPTER 12: Windows Applications
- CHAPTER 13: Filesystem and Removable Storage
- CHAPTER 14: Windows Registry
- CHAPTER 15: Network File Shares and Named Pipes
- APPENDIX A: Kerberos AS_REQ, TGS_REQ, and AP_REQ Messages Ticket Options
- APPENDIX B: Kerberos AS_REQ, TGS_REQ, and AP_REQ Messages Result Codes
- APPENDIX C: SDDL Access Rights
- End User License Agreement
Product information
- Title: Windows Security Monitoring
- Author(s):
- Release date: April 2018
- Publisher(s): Wiley
- ISBN: 9781119390640
You might also like
book
Mastering Windows Security and Hardening
Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Book …
book
Windows Security Internals
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level …
book
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide
The official Cisco Press Certification Guide designed to help candidates prepare for the new SNCF 300-710 …
book
Windows Registry Forensics, 2nd Edition
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most …