This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
The Exam Ref is the official study guide for Microsoft certification exams. Featuring concise coverage of the skills measured by the exam, challenging Thought Experiments, and pointers to more in-depth material for the candidate needing additional study, exam candidates get professional-level preparation for the exam. The Exam Ref helps candidates determine their readiness for the exam, and provides Exam Tips to help maximize their performance on the exam. The organization of the material mirrors the skills measured by the exam as presented on the certification exam webpage.
Follow the instructions to download this book's URL list (18 KB .docx).
Chapter 1: Implement server hardening solutions
1.1 Configure disk and file encryption
1.2 Implement server patching and updating solutions
1.3 Implement malware protection
1.4 Protect credentials
1.5 Create security baselines
Chapter 2: Secure a virtualization infrastructure
2.1 Implement a Guarded Fabric solution
2.2 Implement Shielded and encryption-supported VMs
Chapter 3: Secure a network infrastructure
3.1 Configure Windows Firewall
3.2 Implement a Software Defined Distributed Firewall
3.3 Secure network traffic
Chapter 4: Manage privileged identities
4.1 Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach
4.2 Implement Just-In-Time (JIT) Administration
4.3 Implement Just-Enough-Administration (JEA)
4.4 Implement Privileged Access Workstations (PAWs) and User Rights Assignments
4.5 Implement Local Administrator Password Solution (LAPS)
Chapter 5: Implement threat detection solutions
5.1 Configure advanced audit policies
5.2 Install and configure Microsoft Advanced Threat Analytics (ATA)
5.3. Determine threat detection solutions using Operations Management Suite (OMS)
Chapter 6: Implement workload-specific security
6.1 Secure application development and server workload infrastructure6.2 Implement a secure file services infrastructure and Dynamic Access Control (DAC)