Exam ref 70 744 securing windows server 2016 tủ tài liệu bách khoa

556 267 0
Exam ref 70 744 securing windows server 2016 tủ tài liệu bách khoa

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Exam Ref 70-744 Securing Windows Server 2016 Timothy Warner Craig Zacker Exam Ref 70-744 Securing Windows Server 2016 Published with the authorization of Microsoft Corporation by: Pearson Education, Inc Copyright © 2017 by Timothy Warner All rights reserved Printed in the United States of America This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit www.pearsoned.com/permissions/ No patent liability is assumed with respect to the use of the information contained herein Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions Nor is any liability assumed for damages resulting from the use of the information contained herein ISBN-13: 978-1-5093-0426-4 ISBN-10: 1-509-30426-6 Library of Congress Control Number: 2016944345 First Printing December 2016 Trademarks Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are trademarks of the Microsoft group of companies All other marks are property of their respective owners Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information provided is on an “as is” basis The authors, the publisher, and Microsoft Corporation shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or programs accompanying it Special Sales For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419 For government sales inquiries, please contact governmentsales@pearsoned.com For questions about sales outside the U.S., please contact intlcs@pearson.com Editor-in-Chief Greg Wiegand Acquisitions Editor Trina MacDonald Development Editor Backstop Media, Troy Mott Managing Editor Sandra Schroeder Senior Project Editor Tracey Croom Editorial Production Ellie Vee Design Copy Editor Jordan Severns Indexer Julie Grady Proofreader Christina Rudloff Technical Editor Scott Houghton Cover Designer Twist Creative, Seattle Contents at a glance Introduction Preparing for the exam CHAPTER Implement server hardening solutions CHAPTER Secure a Virtualization Infrastructure CHAPTER Secure a network infrastructure CHAPTER Manage Privileged Identities CHAPTER Implement threat detection solutions CHAPTER Implement workload-specific security Index Contents Introduction Organization of this book Microsoft certifications Acknowledgments Free ebooks from Microsoft Press Microsoft Virtual Academy Quick access to online references Errata, updates, & book support We want to hear from you Stay in touch Preparing for the exam Chapter Implement server hardening solutions Skill 1.1: Configure disk and file encryption Determine hardware and firmware requirements for Secure Boot and encryption key functionality Deploy BitLocker Drive Encryption Configure Network Unlock Implement the BitLocker Recovery Process Manage Encrypting File System Skill 1.2: Implement server patching and updating solutions Install and configure WSUS Create computer groups and configure Automatic Updates Manage updates using WSUS Configure WSUS reporting Troubleshoot WSUS configuration and deployment Skill 1.3: Implement malware protection Implement an antimalware solution with Windows Defender Integrate Windows Defender with WSUS and Windows Update Implement AppLocker rules Implement Control Flow Guard Implement Device Guard policies Skill 1.4: Protect credentials Determine requirements for Credential Guard Configure Credential Guard Implement NTLM blocking Skill 1.5: Create security baselines Install and Configure Security Compliance Manager Create and import security baselines Deploy configurations to domain and non-domain-joined servers Chapter summary Thought Experiment Thought experiment answers Chapter Secure a Virtualization Infrastructure Skill 2.1: Implement a Guarded Fabric solution Install and configure the Host Guardian Service Configure admin and TPM-trusted attestation Configure Key Protection Service Using HGS Configuring the guarded host Migrate shielded VMs to other guarded hosts Troubleshoot guarded hosts Skill 2.2: Implement shielded and encryption-supported VMs Determine requirements and scenarios for implementing shielded VMs Create a shielded VM using Hyper-V Enable and configure vTPM Determine requirements and scenarios for implementing encryption-supported VMs Shielded VM recovery Chapter summary Thought experiment Thought experiment answers Chapter Secure a network infrastructure Skill 3.1: Configure Windows Firewall Configure Windows Firewall with Advanced Security Configure network location profiles and deploy profile rules using Group Policy Configure connection security rules using Group Policy, the GUI console, or Windows PowerShell Configure Windows Firewall to allow or deny applications Configure authenticated firewall exceptions Skill 3.2: Implement a software-defined Distributed Firewall Determine requirements and scenarios for Distributed Firewall implementation with Software Defined Networking Determine usage scenarios for Distributed Firewall policies and network security groups Skill 3.3: Secure network traffic Determine SMB 3.1.1 protocol security scenarios and implementations Enable SMB encryption on SMB shares Configure SMB signing and disable SMB 1.0 Secure DNS traffic using DNSSEC and DNS policies Install and configure Microsoft Message Analzyer to analyze network traffic Chapter summary Thought experiment Thought experiment answer Chapter Manage Privileged Identities Skill 4.1: Implement an Enhanced Security Administrative Environment administrative forest design approach Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest Determine usage scenarios and requirements for implementing clean source principles in an Active Directory architecture Skill 4.2: Implement Just-in-Time administration Create a new administrative (bastion) forest in an existing Active Directory environment using Microsoft Identity Manager Configure trusts between production and bastion forests Create shadow principals in bastion forest Configure the MIM web portal Request privileged access using the MIM web portal Determine requirements and usage scenarios for Privileged Access Management solutions Create and implement MIM policies Implement just-in-time administration principals using time-based policies Request privileged access using Windows PowerShell Skill 4.3: Implement Just-Enough-Administration Enable a JEA solution on Windows Server 2016 Create and configure session configuration files Create and configure role capability files Create a JEA endpoint Connect to a JEA endpoint on a server for administration View logs Download WMF 5.1 to a Windows Server 2008 R2 Configure a JEA endpoint on a server using Desired State Configuration Skill 4.4: Implement Privileged Access Workstations and User Rights Assignments Implement a PAWS solution Configure User Rights Assignment group policies Configure security options settings in group policy Enable and configure Remote Credential Guard for remote desktop access Skill 4.5: Implement Local Administrator Password Solution Install and configure the LAPS tool Secure local administrator passwords using LAPS Manage password parameters and properties using LAPS Chapter summary Thought experiment Thought experiment answers Chapter Implement threat detection solutions Skill 5.1: Configure advanced audit policies Determine the differences and usage scenarios for using local audit policies and advanced auditing policies Implement auditing using Group Policy and Auditpol.exe Implement auditing using Windows PowerShell Create expression-based audit policies Configure the audit PNP activity policy Configure the Audit Group Membership policy Enable and configure module, script block, and transcription logging in Windows PowerShell Skill 5.2: Install and configure Microsoft Advanced Threat Analytics Determine usage scenarios for ATA Determine deployment requirements for ATA Install and Configure ATA Gateway on a Dedicated Server Install and Configure ATA Lightweight Gateway Directly on a Domain Controller Configure alerts in ATA Center when suspicious activity is detected Review and edit suspicious activities on the Attack Time Line Skill 5.3: Determine threat detection solutions using Operations Management Suite Determine Usage and Deployment Scenarios for OMS Determine security and auditing functions available for use Determine log analytics usage scenarios Chapter summary Thought experiment Thought experiment answers Chapter Implement workload-specific security Skill 6.1: Secure application development and server workload infrastructure Determine usage scenarios, supported server workloads, and requirements for Nano Server deployments Install and configure Nano Server Implement security policies on Nano Servers using Desired State Configuration Determine usage scenarios and requirements for Windows Server and Hyper-V containers Install and configure Hyper-V containers Skill 6.2: Implement a Secure File Services infrastructure and Dynamic Access Control Install the File Server Resource Manager role service Configure quotas Configure file screens Configure Storage Reports Configure File Management Tasks Configure File Classification Infrastructure using FSRM Implement Work Folders Configure user and device claim types 10 542 543 544 545 546 547 548 549 550 Table of Contents Title Page Copyright Page Contents at a glance Contents Introduction 12 Organization of this book Microsoft certifications Acknowledgments Free ebooks from Microsoft Press Microsoft Virtual Academy Quick access to online references Errata, updates, & book support We want to hear from you Stay in touch Important: How to use this book to study for the exam 12 12 13 13 13 13 13 14 14 14 Chapter Implement server hardening solutions 16 Skill 1.1: Configure disk and file encryption Determine hardware and firmware requirements for Secure Boot and encryption key functionality Deploy BitLocker Drive Encryption Configure Network Unlock Implement the BitLocker Recovery Process Manage Encrypting File System (EFS) Skill 1.2: Implement server patching and updating solutions Install and configure WSUS Create computer groups and configure Automatic Updates Manage updates using WSUS Configure WSUS reporting Troubleshoot WSUS configuration and deployment Skill 1.3: Implement malware protection Implement an antimalware solution with Windows Defender Integrate Windows Defender with WSUS and Windows Update 551 16 17 20 27 28 34 35 36 40 42 43 45 46 47 50 Implement AppLocker rules Implement Control Flow Guard Implement Device Guard policies Skill 1.4: Protect credentials Determine requirements for Credential Guard Configure Credential Guard Implement NTLM blocking Skill 1.5: Create security baselines Install and Configure Security Compliance Manager Create and import security baselines Deploy configurations to domain and non-domain-joined servers Chapter summary Thought Experiment Thought experiment answers Chapter Secure a Virtualization Infrastructure Skill 2.1: Implement a Guarded Fabric solution Install and configure the Host Guardian Service Configure admin and TPM-trusted attestation Configure Key Protection Service Using HGS Configuring the guarded host Migrate shielded VMs to other guarded hosts Troubleshoot guarded hosts Skill 2.2: Implement shielded and encryption-supported VMs Determine requirements and scenarios for implementing shielded VMs Create a shielded VM using Hyper-V Enable and configure vTPM Determine requirements and scenarios for implementing encryption-supported VMs Shielded VM recovery Chapter summary Thought experiment Thought experiment answers Chapter Secure a network infrastructure Skill 3.1: Configure Windows Firewall Configure Windows Firewall with Advanced Security 552 51 56 58 62 63 64 68 69 69 73 75 77 79 80 81 81 82 84 89 89 91 95 98 98 100 104 108 109 111 112 112 114 114 115 Configure network location profiles and deploy profile rules using Group Policy Configure connection security rules using Group Policy, the GUI console, or Windows PowerShell Configure Windows Firewall to allow or deny applications Configure authenticated firewall exceptions Skill 3.2: Implement a software-defined Distributed Firewall Determine requirements and scenarios for Distributed Firewall implementation with Software Defined Networking Determine usage scenarios for Distributed Firewall policies and network security groups Skill 3.3: Secure network traffic Determine SMB 3.1.1 protocol security scenarios and implementations Enable SMB encryption on SMB shares Configure SMB signing and disable SMB 1.0 Secure DNS traffic using DNSSEC and DNS policies Install and configure Microsoft Message Analzyer to analyze network traffic Chapter summary Thought experiment Thought experiment answers Chapter Manage Privileged Identities Skill 4.1: Implement an Enhanced Security Administrative Environment administrative forest design approach Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest Determine usage scenarios and requirements for implementing clean source principles in an Active Directory architecture Skill 4.2: Implement Just-in-Time administration Create a new administrative (bastion) forest in an existing Active Directory environment using Microsoft Identity Manager Configure trusts between production and bastion forests Create shadow principals in bastion forest Configure the MIM web portal Request privileged access using the MIM web portal Determine requirements and usage scenarios for Privileged Access Management solutions 553 125 127 133 135 137 137 141 144 144 146 148 149 155 158 159 160 163 163 164 167 170 170 171 175 176 177 178 Create and implement MIM policies Implement just-in-time administration principals using time-based policies Request privileged access using Windows PowerShell Skill 4.3: Implement Just-Enough-Administration Enable a JEA solution on Windows Server 2016 Create and configure session configuration files Create and configure role capability files Create a JEA endpoint Connect to a JEA endpoint on a server for administration View logs Download WMF 5.1 to a Windows Server 2008 R2 Configure a JEA endpoint on a server using Desired State Configuration Skill 4.4: Implement Privileged Access Workstations and User Rights Assignments Implement a PAWS solution Configure User Rights Assignment group policies Configure security options settings in group policy Enable and configure Remote Credential Guard for remote desktop access Skill 4.5: Implement Local Administrator Password Solution Install and configure the LAPS tool Secure local administrator passwords using LAPS Manage password parameters and properties using LAPS Chapter summary Thought experiment Thought experiment answers Chapter Implement threat detection solutions Skill 5.1: Configure advanced audit policies Determine the differences and usage scenarios for using local audit policies and advanced auditing policies Implement auditing using Group Policy and Auditpol.exe Implement auditing using Windows PowerShell Create expression-based audit policies Configure the audit PNP activity policy Configure the Audit Group Membership policy Enable and configure module, script block, and transcription logging in Windows PowerShell 554 179 180 182 184 185 186 189 194 194 195 197 198 199 199 203 208 211 214 214 219 221 223 225 225 227 227 228 236 245 246 248 250 250 Skill 5.2: Install and configure Microsoft Advanced Threat Analytics Determine usage scenarios for ATA Determine deployment requirements for ATA Install and Configure ATA Gateway on a Dedicated Server Install and Configure ATA Lightweight Gateway Directly on a Domain Controller Configure alerts in ATA Center when suspicious activity is detected Review and edit suspicious activities on the Attack Time Line Skill 5.3: Determine threat detection solutions using Operations Management Suite Determine Usage and Deployment Scenarios for OMS Determine security and auditing functions available for use Determine log analytics usage scenarios Chapter summary Thought experiment Thought experiment answers Chapter Implement workload-specific security Skill 6.1: Secure application development and server workload infrastructure Determine usage scenarios, supported server workloads, and requirements for Nano Server deployments Install and configure Nano Server Implement security policies on Nano Servers using Desired State Configuration Determine usage scenarios and requirements for Windows Server and HyperV containers Install and configure Hyper-V containers Skill 6.2: Implement a Secure File Services infrastructure and Dynamic Access Control Install the File Server Resource Manager role service Configure quotas Configure file screens Configure Storage Reports Configure File Management Tasks Configure File Classification Infrastructure using FSRM Implement Work Folders Configure user and device claim types Create and configure resource properties and lists 555 253 254 255 261 265 266 269 272 272 280 283 287 288 288 290 290 290 292 307 310 312 314 315 317 327 330 332 337 345 348 351 Create and configure central access rules and policies Implement policy changes and staging Configure file access auditing Perform access-denied remediation Chapter summary Thought experiment Thought experiment answers Index About the authors Visit us today Hear about it first Free ebooks Survey Code Snippets 355 361 362 363 368 368 369 370 397 398 400 402 404 406 556 .. .Exam Ref 70- 744 Securing Windows Server 2016 Timothy Warner Craig Zacker Exam Ref 70- 744 Securing Windows Server 2016 Published with the authorization of... for preparing for a certification exam such as the Microsoft Exam 70- 744, Securing Windows Server 2016. ” For this book, we focus on your review of the Windows Server skills that you need to maximize... similar for Windows Server and Windows Client computers; however, the 70- 744 exam objectives constrain our discussions only to protecting Windows Server 2016- based servers The first step is to

Ngày đăng: 09/11/2019, 09:43

Từ khóa liên quan

Mục lục

  • Title Page

  • Copyright Page

  • Contents at a glance

  • Contents

  • Introduction

    • Organization of this book

    • Microsoft certifications

    • Acknowledgments

    • Free ebooks from Microsoft Press

    • Microsoft Virtual Academy

    • Quick access to online references

    • Errata, updates, & book support

    • We want to hear from you

    • Stay in touch

    • Important: How to use this book to study for the exam

    • Chapter 1. Implement server hardening solutions

      • Skill 1.1: Configure disk and file encryption

        • Determine hardware and firmware requirements for Secure Boot and encryption key functionality

        • Deploy BitLocker Drive Encryption

        • Configure Network Unlock

        • Implement the BitLocker Recovery Process

        • Manage Encrypting File System (EFS)

        • Skill 1.2: Implement server patching and updating solutions

          • Install and configure WSUS

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan