万本电子书0元读

万本电子书0元读

顶部广告

Microsoft System Center Endpoint Protection Cookbook - Second Edition电子书

售       价:¥

1人正在读 | 0人评论 9.8

作       者:Nicolai Henriksen

出  版  社:Packt Publishing

出版时间:2016-12-01

字       数:69.3万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Over 31 simple yet incredibly effective recipes for installing and managing System Center 2016 Endpoint Protection About This Book This is the most practical and up-to-date book covering important new features of System Center 2016 Endpoint protection Gain confidence in managing IT and protecting your server against malware and other threats Configure and automate reporting features and also prepare yourself for a simple and pain-free migration process Who This Book Is For If you are a System Administrator or Engineer using System Center 2016 Endpoint Protection, then this book is for you. You should have a good background with Microsoft products in general, although no knowledge of Endpoint Protection is required. What You Will Learn Explore the best practices for Endpoint Protection in System Center Configuration Manager Provision the Endpoint Protection Client in a Disk Image in Configuration Manager Get to know more about the Security Center Configure definition and engine client updates to be optimum for your bandwidth Make your application or server work with Endpoint Protection enabled Find out how to deal with typical issues that may occur with Endpoint Protection Know how to respond to infections that often occur In Detail System Center Configuration Manager is now used by over 70% of all the business in the world today and many have taken advantage engaging the System Center Endpoint Protection within that great product. Through this book, you will gain knowledge about System Center Endpoint Protection, and see how to work with it from System Center Configuration Manager from an objective perspective. We’ll show you several tips, tricks, and recipes to not only help you understand and resolve your daily challenges, but hopefully enhance the security level of your business. Different scenarios will be covered, such as planning and setting up Endpoint Protection, daily operations and maintenance tips, configuring Endpoint Protection for different servers and applications, as well as workstation computers. You’ll also see how to deal with malware and infected systems that are discovered. You’ll find out how perform OS deployment, Bitlocker, and Applocker, and discover what to do if there is an attack or outbreak. You’ll find out how to ensure good control and reporting, and great defense against threats and malware software. You’ll see the huge benefits when dealing with application deployments, and get to grips with OS deployments, software updates, and disk encryption such as Bitlocker. By the end, you will be fully aware of the benefits of the System Center 2016 Endpoint Protection anti-malware product, ready to ensure your business is watertight against any threat you could face. Style and approach Build robust SCEP and AV policies and discover the new potential of exciting new features of SCEP 2016.
目录展开

Microsoft System Center Endpoint Protection Cookbook Second Edition

Table of Contents

Microsoft System Center Endpoint Protection Cookbook Second Edition

Credits

About the Author

Acknowledgment

About the Reviewer

www.PacktPub.com

eBooks, discount offers, and more

Why subscribe?

Instant updates on new Packt books

Preface

What this book covers

What you need for this book

Who this book is for

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Conventions

Reader feedback

Customer support

Downloading the color images of this book

Errata

Piracy

Questions

1. Planning and Getting Started with System Center Endpoint Protection

Introduction

How does Endpoint Protection in Configuration Manager work

How to do it…

What made Endpoint Protection that good

Planning for the Endpoint Protection

How to do it…

Prerequisites of the infrastructure

Getting ready

How to do it…

How it works…

Best practices for Endpoint Protection in Configuration Manager

How to do it...

Administrating workflow for Endpoint Protection in Configuration Manager

Getting ready

How to do it…

2. Configuring Endpoint Protection in Configuration Manager

Introduction

Configuring Endpoint Protection in Configuration Manager

Getting ready

How to do it…

How it works…

Configuring alerts for Endpoint Protection in Configuration Manager

Getting ready

How to do it…

How it works…

Configuring definition updates for Endpoint Protection in Configuration Manager

Getting ready

How to do it...

How it works…

See also

Provisioning the Endpoint Protection client in a disk image in Configuration Manager

Getting ready

How to do it…

3. Operations and Maintenance for Endpoint Protection in Configuration Manager

Introduction

Creating and deploying antimalware policies for Endpoint Protection in Configuration Manager

How to do it…

Order and combination of policies to be merged

Exclusions

Creating and deploying Windows Firewall policies for Endpoint Protection in Configuration Manager

How to do it…

Monitoring Endpoint Protection in Configuration Manager

How to do it…

4. Updates

Introduction

Understanding Endpoint Protection updates

How to do it…

Working with updates from WSUS

Getting ready

How to do it…

Working with updates from SCCM

How to do it…

What you need to consider and optimize when working with low bandwidth locations

How to do it…

Why and how to use offline updates

How to do it…

5. Security and Privacy for Endpoint Protection in Configuration Manager

Introduction

Security and privacy for Endpoint Protection in Configuration Manager

How to do it…

The Microsoft Security Center

How to do it…

Keeping third-party applications up-to-date

How to do it…

Configuring automatic sample submission

How to do it…

6. Configuring and Troubleshooting Performance and Advanced Protection

Introduction

What you need to consider when running antimalware on your computer

How to do it…

Configuring Endpoint Protection or Defender for Windows 10

How to do it…

Integrating Endpoint Protection with OS Deployment

How to do it…

What you need to consider regarding BitLocker and Endpoint Protection

How to do it…

7. Troubleshooting and Fixing Issues

Introduction

Dealing with Endpoint Protection issues

Getting ready

How to do it…

Solving Endpoint Protection Policy issues

Getting ready

How to do it…

Registry.pol files

Understanding update issues

How to do it…

8. Malware Handling

Introduction

How to handle malware

How to do it…

See also

Responding to infections that often occur

Getting ready

How to do it...

See also

Monitoring infectious outbreaks

How to do it…

Protecting the Windows File Server from known Cryptolocker malware

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部