Chapter 7: Deploying Windows Securely

Over the years, methods for deploying Windows have remained consistent, with little change to the overall approach. Before the advancement of unified endpoint management tools and Infrastructure as a Service (IaaS), companies were challenged with efficiently deploying devices with a consistent set of configurations to their users.

Historically, companies may have relied on Original Equipment Manufacturer (OEM) images, applied Group Policy, or built provisioning scripts to layer configurations onto devices. For many, the standard is to use imaging tools that allow companies to build and capture pre-configured images that could be pushed out to new devices or provisioned by a third-party partner or local IT ...

Get Mastering Windows Security and Hardening - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.