• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Courses Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,549
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%

71Ax9bHqerL._SL1500_.jpg

Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender​

Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threats

Purchase of the print or Kindle book includes a free PDF eBook

Key Features​

  • Learn to build security monitoring solutions based on Microsoft 365 and Sentinel
  • Understand how Zero-Trust access and SASE services can help in mitigating risks
  • Build a secure foundation for Windows endpoints, email, infrastructure, and cloud services

Book Description​

If you're looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From teaching you how to monitor security threats to establishing countermeasures to protect against ransomware attacks, Windows Ransomware Detection and Protection has it all covered.

The book begins by helping you understand how ransomware attacks work, identifying different attack vectors, and showing you how to build a secure network foundation and Windows environment. You'll then explore ransomware countermeasures in different segments, such as Identity and Access Management, networking, Endpoint Manager, cloud, and infrastructure, and learn how to protect against attacks. As you move forward, you'll get to grips with the forensics involved in making important considerations when your system is attacked or compromised with ransomware, the steps you should follow, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes.

By the end of this ransomware book, you'll have learned how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload.

What you will learn​

  • Understand how ransomware has evolved into a larger threat
  • Secure identity-based access using services like multifactor authentication
  • Enrich data with threat intelligence and other external data sources
  • Protect devices with Microsoft Defender and Network Protection
  • Find out how to secure users in Active Directory and Azure Active Directory
  • Secure your Windows endpoints using Endpoint Manager
  • Design network architecture in Azure to reduce the risk of lateral movement

Who this book is for​

This book is for Windows administrators, cloud administrators, CISOs, and blue team members looking to understand the ransomware problem, how attackers execute intrusions, and how you can use the techniques to counteract attacks. Security administrators who want more insights into how they can secure their environment will also find this book useful. Basic Windows and cloud experience is needed to understand the concepts in this book.

Table of Contents​

  1. Ransomware Attack Vectors and the Threat Landscape
  2. Building a Secure Foundation
  3. Security Monitoring using Microsoft Sentinel and Defender
  4. Ransomware Countermeasures - Windows Endpoints, Identity, and SaaS
  5. Ransomware Countermeasures – Microsoft Azure Workloads
  6. Ransomware Countermeasures - Networking and Zero-Trust Access
  7. Protecting Information Using Azure Information Protection and Data Protection
  8. Ransomware Forensics
  9. Monitoring the Threat Landscape
  10. Best Practices for Protecting Windows from Ransomware Attacks
More info
This link is hidden for visitors. Please Log in or register now.
Download


 
Back
Top