O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Microsoft 70-744: Securing Windows Server 2016

Video Description

This training series focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. In addition, the series covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). The series also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads. This series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams. Prior to this, you must complete the 70-740, 70-741, and 70-742 series and take the MCSA: Windows Server 2016 exams.

Table of Contents

  1. Course Introduction
    1. Introduction
    2. Course Introduction
    3. Instructor Introduction
  2. Chapter 01 - Introduction to Attacks, Breaches, and Detection
    1. Chapter 01 - Introduction
    2. Topic A: Understanding Types of Attacks
    3. Assume Breach
    4. Methods of Attack
    5. Attack Stages
    6. Prioritizing Resources
    7. Incident Response Strategy
    8. Ensuring Compliance
    9. Topic B: Detecting Security Breaches
    10. Locating Evidence
    11. Event Logs
    12. Examining Other Configurations
    13. Topic C: Using Sysinternals Tools
    14. Introducing Sysinternals
    15. Demo - Examining Sysinternals Tools
    16. System Monitor
    17. AccessChk
    18. Autoruns
    19. LogonSessions
    20. Process Explorer
    21. Process Monitor
    22. Sigcheck
    23. Demo - Using Sysinternals Tools
    24. Chapter 01 Summary
    25. Chapter 01 Review
  3. Chapter 02 - Protecting Users and Workstations
    1. Chapter 02 - Introduction
    2. Topic A: User Rights and Privileges
    3. Principle of Least Privilege
    4. Configuring User Rights
    5. Configuring Account Security Options
    6. Demo - User Rights and Account Security Options
    7. Account Security Controls
    8. Complexity Options
    9. Password and Lockout Policies
    10. Demo - Configuring Account Policies in Group Policy
    11. Configuring Fine-Grained Password Policies
    12. Understanding PSO Application
    13. Protected Users Security Groups
    14. Delegating Administrative Control
    15. Demo - Delegating Control in AD DS
    16. Local Administrator Password Solutions (LAPS)
    17. LAPS Requirements
    18. LAPS Process
    19. Configuring and Managing Passwords
    20. Demo - Using LAPS
    21. Topic B: Working with Computer and Service Accounts
    22. What is a Computer Account?
    23. Computer Account Functionality
    24. Working with Secure Channel Passwords
    25. Service Account Types
    26. Group MSAs
    27. Demo - Configuring Group MSAs
    28. Topic C: Protecting User Credentials
    29. Introducing Credential Guard
    30. Credential Guard Requirements
    31. Configuring Credential Guard
    32. Verifying Credential Guard Operation
    33. Credential Guard Weaknesses
    34. NTLM Blocking
    35. Searching AD DS for Problem Accounts
    36. Demo - Locating Problem Accounts
    37. Topic D: Using Privileged Access Workstations
    38. The Need for Privileged Access Workstations
    39. Privileged Access Workstations
    40. Jump Servers
    41. Securing Domain Controllers
    42. Chapter 02 Summary
    43. Chapter 02 Review
  4. Chapter 03 - Managing Administrative Access
    1. Chapter 03 - Introduction
    2. Topic A: Understanding and Deploying JEA
    3. Introduction to JEA
    4. JEA Components
    5. Session Configuration Files
    6. Demo - Creating a Session Configuration File
    7. Role Capability Files
    8. Demo - Create a Role Capability File
    9. JEA Endpoints
    10. Demo - Creating a JEA Endpoint
    11. Connecting to JEA Endpoints
    12. Deploying JEA Endpoints
    13. Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
    14. ESAE Forests
    15. Administrative Tiers
    16. ESAE Best Practices
    17. The Clean Source Principle
    18. Implementing the Clean Source Principle
    19. Topic C: Using Microsoft Identity Manager
    20. Overview of MIM
    21. MIM Requirements
    22. MIM Service Accounts
    23. Topic D: Using JIT Administration and PAM
    24. Overview of JIT Administration
    25. Privileged Access Management (PAM)
    26. PAM Components
    27. Creating an Administrative Forest
    28. Configuring Trust Relationships
    29. Shadow Principals
    30. Configuring the MIM Web Portal
    31. Managing and Configuring PAM Roles
    32. Chapter 03 Summary
    33. Chapter 03 Review
  5. Chapter 04 - Configuring Anti-Malware and Patch Management
    1. Chapter 04 Introduction
    2. Topic A: Configuring and Managing Windows Defender
    3. Understanding Malware
    4. Malware Sources
    5. Mitigation Methods
    6. Windows Defender
    7. Demo - Using Windows Defender
    8. Topic B: Restricting Software
    9. Controlling Applications
    10. Software Restriction Policies
    11. Security Levels
    12. AppLocker
    13. Support for AppLocker
    14. AppLocker Rules
    15. Creating Default Rules
    16. Demo - Using AppLocker
    17. Topic C: Using Device Guard
    18. Overview of Device Guard
    19. Device Guard Features
    20. Configuring Device Guard
    21. Device Guard Policies
    22. Deploying Code Integrity Policies
    23. Control Flow Guard
    24. Topic D: Patch Management with WSUS
    25. Overview of WSUS
    26. Deployment Options
    27. Server Requirements
    28. Configuring Clients
    29. Administering WSUS
    30. Approving Updates
    31. Demo - Installing and Configuring WSUS
    32. Chapter 04 Summary
    33. Chapter 04 Review
  6. Chapter 05 - Auditing and Advanced Threat Analytics
    1. Chapter 05 - Introduction
    2. Topic A: Configuring Auditing for Windows Server 2016
    3. Overview of Auditing
    4. The Purpose of Auditing
    5. Types of Events
    6. Auditing Goals
    7. Auditing File and Object Access
    8. Demo - Configuring Auditing
    9. Topic B: Advanced Auditing and Management
    10. Advanced Auditing
    11. Advanced Auditing Subcategories
    12. Dynamic Auditing
    13. Event Log Subscriptions
    14. Audit Collection Services (ACS)
    15. Demo - Configuring Event Forwarding
    16. Auditing with Windows PowerShell
    17. Demo - Using PowerShell with Audit Logs
    18. Transaction Logging
    19. Module Logging
    20. Script Block Logging
    21. Demo - Configuring PowerShell Logging
    22. Topic C: Deploying and Configuring ATA
    23. Overview of ATA
    24. Usage Scenarios
    25. Deployment Requirements
    26. ATA Gateways
    27. Port Mirroring
    28. Configuring ATA Center
    29. Topic D: Deploying and Configuring Operations Management Suite
    30. Introduction to Operations Management Suite
    31. Deployment Overview
    32. OMS Solutions
    33. Installing OMS
    34. OMS Solutions
    35. Chapter 05 Summary
    36. Chapter 05 Review
  7. Chapter 06 - Securing the Infrastructure
    1. Chapter 06 - Introduction
    2. Topic A: Secure the Virtualization Infrastructure
    3. Introduction to Guarded Fabric
    4. Host Guardian Service
    5. Preparing HGS Nodes
    6. Installing and Configuring HGS
    7. Attestation and Encryption
    8. Attestation Methods
    9. Initializing HGS
    10. Configuring HSG Clients
    11. Topic B: Deploying Security Baselines
    12. Security Compliance Manager (SCM)
    13. SCM Requirements
    14. Demo - Installing SCM
    15. Demo - Installing SCM
    16. Topic C: Deploying Nano Server
    17. Planning for Nano Server
    18. Understanding Nano Server Roles
    19. Installing Nano Server Roles
    20. Nano Server Installation
    21. Installation Steps
    22. Chapter 06 Summary
    23. Chapter 06 Review
  8. Chapter 07 - Configuring Data Protection
    1. Chapter 07 Introduction
    2. Topic A: Planning and Implementing File Encryption
    3. Introducing Encrypting File System
    4. EFS Features
    5. Encryption and Decryption
    6. Recovering EFS Files
    7. Demo - Using EFS
    8. Topic B: Planning and Implementing BitLocker
    9. Overview of BitLocker
    10. BitLocker and TPMs
    11. BitLocker Requirements
    12. Tools for Configuring and Managing BitLocker
    13. Deploying BitLocker
    14. Demo - Deploying BitLocker
    15. BitLocker on Hyper-V VMs
    16. BitLocker and CSVs
    17. Enabling BitLocker for CSV
    18. Network Unlock
    19. Network Unlock Process
    20. BitLocker Recovery
    21. Microsoft BitLocker Administration and Monitoring (MBAM)
    22. Chapter 07 Summary
    23. Chapter 07 Review
  9. Chapter 08 - Advanced File Server Management
    1. Chapter 08 Introduction
    2. Topic A: Using File Server Resource Manager
    3. Capacity Management
    4. Storage Management
    5. Introduction to FSRM
    6. Storage Management with File Server Resource Manager
    7. Overview of FSRM
    8. Installing and Configuring FSRM
    9. Demo - Installing and Configuring FSRM
    10. Quota Management
    11. Demo - Create and Manage Quotas
    12. File Screening
    13. Using File Groups
    14. Exceptions and Templates
    15. Demo - Implementing File Screening
    16. Storage Reports
    17. Report Tasks
    18. Demo - Generating Storage Reports
    19. Automatic File Management
    20. Topic B: Implementing Classification and File Management Tasks
    21. File Classification
    22. Classification Rules
    23. Demo - Configure File Classification
    24. File Management Tasks
    25. Topic C: Working with Dynamic Access Control
    26. Overview of Dynamic Access Control
    27. Dynamic Access Control Scenarios
    28. DAC Technologies
    29. Understanding Identity
    30. Understanding Claims
    31. Types of Claims
    32. Central Access Policies
    33. Policy Components
    34. DAC Prerequisites
    35. Demo - Implementing DAC
    36. Chapter 08 Summary
    37. Chapter 08 Review
  10. Chapter 09 - Securing the Network Infrastructure
    1. Chapter 09 Introduction
    2. Topic A: Using the Windows Firewall with Advanced Security
    3. Types of Firewalls
    4. Well-Known Ports
    5. Host-Based Firewall
    6. Network Profiles
    7. Configuring the Windows Firewall
    8. Demo - Working with the Windows Firewall
    9. Topic B: Datacenter Firewall
    10. Network Controller
    11. Datacenter Firewall
    12. Network Security Groups
    13. Scenarios for Datacenter Firewall
    14. Topic C: Utilizing IP Security
    15. Overview of IP Security
    16. IPSec Protocols
    17. IPSec Usage Scenarios
    18. IPSec Configuration Tools
    19. Connection Security Rules
    20. Understanding Rule Types
    21. Rule Endpoints
    22. Authentication Settings
    23. Authentication Methods
    24. Encryption Settings
    25. Monitoring Connections
    26. Demo - Implementing IPSec
    27. Topic D: Configuring Advanced DNS Settings
    28. Managing DNS Services
    29. Optimizing DNS Name Resolution
    30. The GlobalNames Zone
    31. Implementing DNS Security
    32. DNS Security (DNSSEC)
    33. Implementing DNSSEC
    34. Demo - Configuring DNSSEC
    35. Introducing DNS Policies
    36. Implementing DNS Policies
    37. RRL Feature
    38. Demo - Configuring DNS Policies
    39. Topic E: Monitoring Network Traffic
    40. Microsoft Message Analyzer
    41. Demo - Using Microsoft Message Analyzer
    42. Topic F: Securing SMB Traffic
    43. SMB 3.1.1 Protocol Security
    44. SMB Encryption Requirements
    45. Encrypting SMB Shares
    46. Disabling Support for SMB 1.0
    47. Chapter 09 Review Summary
    48. Course Closure