|
![]() |
|||
|
||||
OverviewThe Exam Ref is the official study guide for Microsoft certification exams. Featuring concise coverage of the skills measured by the exam, challenging Thought Experiments, and pointers to more in-depth material for the candidate needing additional study, exam candidates get professional-level preparation for the exam. The Exam Ref helps candidates determine their readiness for the exam, and provides Exam Tips to help maximize their performance on the exam. The organization of the material mirrors the skills measured by the exam as presented on the certification exam webpage. Full Product DetailsAuthor: Timothy Warner , Craig ZackerPublisher: Microsoft Press,U.S. Imprint: Microsoft Press Dimensions: Width: 18.80cm , Height: 2.00cm , Length: 22.60cm Weight: 0.560kg ISBN: 9781509304264ISBN 10: 1509304266 Pages: 352 Publication Date: 06 February 2017 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsChapter 1: Implement server hardening solutions 1.1 Configure disk and file encryption 1.2 Implement server patching and updating solutions 1.3 Implement malware protection 1.4 Protect credentials 1.5 Create security baselines Chapter 2: Secure a virtualization infrastructure 2.1 Implement a Guarded Fabric solution 2.2 Implement Shielded and encryption-supported VMs Chapter 3: Secure a network infrastructure 3.1 Configure Windows Firewall 3.2 Implement a Software Defined Distributed Firewall 3.3 Secure network traffic Chapter 4: Manage privileged identities 4.1 Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach 4.2 Implement Just-In-Time (JIT) Administration 4.3 Implement Just-Enough-Administration (JEA) 4.4 Implement Privileged Access Workstations (PAWs) and User Rights Assignments 4.5 Implement Local Administrator Password Solution (LAPS) Chapter 5: Implement threat detection solutions 5.1 Configure advanced audit policies 5.2 Install and configure Microsoft Advanced Threat Analytics (ATA) 5.3. Determine threat detection solutions using Operations Management Suite (OMS) Chapter 6: Implement workload-specific security 6.1 Secure application development and server workload infrastructure 6.2 Implement a secure file services infrastructure and Dynamic Access Control (DAC)ReviewsAuthor InformationTimothy L. Warner is a Microsoft Most Valuable Professional (MVP) in Cloud and Datacenter Management who is based in Nashville, TN. A computer enthusiast who authored his first BASIC program in 1981 on the Radio Shack TRS-80 Model III, Tim has worked in nearly every facet of IT, from systems administration and software architecture to technical writing and training. Craig Zacker is a writer, editor, and educator who has written or contributed to dozens of books on operating systems, networking, and PC hardware, as well as several college texts and online training courses. Craig is the author of the Windows Small Business Server 2008 Administrator's Pocket Consultant, and co-authored the MCITP Self-Paced Training Kit (Exam 70-686): Windows 7 Desktop Administrator. Tab Content 6Author Website:Countries AvailableAll regions |