Chapter 11: Security Monitoring and Reporting

In this chapter, we will provide solutions for security monitoring and reporting within your environment. In previous chapters, we learned about what is needed to implement and enforce a secure environment for your users and Windows systems. Now that the baselines have been enforced and documented controls are in place, we need to ensure that monitoring and reporting programs are available to alert you of potential vulnerabilities or weaknesses within your environment. Next, we will review the different solutions used to capture telemetry and query data to provide insights and recommendations for keeping our environment secure.

First, we will review monitoring with Microsoft Defender Advanced Threat ...

Get Mastering Windows Security and Hardening now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.