O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Exam Ref 70-744 Securing Windows Server 2016

Book Description

Prepare for Microsoft Exam 70-744–and help demonstrate your real-world mastery of securing Windows Server 2016 environments. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level.

Focus on the expertise measured by these objectives:

• Implement server hardening solutions

• Secure a virtualization infrastructure

• Secure a network infrastructure

• Manage privileged identities

• Implement threat detection solutions

• Implement workload-specific security

This Microsoft Exam Ref:

• Organizes its coverage by exam objectives

• Features strategic, what-if scenarios to challenge you

• Assumes you have experience as a Windows Server administrator and an understanding of basic networking and Hyper-V virtualization fundamentals, Active Directory Domain Services principles, and Windows Server security principles

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Contents at a glance
  5. Contents
  6. Introduction
    1. Organization of this book
    2. Microsoft certifications
    3. Acknowledgments
    4. Free ebooks from Microsoft Press
    5. Microsoft Virtual Academy
    6. Quick access to online references
    7. Errata, updates, & book support
    8. We want to hear from you
    9. Stay in touch
    10. Preparing for the exam
  7. Chapter 1 Implement server hardening solutions
    1. Skill 1.1: Configure disk and file encryption
      1. Determine hardware and firmware requirements for Secure Boot and encryption key functionality
      2. Deploy BitLocker Drive Encryption
      3. Configure Network Unlock
      4. Implement the BitLocker Recovery Process
      5. Manage Encrypting File System
    2. Skill 1.2: Implement server patching and updating solutions
      1. Install and configure WSUS
      2. Create computer groups and configure Automatic Updates
      3. Manage updates using WSUS
      4. Configure WSUS reporting
      5. Troubleshoot WSUS configuration and deployment
    3. Skill 1.3: Implement malware protection
      1. Implement an antimalware solution with Windows Defender
      2. Integrate Windows Defender with WSUS and Windows Update
      3. Implement AppLocker rules
      4. Implement Control Flow Guard
      5. Implement Device Guard policies
    4. Skill 1.4: Protect credentials
      1. Determine requirements for Credential Guard
      2. Configure Credential Guard
      3. Implement NTLM blocking
    5. Skill 1.5: Create security baselines
      1. Install and Configure Security Compliance Manager
      2. Create and import security baselines
      3. Deploy configurations to domain and non-domain-joined servers
      4. Chapter summary
    6. Thought Experiment
    7. Thought experiment answers
  8. Chapter 2 Secure a Virtualization Infrastructure
    1. Skill 2.1: Implement a Guarded Fabric solution
      1. Install and configure the Host Guardian Service
      2. Configure admin and TPM-trusted attestation
      3. Configure Key Protection Service Using HGS
      4. Configuring the guarded host
      5. Migrate shielded VMs to other guarded hosts
      6. Troubleshoot guarded hosts
    2. Skill 2.2: Implement shielded and encryption-supported VMs
      1. Determine requirements and scenarios for implementing shielded VMs
      2. Create a shielded VM using Hyper-V
      3. Enable and configure vTPM
      4. Determine requirements and scenarios for implementing encryption-supported VMs
      5. Shielded VM recovery
      6. Chapter summary
    3. Thought experiment
    4. Thought experiment answers
  9. Chapter 3 Secure a network infrastructure
    1. Skill 3.1: Configure Windows Firewall
      1. Configure Windows Firewall with Advanced Security
      2. Configure network location profiles and deploy profile rules using Group Policy
      3. Configure connection security rules using Group Policy, the GUI console, or Windows PowerShell
      4. Configure Windows Firewall to allow or deny applications
      5. Configure authenticated firewall exceptions
    2. Skill 3.2: Implement a software-defined Distributed Firewall
      1. Determine requirements and scenarios for Distributed Firewall implementation with Software Defined Networking
      2. Determine usage scenarios for Distributed Firewall policies and network security groups
    3. Skill 3.3: Secure network traffic
      1. Determine SMB 3.1.1 protocol security scenarios and implementations
      2. Enable SMB encryption on SMB shares
      3. Configure SMB signing and disable SMB 1.0
      4. Secure DNS traffic using DNSSEC and DNS policies
      5. Install and configure Microsoft Message Analzyer to analyze network traffic
      6. Chapter summary
    4. Thought experiment
    5. Thought experiment answer
  10. Chapter 4 Manage Privileged Identities
    1. Skill 4.1: Implement an Enhanced Security Administrative Environment administrative forest design approach
      1. Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest
      2. Determine usage scenarios and requirements for implementing clean source principles in an Active Directory architecture
    2. Skill 4.2: Implement Just-in-Time administration
      1. Create a new administrative (bastion) forest in an existing Active Directory environment using Microsoft Identity Manager
      2. Configure trusts between production and bastion forests
      3. Create shadow principals in bastion forest
      4. Configure the MIM web portal
      5. Request privileged access using the MIM web portal
      6. Determine requirements and usage scenarios for Privileged Access Management solutions
      7. Create and implement MIM policies
      8. Implement just-in-time administration principals using time-based policies
      9. Request privileged access using Windows PowerShell
    3. Skill 4.3: Implement Just-Enough-Administration
      1. Enable a JEA solution on Windows Server 2016
      2. Create and configure session configuration files
      3. Create and configure role capability files
      4. Create a JEA endpoint
      5. Connect to a JEA endpoint on a server for administration
      6. View logs
      7. Download WMF 5.1 to a Windows Server 2008 R2
      8. Configure a JEA endpoint on a server using Desired State Configuration
    4. Skill 4.4: Implement Privileged Access Workstations and User Rights Assignments
      1. Implement a PAWS solution
      2. Configure User Rights Assignment group policies
      3. Configure security options settings in group policy
      4. Enable and configure Remote Credential Guard for remote desktop access
    5. Skill 4.5: Implement Local Administrator Password Solution
      1. Install and configure the LAPS tool
      2. Secure local administrator passwords using LAPS
      3. Manage password parameters and properties using LAPS
    6. Chapter summary
    7. Thought experiment
    8. Thought experiment answers
  11. Chapter 5 Implement threat detection solutions
    1. Skill 5.1: Configure advanced audit policies
      1. Determine the differences and usage scenarios for using local audit policies and advanced auditing policies
      2. Implement auditing using Group Policy and Auditpol.exe
      3. Implement auditing using Windows PowerShell
      4. Create expression-based audit policies
      5. Configure the audit PNP activity policy
      6. Configure the Audit Group Membership policy
      7. Enable and configure module, script block, and transcription logging in Windows PowerShell
    2. Skill 5.2: Install and configure Microsoft Advanced Threat Analytics
      1. Determine usage scenarios for ATA
      2. Determine deployment requirements for ATA
      3. Install and Configure ATA Gateway on a Dedicated Server
      4. Install and Configure ATA Lightweight Gateway Directly on a Domain Controller
      5. Configure alerts in ATA Center when suspicious activity is detected
      6. Review and edit suspicious activities on the Attack Time Line
    3. Skill 5.3: Determine threat detection solutions using Operations Management Suite
      1. Determine Usage and Deployment Scenarios for OMS
      2. Determine security and auditing functions available for use
      3. Determine log analytics usage scenarios
      4. Chapter summary
    4. Thought experiment
    5. Thought experiment answers
  12. Chapter 6 Implement workload-specific security
    1. Skill 6.1: Secure application development and server workload infrastructure
      1. Determine usage scenarios, supported server workloads, and requirements for Nano Server deployments
      2. Install and configure Nano Server
      3. Implement security policies on Nano Servers using Desired State Configuration
      4. Determine usage scenarios and requirements for Windows Server and Hyper-V containers
      5. Install and configure Hyper-V containers
    2. Skill 6.2: Implement a Secure File Services infrastructure and Dynamic Access Control
      1. Install the File Server Resource Manager role service
      2. Configure quotas
      3. Configure file screens
      4. Configure Storage Reports
      5. Configure File Management Tasks
      6. Configure File Classification Infrastructure using FSRM
      7. Implement Work Folders
      8. Configure user and device claim types
      9. Create and configure resource properties and lists
      10. Create and configure central access rules and policies
      11. Implement policy changes and staging
      12. Configure file access auditing
      13. Perform access-denied remediation
      14. Chapter summary
    3. Thought experiment
    4. Thought experiment answers
  13. Index
  14. About the Authors
  15. About the Contributing Authors
  16. Code Snippetsr