- Published 12/20/2016
- 1st Edition
- Book 978-1-5093-0426-4
- eBook 978-1-5093-0427-1
Prepare for Microsoft Exam 70-744–and help demonstrate your real-world mastery of securing Windows Server 2016 environments. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level.
Focus on the expertise measured by these objectives:
• Implement server hardening solutions
• Secure a virtualization infrastructure
• Secure a network infrastructure
• Manage privileged identities
• Implement threat detection solutions
• Implement workload-specific security
This Microsoft Exam Ref:
• Organizes its coverage by exam objectives
• Features strategic, what-if scenarios to challenge you
• Assumes you have experience as a Windows Server administrator and an understanding of basic networking and Hyper-V virtualization fundamentals, Active Directory Domain Services principles, and Windows Server security principles
Online Sample Chapter
Implement server hardening solutions
Sample Pages
Download the sample pages (includes Chapter 4 and Index)
Table of Contents
Chapter 1: Implement server hardening solutions
1.1 Configure disk and file encryption
1.2 Implement server patching and updating solutions
1.3 Implement malware protection
1.4 Protect credentials
1.5 Create security baselines
Chapter 2: Secure a virtualization infrastructure
2.1 Implement a Guarded Fabric solution
2.2 Implement Shielded and encryption-supported VMs
Chapter 3: Secure a network infrastructure
3.1 Configure Windows Firewall
3.2 Implement a Software Defined Distributed Firewall
3.3 Secure network traffic
Chapter 4: Manage privileged identities
4.1 Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach
4.2 Implement Just-In-Time (JIT) Administration
4.3 Implement Just-Enough-Administration (JEA)
4.4 Implement Privileged Access Workstations (PAWs) and User Rights Assignments
4.5 Implement Local Administrator Password Solution (LAPS)
Chapter 5: Implement threat detection solutions
5.1 Configure advanced audit policies
5.2 Install and configure Microsoft Advanced Threat Analytics (ATA)
5.3. Determine threat detection solutions using Operations Management Suite (OMS)
Chapter 6: Implement workload-specific security
6.1 Secure application development and server workload infrastructure
6.2 Implement a secure file services infrastructure and Dynamic Access Control (DAC)
Errata
On page 146 of the print edition, Figure 4-13 is missing. Follow the instructions to download this book's errata.
- Click the Download button below to start the download.
- If prompted, click Save.
- Locate the .pdf file on your computer. Click to open in a .pdf reader.
Download
If you find an error, you can report it to us through our Submit errata page.