Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Security Monitoring: Scenarios and Patterns

Buy

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system′s event logging patterns for operations and changes performed within the system. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components. Scenario–based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory object modifications, local security policy changes, and other activities.

This book is based on the author′s experience and the results of his research into Microsoft Windows security monitoring and anomaly detection. It presents the most common scenarios people should be aware of to check for any potentially suspicious activity.

Learn to:

  • Implement the Security Logging and Monitoring policy
  • Dig into the Windows security auditing subsystem
  • Understand the most common monitoring event patterns related to operations and changes in the Microsoft Windows operating system

About the Author

Andrei Miroshnikov is a former security program manager with Microsoft. He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft′s Bluehat security conference. In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents. Among his many professional qualifications, he has earned the (ISC)2 CISSP and Microsoft MCSE: Security certifications.

(HTML tags aren't allowed.)

Adobe® Acrobat® 7.0 CLASSROOM IN A BOOK®
Adobe® Acrobat® 7.0 CLASSROOM IN A BOOK®

If you're like most Acrobat users--creative, business, and engineering pros who work with complex electronic documents--you can ill afford to miss a beat in your production workflow. Then again, you can ill afford being left behind when it comes to mastering the newest version of the important tool on your desktop, Adobe...

Market Timing For Dummies (Business & Personal Finance)
Market Timing For Dummies (Business & Personal Finance)
Want to improve your market timing so you can send your investment returns soaring? Market Timing For Dummies takes the guesswork out of developing a trading strategy and provides all of the tools you need to forecast, prepare for, and take advantage of market trends and changes.

This authoritative guide is packed with expert...

Knots: The Complete Visual Guide
Knots: The Complete Visual Guide
Knots have been used throughout history, and they remain a valuable resource today. Learning to tie knots is a handy, enjoyable skill, requiring only simple equipment to get started.

This book contains a selection of knots intended to be practical and instructive. Many of them have specific purposes,
...

Solid State Electronic Devices, 6th Edition
Solid State Electronic Devices, 6th Edition

This book is an introduction to semiconductor devices for undergraduate electrical engineers, other interested students, and practicing engineers and scientists whose understanding of modern electronics needs updating. The book is organized to bring students with a background in sophomore physics to a level of understanding which will allow...

Expert Service-Oriented Architecture in C# 2005, Second Edition
Expert Service-Oriented Architecture in C# 2005, Second Edition

Expert Service-Oriented Architecture in C# 2005, Second Edition will immerse you in updated code and reference material specifically architected for Visual Studio 2005 and Web Services Enhancements (WSE) 3.0. With this book, you can get a head start on building SOA applications using the clear, conceptual discussions and practical...

Windows Vista Security: Securing Vista Against Malicious Attacks
Windows Vista Security: Securing Vista Against Malicious Attacks

It's not the computer. The hacker's first target is YOU!

A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy