Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Security Monitoring: Scenarios and Patterns

Buy

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system′s event logging patterns for operations and changes performed within the system. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components. Scenario–based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory object modifications, local security policy changes, and other activities.

This book is based on the author′s experience and the results of his research into Microsoft Windows security monitoring and anomaly detection. It presents the most common scenarios people should be aware of to check for any potentially suspicious activity.

Learn to:

  • Implement the Security Logging and Monitoring policy
  • Dig into the Windows security auditing subsystem
  • Understand the most common monitoring event patterns related to operations and changes in the Microsoft Windows operating system

About the Author

Andrei Miroshnikov is a former security program manager with Microsoft. He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft′s Bluehat security conference. In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents. Among his many professional qualifications, he has earned the (ISC)2 CISSP and Microsoft MCSE: Security certifications.

(HTML tags aren't allowed.)

Mastering the SAS DS2 Procedure: Advanced Data-Wrangling Techniques, Second Edi
Mastering the SAS DS2 Procedure: Advanced Data-Wrangling Techniques, Second Edi

Enhance your SAS® data-wrangling skills with high-precision and parallel data manipulation using the DS2 programming language.

Now in its second edition, this book addresses the DS2 programming language from SAS, which combines the precise procedural power and control of the Base SAS® DATA step...

Circuits, Systems and Signal Processing: A Tutorials Approach
Circuits, Systems and Signal Processing: A Tutorials Approach

This book is a collection of tutorial-like chapters on all core topics of signals and systems and the electronic circuits. All the topics dealt with in the book are parts of the core syllabi of standard programs in Electrical Engineering, Electrical and Computer Engineering, and Electronics and Telecommunication Engineering domains. This book...

Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python
Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python

Learn, understand, and implement deep neural networks in a math- and programming-friendly approach using Keras and Python. The book focuses on an end-to-end approach to developing supervised learning algorithms in regression and classification with practical business-centric use-cases implemented in Keras.

The overall...


C# Data Structures and Algorithms: Explore the possibilities of C# for developing a variety of efficient applications
C# Data Structures and Algorithms: Explore the possibilities of C# for developing a variety of efficient applications

A complete guide on using data structures and algorithms to write sophisticated C# code

Key Features

  • Master array, set and map with trees and graphs, among other fundamental data structures
  • Delve into effective design and implementation techniques to meet your software...
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R

Get command of your organizational Big Data using the power of data science and analytics

Key Features

  • A perfect companion to boost your Big Data storing, processing, analyzing skills to help you take informed business decisions
  • Work with the best tools such as Apache...
Web Coding & Development All-in-One For Dummies (For Dummies (Computer/Tech))
Web Coding & Development All-in-One For Dummies (For Dummies (Computer/Tech))

Speak the languages that power the web

With more high-paying web development jobs opening every day, people with coding and web/app building skills are having no problems finding employment. If you’re a would-be developer looking to gain the know-how to build the interfaces, databases, and other features that run...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy