Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Security Monitoring: Scenarios and Patterns

Buy

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system′s event logging patterns for operations and changes performed within the system. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components. Scenario–based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory object modifications, local security policy changes, and other activities.

This book is based on the author′s experience and the results of his research into Microsoft Windows security monitoring and anomaly detection. It presents the most common scenarios people should be aware of to check for any potentially suspicious activity.

Learn to:

  • Implement the Security Logging and Monitoring policy
  • Dig into the Windows security auditing subsystem
  • Understand the most common monitoring event patterns related to operations and changes in the Microsoft Windows operating system

About the Author

Andrei Miroshnikov is a former security program manager with Microsoft. He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft′s Bluehat security conference. In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents. Among his many professional qualifications, he has earned the (ISC)2 CISSP and Microsoft MCSE: Security certifications.

(HTML tags aren't allowed.)

Atlas of Dermatological Manifestations of Gastrointestinal Disease
Atlas of Dermatological Manifestations of Gastrointestinal Disease

Atlas of Dermatological Manifestations of Gastrointestinal Disease provides a comprehensive compendium of digestive tract diseases with dermatological manifestations. The work is arranged by digestive symptoms, with sections based on the specific digestive disease etiology. Each section contains paired chapters of text, one on...

i -Net+ Study Guide
i -Net+ Study Guide

Here's the book you need to prepare for CompTIA's i-Net+ Exam. This Sybex Study Guide provides:

  • Full coverage of every exam objective
  • Practical information on network hardware
  • Hundreds of challenging review questions, in the book...
Efficient Android Threading: Asynchronous Processing Techniques for Android Applications
Efficient Android Threading: Asynchronous Processing Techniques for Android Applications

Multithreading is essential if you want to create an Android app with a great user experience, but how do you know which techniques can help solve your problem? This practical book describes many asynchronous mechanisms available in the Android Sdk, and provides guidelines for selecting the ones most appropriate for the app...


Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China...
Programming in Lua
Programming in Lua

Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. Lua also has established itself as...

Pro Jakarta Commons
Pro Jakarta Commons

Jakarta Commons are easily reusable components that can quickly be put to good use in any server-side Java development undertaking. In fact, components are not big applications, but sleek code bits that perform specific tasks very well. This book provides much-needed documentation and usage information about the popular sub-projects forming...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy