Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft System Center Endpoint Protection Cookbook

You're reading from   Microsoft System Center Endpoint Protection Cookbook Over 31 simple yet incredibly effective recipes for installing and managing System Center 2016 Endpoint Protection

Arrow left icon
Product type Paperback
Published in Dec 2016
Publisher
ISBN-13 9781786464286
Length 216 pages
Edition 2nd Edition
Arrow right icon
Author (1):
Arrow left icon
Nicolai Henriksen Nicolai Henriksen
Author Profile Icon Nicolai Henriksen
Nicolai Henriksen
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Planning and Getting Started with System Center Endpoint Protection FREE CHAPTER 2. Configuring Endpoint Protection in Configuration Manager 3. Operations and Maintenance for Endpoint Protection in Configuration Manager 4. Updates 5. Security and Privacy for Endpoint Protection in Configuration Manager 6. Configuring and Troubleshooting Performance and Advanced Protection 7. Troubleshooting and Fixing Issues 8. Malware Handling Index

Responding to infections that often occur


Microsoft is making Windows more and more secure every day. This is a huge focus for the developer team, because a security risk for one person is a security risk for all. Time, money, information, as well as trying to be as productive as possible are all challenges that we must face. It's no secret that there is more malware developed to target Windows than other platforms, because it has a massive user target area.

Your business needs to be using the latest possible platform to be as safe as possible; these platforms are where the largest corporations, unfortunately, will have to use more time and money to keep up.

The result of that is they have to have even tighter and more secure environments, using strong firewalls, passwords, two-factor authentications, locked-down file systems, encrypted disks, memory sticks, locked-down USB ports, and so on. Then we have the ability to lock down and control all applications we want to allow running on the...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image