Windows Server 2012 Security from End to Edge and Beyond
Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
- Thomas W Shinder, Member of Microsoft's ISA Server Beta Team and Microsoft MVP for ISA Server, Dallas, TX, U.S.A.
- Yuri Diogenes
- Debra Littlejohn Shinder, MCSE, Technology consultant, trainer, and writer
Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments.
The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authorsâ blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.
AudienceInformation Security professionals, Windows systems architects and administrators, technical decision makers, network administrators and other IT professionals who use are responsible for architecting, designing, planning, and deploying security solutions for systems using Microsoft Windows.
- Published: April 2013
- Imprint: SYNGRESS
- ISBN: 978-1-59749-980-4
Table of Contents
Chapter 1: Planning Platform Security
Chapter 2: Planning Server Role in Windows Server 2012
Chapter 3: Deploying Directory Services and Certificate Services
Chapter 4: Deploying AD FS and AD RMS in Windows Server 2012
Chapter 5: Patch Management with Windows Server 2012
Chapter 6: Virtualization Security
Chapter 7: Controlling Access to your Environment with Authentication and Authorization
Chapter 8: Endpoint Security
Chapter 9: Secure Client Deployment with Trusted Boot and BitLocker
Chapter 10: Mitigating Application's Vulnerabilities
Chapter 11: Mitigating Network Vulnerabilities
Chapter 12: Unified Remote Access and BranchCache
Chapter 13: DirectAccess Deployment Scenarios
Chapter 14: Protecting Legacy Remote Clients
Chapter 15: Cloud Security