LEADER 03161nam 2200421 450 001 9910830188203321 005 20200110001711.9 010 $a1-119-39089-3 010 $a1-119-39090-7 035 $a(CKB)4100000001115712 035 $a(MiAaPQ)EBC5322517 035 $a(CaSebORM)9781119390640 035 $a(EXLCZ)994100000001115712 100 $a20180406h20182018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aWindows security monitoring $escenarios and patterns /$fAndrei Miroshnikov 205 $a1st edition 210 1$aIndianapolis, India :$cWiley,$d2018. 210 4$dİ2018 215 $a1 online resource (615 pages) $cillustrations, tables 300 $aIncludes index. 311 $a1-119-39064-8 330 $aGo deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security program manager, DEFCON organizer and CISSP, this book digs deep into the underused tools that help you keep Windows systems secure. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful native tools, while scenario-based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event detection to incident response procedures and best practices, this book provides detailed information on all of the security tools your Windows system has to offer. Windows includes many native tools that can help IT professionals and security experts spot and remedy suspicious activities on servers, networks, and end-user computers. If you're like many Windows pros, you're probably not taking full advantage of these features. This book takes you deep into Windows' underutilized built-in security tools to help you beef up your monitoring, detection, and response processes. Detect anomalous events and implement centralized alerting infrastructure Dig into the native Windows tools that enable robust security measures Understand the details of Powershell, Applocker, LogParser, and other tools Adopt effective incident response processes for various common scenarios Fully applicable to a range of Windows versions?back to Windows Vista and Windows Server 2008?this book is designed for real-world implementation. As the threats to your data grow more numerous by the day, it becomes ever more critical to use every security tool at your disposal. Windows Security Monitoring offers complete, expert guidance toward robust security with specialist-level use of powerful Windows tools. 606 $aComputer security 615 0$aComputer security. 676 $a005.4469 700 $aMiroshnikov$b Andrei?$01608354 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830188203321 996 $aWindows security monitoring$93935037 997 $aUNINA