Buy 2+, save 55% on books & eBooks through December 1. Use code BOOKSGIVING. Learn more.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Prepare for Microsoft Exam 70-744–and help demonstrate your real-world mastery of securing Windows Server 2016 environments. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level.
Focus on the expertise measured by these objectives:
• Implement server hardening solutions
• Secure a virtualization infrastructure
• Secure a network infrastructure
• Manage privileged identities
• Implement threat detection solutions
• Implement workload-specific security
This Microsoft Exam Ref:
• Organizes its coverage by exam objectives
• Features strategic, what-if scenarios to challenge you
• Assumes you have experience as a Windows Server administrator and an understanding of basic networking and Hyper-V virtualization fundamentals, Active Directory Domain Services principles, and Windows Server security principles
Follow the instructions to download this book's URL list (18 KB .docx).
Chapter 1: Implement server hardening solutions
1.1 Configure disk and file encryption
1.2 Implement server patching and updating solutions
1.3 Implement malware protection
1.4 Protect credentials
1.5 Create security baselines
Chapter 2: Secure a virtualization infrastructure
2.1 Implement a Guarded Fabric solution
2.2 Implement Shielded and encryption-supported VMs
Chapter 3: Secure a network infrastructure
3.1 Configure Windows Firewall
3.2 Implement a Software Defined Distributed Firewall
3.3 Secure network traffic
Chapter 4: Manage privileged identities
4.1 Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach
4.2 Implement Just-In-Time (JIT) Administration
4.3 Implement Just-Enough-Administration (JEA)
4.4 Implement Privileged Access Workstations (PAWs) and User Rights Assignments
4.5 Implement Local Administrator Password Solution (LAPS)
Chapter 5: Implement threat detection solutions
5.1 Configure advanced audit policies
5.2 Install and configure Microsoft Advanced Threat Analytics (ATA)
5.3. Determine threat detection solutions using Operations Management Suite (OMS)
Chapter 6: Implement workload-specific security
6.1 Secure application development and server workload infrastructure6.2 Implement a secure file services infrastructure and Dynamic Access Control (DAC)