|
Chapter 4: Security and identity ......................................................................................................... 106Bog'liq 9780735697744 Introducing Windows Server 2016 pdf
Chapter 4: Security and identity ......................................................................................................... 106
Shielded VMs ........................................................................................................................................................................ 107
Threat-resistant technologies ........................................................................................................................................ 108
Control Flow Guard ....................................................................................................................................................... 108
Device Guard on Windows Server 2016 ................................................................................................................ 109
What is Device Guard ................................................................................................................................................... 109
Enhanced Kernel Mode protection using Hypervisor Code Integrity ....................................................... 109
Deploy configurable code Integrity policy........................................................................................................... 110
Create code Integrity policy for general server usage .................................................................................... 110
Create code integrity policy for lockdown server ............................................................................................. 111
Deploy code integrity policy...................................................................................................................................... 111
Credential Guard ............................................................................................................................................................ 111
Remote credential guard ............................................................................................................................................ 113
Windows Defender ........................................................................................................................................................ 114
Threat detection technologies ....................................................................................................................................... 114
Securing privileged access .............................................................................................................................................. 117
Just-in-Time and Just Enough Administration ........................................................................................................ 117
A strategy for securing privileged access .................................................................................................................. 118
Short-term plan .............................................................................................................................................................. 119
Medium-term plan ........................................................................................................................................................ 120
Long-term plan ............................................................................................................................................................... 122
Identity .................................................................................................................................................................................... 123
Active Directory Domain Services............................................................................................................................ 123
Do'stlaringiz bilan baham: |
|
|