下载  >  操作系统  >  Windows Server  > Exam Ref 70-744 Securing Windows Server 2016.pdf

Exam Ref 70-744 Securing Windows Server 2016.pdf 评分:

Exam Ref 70-744 Securing Windows Server 2016.pdf 英文
Exam Ref 70-744 Securing windows Server 2016 Published with the authorization of microsoft Corporation by: Pearson Education, nc Copyright o 2017 by Timothy Warner All rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms, and the appropriate contacts within the pearson education Globalrights&PermissionsDepartmentpleasevisitwww.pearsoned.com/permissions No patent liability is assumed with respect to the use of the information contained herel Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein ISBN-13:978-1-5093-0426-4 ISBN-10:1-509-30426-6 Library of congress Control Number: 2016944345 first printing december 2016 Trademarks Microsoftandthetrademarkslistedathttp:/www.microsoftcomonthetrademarks webpage are trademarks of the Microsoft group of companies. All other marks are property of their respective owners Warning and disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information provided is on an"as is basis. The authors, the publisher, and microsoft Corporation shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or programs accompanying it Special sales For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests ) please contact our corporate sales department at corpsales(@pearsoned com or(800)382-3419 Forgovernmentsalesinquiriespleasecontactgovernmentsales@pearsoned.com ForquestionsaboutsalesoutsidetheU.s.,pleasecontactintlcs(@pearson.com. Editor-in-Chief greg wiegand Acquisitions Editor Trina mac Donald De velopment Editor Backstop Media, Troy Mott Managing Editor Sandra Schroeder Senior project editor tracey croom Editorial Production Ellie Vee design Copy editor Jordan Severns Indexer Julie Grady Proofre ader christina rudloff Technical Editor Scott Houghton Cover Designer twist Creative, Seattle Contents at a glance Introduction Preparing for the exam CHAPTER iMplement server hardening solutions CHAPTER 2 Secure a Virtualization Infrastructure chaPTeR 3 Secure a network infrastructure ChAPTER 4 Manage Privileged Identities CHAPTER 5Implement threat detection solutions CHAPTER 6.Implement workload-specific security Index Contents Introduction Organization of this book Microsoft certifications Acknowledgments Free ebooks from microsoft press Microsoft Virtual Academy Quick access to online references Errata, updates, book support We want to hear from you Stay in touch Preparing for the exam Chapter 1 Imple ment server hardening solutions Skill l1: Configure disk and file encryption Determine hardware and firmware requirements for Secure Boot and encryption key functionality Deploy bitLocker Drive Encryption Configure Network Unlock Implement the BitLocker Recovery Process Manage Encrypting file system Skill 1.2: Implement server patching and updating solutions Install and configure WSUS Create computer groups and configure Automatic Updates Manage updates using WSUS Configure WSUS reporting Troubleshoot WSUS configuration and deployment Skill 1.3: Implement malware protection Implement an antimalware solution with Windows defender Integrate Windows Defender with WSUS and Windows Update Implement Applocker rules Implement Control Flow Guard Implement Device guard policies Skill 1. 4: Protect credentials Determine requirements for Credential Guard Configure Credential Guard ImplementNTLMblocking Skill 1.5: Create security baselines Install and Configure Security Compliance Manager Create and import security baselines Deploy configurations to domain and non-domain-joined servers Chapter summary Thought Experiment Thought experiment answers Chapter 2 secure a virtualization Infrastructure Skill 2.1: Implement a Guarded Fabric solution Install and configure the Host Guardian Service Configure admin and TPM-trusted attestation Configure Key protection Service Using HGS Configuring the guarded host Migrate shielded vms to other guarded hosts Troubleshoot guarded hosts Skill 2.2: Implement shielded and encryption-supported vMs Determine requirements and scenarios for implementing shielded VMs Create a shielded vM using Hyper-V Enable and configure vTPM Determine requirements and scenarios for implementing encryption-supported VMs Shielded REcovery Chapter summary Thought experiment Thought experiment answers Chapter 3 Secure a network infrastructure skill 3. 1 Configure Windows firewall Confi igt ure e Windows Firewall with Advanced Security Configure network location profiles and deploy profile rules using group policy Configure connection security rules using Group Policy. the GUI console, or Windows power shell Configure Windows Firewall to allow or deny applications Configure authenticated firewall exceptions Skill 3.2: Implement a software-defined Distributed Firewall Determine requirements and scenarios for Distributed Firewall implementation with Software defined netw orking Determine usage scenarios for Distributed Firewall policies and network security groups Skill 3. 3: Secure network traffic Determine SMB 3. 1. 1 protocol security scenarios and implementations Enable sMB encryption on SMB shares Configure smb signing and disable smb 1.0 Secure DNS traffic using DNSSEC and dns policies Install and configure Microsoft Message Analzyer to analyze network traffic Chapter summary Thought experiment Thought experiment answer Chapter 4 Manage Privileged Identities kill 4.1: Implement an enhanced security administrative environment administrative forest design approach Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest Determine usage scenarios and requirements for implementing clean source principles in an active directory architecture Skill 4.2: Implement Just-in- Time administration Create a new administrative(bastion) forest in an existing Active Directory environment using Microsoft Identity Manager Configure trusts between production and bastion forests Create shadow principals in bastion forest Configure the MIM web portal Request privileged access using the MiM web portal Determine requirements and usage scenarios for Privileged Access Management solutions Create and implement MIM policies Implement just-in-time administration principals using time-based policies Request privileged access using Windows PowerShell Skill 4.3: Implement Just-Enough-Administration Enable a jea solution on windows Server 2016 Create and configure session configuration files Create and configure role capability files Create a JEa endpoint Connect to a JEA endpoint on a server for administration View logs Download wmf 5.1 to a windows server 2008 R2 Configure a JEa endpoint on a server using desired State Configuration Skill 4. 4: Implement Privileged Access Workstations and User Rights Assignments Implement a PAWS solution Configure User Rights Assignment group policies Configure security options settings in group policy Enable and configure remote Credential guard for remote desktop access Skill 4.5: Implement Local Administrator Password Solution Install and configure the laps too Secure local administrator passwords using LAPs Manage passw ord parameters and properties using LAPS Chapter summary Thought experiment Thought experiment answers Chapter 5 Implement threat detection solutions Skill 5.1: Configure advanced audit policies Determine the differences and usage scenarios for using local audit policies and advanced auditing policies Implement auditing using Group Policy and auditpolexe Implement auditing using Windows Power Shell Create expression-based audit policies Configure the audit Pnp activity policy Configure the Audit Group Membership policy Enable and configure module, script block and transcription logging in Windows Power Shell Skill 5.2: Install and configure Microsoft Advanced Threat Analytics Determine usage scenarios for ata Determine deployment requirements for ata Install and Configure ATA Gateway on a Dedicated Server Install and Configure ATA Lightweight Gateway Directly on a Domain Controller Configure alerts in ATA Center when suspicious activity is detected Review and edit suspicious activities on the attack Time line Skill 5.3: Determine threat detection solutions using Operations Management Suite Determine Usage and Deployment Scenarios for OMS Determine security and auditing functions available for use Determine log analytics usage scenarios Chapter summar Thought experiment Thought experiment answers Chapter 6 Implement workload-spe cific security Skill 6.1: Secure application development and server workload infrastructure Determine usage scenarios, supported server workloads, and requirements for Nano Server deployments Install and configure Nano Server Implement security policies on Nano Servers using Desired State Configuration Determine usage scenarios and requirements for Windows Server and Hyper-V containers Install and configure Hyper-V containers Skill 6.2: Implement a Secure File services infrastructure and Dynamic Access Control Install the File server Resource Manager role service Configure quotas Configure file screens Configure Storage reports Configure File Management Tasks Configure File Classification Infrastructure using FSRM Implement Work Folders Configure user and device claim types 10

...展开详情
2018-05-15 上传 大小:28.01MB
举报 收藏 (2)
分享
Visualizing Data【PDF 英文原版】

《可视化数据》是一本关于计算信息设计的书籍。从如何获取原始数据开始,到如何理解原始数据,它都给出了非常详尽的介绍。《可视化数据》使用由作者开发的开源编程环境Processing编程,它非常简单易用。对于熟悉使用Java的程序员来说,《可视化数据》后面的章节还介绍了如何将Processing和Java结合使用。 这本书是写给那些拥有一个数据集合,好奇如何探索它,并且考虑如何交流这些数据的人们的。随着我们处理越来越多的信息,需要可视化数据的人们的数量增长的非常迅速。更重要的是,读者已经超越了某些可视化领域的专家。通过让更大范围的人们都接触到可视化思想,我们在接下来的几十年中应该可以看

立即下载
Microsoft-70-744.pdf

新鲜出炉的微软 70-744 MCSE 最后一门。分享给大家。覆盖率98%

立即下载
Installation, Storage, and Compute with Microsoft Windows Server2016

Packed with hands-on activities, MCSA GUIDE TO INSTALLATION, STORAGE, AND COMPUTE WITH MICROSOFT WINDOWS SERVER 2016, EXAM 70-740 equips you to pass the MCSE/MCSA certification exam while preparing you to become a successful Microsoft networking professional. A clear presentation emphasizes the skil

立即下载
Exam Ref 70-741 Networking with Windows Server 2016.pdf

没有水印, PDF, Exam Ref 70-741 Networking with Windows Server 2016.pdf

立即下载
eraser-code-r2982.zip

不可恢復刪除文件的程序的源代碼 橡皮擦是一種高級安全工具,通過使用精心選擇的模式多次覆蓋敏感數據,您可以從磁盤驅動器中完全刪除敏感數據。 您可以將文件和文件夾拖放到程序中,設置任意複雜的計劃和任意數量的目標,或者使用方便的Windows Explorer Shell擴展。 用於重寫的所有模式均基於研究人員或政府機構發布的標準,並且選擇這些模式是為了有效地清除硬盤上的磁性殘留物,從而無法恢復數據。 這些方法包括

立即下载
IP安全策略设置工具 绿色版 [免费版]

IP安全策略设置工具,内含有实用的IP安全策略设置。 @echo off rem For PC Server ipseccmd -w REG -p "HFUT_SECU" -o -x ipseccmd -w REG -p "HFUT_SECU" -x rem ipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/80" -f *+0:80:TCP -n BLOCK -x rem ipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/1434" -f *+0:1434:UDP -n BLOCK -x rem ipseccm

立即下载
智能关闭危险端口(bat文件)

智能关闭危险端口(bat文件) @echo off gpupdate >nul rem For Client only ipseccmd -w REG -p "HFUT_SECU" -o -x >nul ipseccmd -w REG -p "HFUT_SECU" -x >nul rem ipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/80" -f *+0:80:TCP -n BLOCK -x >nul rem ipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/1434" -f *+0:1434:UD

立即下载
Big Data Analytics with Applications in Insider Threat Detection-CRC(2018).pdf

Recent developments in information systems technologies have resulted in computerizing many applications in various business areas. Data has become a critical resource in many organizations, and therefore, ef cient access to data, sharing the data, extracting information from the data, and making us

立即下载
IP安全策略自动设置工具

IP安全策略设置 badwolf:我最新在服务器上使用了IP安全策略自动设置工具,服务器是web站点,开80,20,21,3389等。 服务器安装eset杀毒软件(nod32)带防火墙,系统启动防火墙只允许相对应端口。 然后直接运行这个“Win 服务器过滤策略.exe” (适合服务器的),但运行完,3389无法连接了,起初以为防火墙或杀毒带的防火墙影响,把他两个都关了还不好使。 (转载标明:坏狼安全网 地址:www.winshell.cn) 后来有装了个radmin,并把端口改为8888,但外部还是无法连接,telnet IP 3389或8888都不通。。。 极度郁闷中,后来解压缩

立即下载
Hacking Wireless Networks for Dummies

About author Kevin Beaver is founder and information security advisor with Principle Logic, LLC, an Atlanta-based information-security services firm. He has over 17 years of experience in the IT industry and specializes in information security assessments for those who take security seriously — a

立即下载
全套TUXEDO系统ADM管理官方培训教材(8)

BEA Tuxedo Application Administration SECU 系统安全管理

立即下载
电子商务 英文 文献Privacy in Electronic Commerce and the Economics of Immediate Gratification

ABSTRACT Commission study reported in 2000 that sixty-seven per- cent of consumers were “very concerned” about the privacy Dichotomies between privacy attitudes and behavior have of the personal information provided on-line [11]. More re- been noted in the literature but not yet fully explained. We

立即下载
InsPro Disk.zip(绝对虚拟硬盘软件)2.0

学习数据恢复用的 , 数据恢复技术深度揭秘推荐用软件 nsPro Disk安装程序只是用WINRAR简单包装的一个应用. 让用户可以不去手工安装设备驱动程序. 反安装方法: InsPro Disk不是为菜鸟准备的工具. 您如果不熟悉设备管理器的一些基本操作, 不建议您玩INSPRO DISK. 因为您将很难反安装程序. 1. 将所有的InsPro Disk用InsPro Disk Loader卸载掉. 2. 打开设备管理器. (从我的电脑->属性->硬件-> 设备管理器或者其他什么途径随你便) 3. 在系统设备栏中找到Inside Programming SECU-X BUS, 又键单击

立即下载
InsPro Disk(绝对虚拟硬盘软件)2.0

nsPro Disk安装程序只是用WINRAR简单包装的一个应用. 让用户可以不去手工安装设备驱动程序. InsPro Disk没有反安装程序. 这不是商业软件. 想要再完整只能等我有兴趣了再写. 反安装方法: InsPro Disk不是为菜鸟准备的工具. 您如果不熟悉设备管理器的一些基本操作, 不建议您玩INSPRO DISK. 因为您将很难反安装程序. 1. 将所有的InsPro Disk用InsPro Disk Loader卸载掉. 2. 打开设备管理器. (从我的电脑->属性->硬件->设备管理器或者其他什么途径随你便) 3. 在系统设备栏中找到Inside Programmin

立即下载
SHA(安全散列算法)

安全散列算法 SHA (即Secu re Hash AIgorlthm 安全散列算法)是一种 常用的数据加密算法.它由美国国家标准与技术局(NatlonaI InstItute of Standards and TechnoIogy)于1 993年作为联邦信息 处理标准公布(即第一代SHA算法——SHA一0)。在1 995年和 2002年.其改进版本SHA~ SHA一2也分别正式公布(SHA- 1和SHA一2具有比SHA一0更高的安全性)。SHA算法与MD5算 法的设计原理类似.同样也按2blt数据块为单位来处理输入 但它能产生1 60bIt的消息摘要.具有比MD 5更强的安全性 (MD5为1

立即下载
绝对虚拟硬盘软件 InsPro Disk 2.8(免资源分)

InsPro Disk 绝对虚拟硬盘软件 虚拟硬盘软件,虚拟出的硬盘与真实硬盘一样可以进行分区、格式化等操作。 我经常在做数据恢复过程中用到它,比如以前要使用easy recovery,recovery my files等扫描工具 恢复 镜像文件上的数据,但这几款软件又不支持镜像文件的扫描,就要用到InsPro Disk把文件虚拟成磁盘,然后就可以用那些软件扫描了 。功能强大吧,用到的地方也蛮多的,值得收藏。而且操作界面也很简单也有说明,就不做多介绍了。 使用方法: 用InsPro Disk Creator创建磁盘镜像. 实际生成的文件大小会有调整. 请确保硬盘上空闲空间至少有63M

立即下载
Smart Cities Cybersecurity and Privacy

Smart Cities Cybersecurity and Privacy ISBN-10 书号: 0128150327 ISBN-13 书号: 9780128150320 Edition 版本: 1 Release Finelybook 出版日期: 2018-12-24 pages 页数: (284) Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities r

立即下载
Attack and Defend Computer Security Set

Attack and Defend Computer Security Set By 作者: Dafydd Stuttard – Marcus Pinto – Michael Hale Ligh – Steven Adair – Blake Hartstein – Ozh ISBN-10 书号: 111890673X ISBN-13 书号: 9781118906736 Edition 版本: 1 出版日期: January 28, 2014 pages 页数: 1663

立即下载
Android Security Internals

In a relatively short period of time, Android has become the world’s most popular mobile platform. Although originally designed for smartphones, it now powers tablets, TVs, and wearable devices, and will soon even be found in cars. Android is being developed at a breathtaking pace, with an average o

立即下载
VanDyke.SecureCRT.and.SecureFX.8.5 windows版本

呵呵呵 你懂得 科学使用 SecureCRT 8.5中的新功能(官方) 改进的按钮栏管理:按钮栏管理器允许您添加,复制,编辑,删除,重命名和重新排列按钮栏。使用大量按钮的管理员可以使用Button Manager重新排列,编辑,添加,删除,复制和粘贴按钮。 多行粘贴对话框改进:现在,您可以在多行粘贴确认对话框中查看和编辑文本,然后将其粘贴到会话中,从而减少潜在错误。确认对话框也可以调整大小。 保存临时会话:您现在可以保存使用“快速连接”,“连接”栏或命令行连接的各个会话。 脚本状态指示器:脚本状态指示器显示脚本在选项卡式和平铺会话中运行的时间。 命令窗口:配置命令窗口以默认将命令发送到所

立即下载