Windows Ransomware Detection and Protection

Windows Ransomware Detection and Protection
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 29,95 €

Jetzt 28,78 €*

Artikel-Nr:
9781803230610
Veröffentl:
2023
Seiten:
290
Autor:
Marius Sandbu
eBook Typ:
EPUB
eBook Format:
Reflowable
Kopierschutz:
NO DRM
Sprache:
Englisch
Beschreibung:

Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn to build security monitoring solutions based on Microsoft 365 and SentinelUnderstand how Zero-Trust access and SASE services can help in mitigating risksBuild a secure foundation for Windows endpoints, email, infrastructure, and cloud servicesBook DescriptionIf you're looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From teaching you how to monitor security threats to establishing countermeasures to protect against ransomware attacks, Windows Ransomware Detection and Protection has it all covered.The book begins by helping you understand how ransomware attacks work, identifying different attack vectors, and showing you how to build a secure network foundation and Windows environment. You'll then explore ransomware countermeasures in different segments, such as Identity and Access Management, networking, Endpoint Manager, cloud, and infrastructure, and learn how to protect against attacks. As you move forward, you'll get to grips with the forensics involved in making important considerations when your system is attacked or compromised with ransomware, the steps you should follow, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes.By the end of this ransomware book, you'll have learned how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload.What you will learnUnderstand how ransomware has evolved into a larger threatSecure identity-based access using services like multifactor authenticationEnrich data with threat intelligence and other external data sourcesProtect devices with Microsoft Defender and Network ProtectionFind out how to secure users in Active Directory and Azure Active DirectorySecure your Windows endpoints using Endpoint ManagerDesign network architecture in Azure to reduce the risk of lateral movementWho this book is forThis book is for Windows administrators, cloud administrators, CISOs, and blue team members looking to understand the ransomware problem, how attackers execute intrusions, and how you can use the techniques to counteract attacks. Security administrators who want more insights into how they can secure their environment will also find this book useful. Basic Windows and cloud experience is needed to understand the concepts in this book.

If you’re looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From teaching you how to monitor security threats to establishing countermeasures to protect against ransomware attacks, Windows Ransomware Detection and Protection has it all covered.
The book begins by helping you understand how ransomware attacks work, identifying different attack vectors, and showing you how to build a secure network foundation and Windows environment. You’ll then explore ransomware countermeasures in different segments, such as Identity and Access Management, networking, Endpoint Manager, cloud, and infrastructure, and learn how to protect against attacks. As you move forward, you’ll get to grips with the forensics involved in making important considerations when your system is attacked or compromised with ransomware, the steps you should follow, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes.
By the end of this ransomware book, you’ll have learned how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.