What this book covers
Chapter 1, Operating System and Baseline Security, provides the details to translate your business requirements into a technical policy and implement these security policies in a Microsoft infrastructure environment. This chapter also covers instructions on creating and implementing Windows baseline polices using Microsoft Security Configuration Wizard.
Chapter 2, Native MS Security Tools and Configuration, provides an overview of various Microsoft tools and explains how they can be used in an enterprise to support your compliance and security needs. This chapter converts the configuration and implementation details of the Microsoft Security Compliance Manager, Attack Surface Analyzer, application control, and other auditing policies.
Chapter 3, Server Roles and Protocols, provides the details and methods to select correct server types and roles and identify and control unwanted services based on your requirements. It also provides a PowerShell-based solution to create and analyze baseline images based on the application or server type.
Chapter 4, Application Security, provides various options to create a secure server infrastructure platform for your application using Microsoft technologies. This chapter also covers the details to secure file and data servers, print servers, Hyper-V, web servers and encryption, and BitLocker technologies.
Chapter 5, Network Service Security, provides the details of protecting and controlling Microsoft network services. This chapter provides step-by-step instructions on securing Active Directory, Domain Controller, DNS, DHCP and configuration, and implementation details of gMSA and EMET.
Chapter 6, Access Control, provides an overview of the new access control mechanisms in Windows Server 2012. The step-by-step installation and configuration details of Dynamic Access Control are also included in this chapter.
Chapter 7, Patch Management, provides the details of maintaining the security and integrity of your Windows server using various Microsoft technologies. The step-by-step instructions on implementing and administering WSUS are also included in this chapter.
Chapter 8, Auditing and Monitoring, provides different options to audit and monitor your server infrastructure using various technologies. The details of auditing polices, GPOs, event forwarding, event alerting, and Best Practices Analyzer are also included in this chapter.