O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Microsoft System Center Endpoint Protection Cookbook - Second Edition

Book Description

Over 31 simple yet incredibly effective recipes for installing and managing System Center 2016 Endpoint Protection

About This Book

  • This is the most practical and up-to-date book covering important new features of System Center 2016 Endpoint protection
  • Gain confidence in managing IT and protecting your server against malware and other threats
  • Configure and automate reporting features and also prepare yourself for a simple and pain-free migration process

Who This Book Is For

If you are a System Administrator or Engineer using System Center 2016 Endpoint Protection, then this book is for you. You should have a good background with Microsoft products in general, although no knowledge of Endpoint Protection is required.

What You Will Learn

  • Explore the best practices for Endpoint Protection in System Center Configuration Manager
  • Provision the Endpoint Protection Client in a Disk Image in Configuration Manager
  • Get to know more about the Security Center
  • Configure definition and engine client updates to be optimum for your bandwidth
  • Make your application or server work with Endpoint Protection enabled
  • Find out how to deal with typical issues that may occur with Endpoint Protection
  • Know how to respond to infections that often occur

In Detail

System Center Configuration Manager is now used by over 70% of all the business in the world today and many have taken advantage engaging the System Center Endpoint Protection within that great product.

Through this book, you will gain knowledge about System Center Endpoint Protection, and see how to work with it from System Center Configuration Manager from an objective perspective.

We’ll show you several tips, tricks, and recipes to not only help you understand and resolve your daily challenges, but hopefully enhance the security level of your business.

Different scenarios will be covered, such as planning and setting up Endpoint Protection, daily operations and maintenance tips, configuring Endpoint Protection for different servers and applications, as well as workstation computers. You’ll also see how to deal with malware and infected systems that are discovered. You’ll find out how perform OS deployment, Bitlocker, and Applocker, and discover what to do if there is an attack or outbreak.

You’ll find out how to ensure good control and reporting, and great defense against threats and malware software. You’ll see the huge benefits when dealing with application deployments, and get to grips with OS deployments, software updates, and disk encryption such as Bitlocker. By the end, you will be fully aware of the benefits of the System Center 2016 Endpoint Protection anti-malware product, ready to ensure your business is watertight against any threat you could face.

Style and approach

Build robust SCEP and AV policies and discover the new potential of exciting new features of SCEP 2016.

Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.

Table of Contents

  1. Microsoft System Center Endpoint Protection Cookbook Second Edition
    1. Table of Contents
    2. Microsoft System Center Endpoint Protection Cookbook Second Edition
    3. Credits
    4. About the Author
    5. Acknowledgment
    6. About the Reviewer
    7. www.PacktPub.com
      1. eBooks, discount offers, and more
        1. Why subscribe?
        2. Instant updates on new Packt books
    8. Preface
      1. What this book covers
      2. What you need for this book
      3. Who this book is for
      4. Sections
        1. Getting ready
        2. How to do it…
        3. How it works…
        4. There's more…
        5. See also
      5. Conventions
      6. Reader feedback
      7. Customer support
        1. Downloading the color images of this book
        2. Errata
        3. Piracy
        4. Questions
    9. 1. Planning and Getting Started with System Center Endpoint Protection
      1. Introduction
      2. How does Endpoint Protection in Configuration Manager work
        1. How to do it…
          1. What made Endpoint Protection that good
      3. Planning for the Endpoint Protection
        1. How to do it…
      4. Prerequisites of the infrastructure
        1. Getting ready
        2. How to do it…
        3. How it works…
      5. Best practices for Endpoint Protection in Configuration Manager
        1. How to do it...
      6. Administrating workflow for Endpoint Protection in Configuration Manager
        1. Getting ready
        2. How to do it…
    10. 2. Configuring Endpoint Protection in Configuration Manager
      1. Introduction
      2. Configuring Endpoint Protection in Configuration Manager
        1. Getting ready
        2. How to do it…
        3. How it works…
      3. Configuring alerts for Endpoint Protection in Configuration Manager
        1. Getting ready
        2. How to do it…
        3. How it works…
      4. Configuring definition updates for Endpoint Protection in Configuration Manager
        1. Getting ready
        2. How to do it...
        3. How it works…
        4. See also
      5. Provisioning the Endpoint Protection client in a disk image in Configuration Manager
        1. Getting ready
        2. How to do it…
    11. 3. Operations and Maintenance for Endpoint Protection in Configuration Manager
      1. Introduction
      2. Creating and deploying antimalware policies for Endpoint Protection in Configuration Manager
        1. How to do it…
          1. Order and combination of policies to be merged
          2. Exclusions
      3. Creating and deploying Windows Firewall policies for Endpoint Protection in Configuration Manager
        1. How to do it…
      4. Monitoring Endpoint Protection in Configuration Manager
        1. How to do it…
    12. 4. Updates
      1. Introduction
      2. Understanding Endpoint Protection updates
        1. How to do it…
      3. Working with updates from WSUS
        1. Getting ready
        2. How to do it…
      4. Working with updates from SCCM
        1. How to do it…
      5. What you need to consider and optimize when working with low bandwidth locations
        1. How to do it…
      6. Why and how to use offline updates
        1. How to do it…
    13. 5. Security and Privacy for Endpoint Protection in Configuration Manager
      1. Introduction
      2. Security and privacy for Endpoint Protection in Configuration Manager
        1. How to do it…
      3. The Microsoft Security Center
        1. How to do it…
      4. Keeping third-party applications up-to-date
        1. How to do it…
      5. Configuring automatic sample submission
        1. How to do it…
    14. 6. Configuring and Troubleshooting Performance and Advanced Protection
      1. Introduction
      2. What you need to consider when running antimalware on your computer
        1. How to do it…
      3. Configuring Endpoint Protection or Defender for Windows 10
        1. How to do it…
      4. Integrating Endpoint Protection with OS Deployment
        1. How to do it…
      5. What you need to consider regarding BitLocker and Endpoint Protection
        1. How to do it…
    15. 7. Troubleshooting and Fixing Issues
      1. Introduction
      2. Dealing with Endpoint Protection issues
        1. Getting ready
        2. How to do it…
      3. Solving Endpoint Protection Policy issues
        1. Getting ready
        2. How to do it…
          1. Registry.pol files
      4. Understanding update issues
        1. How to do it…
    16. 8. Malware Handling
      1. Introduction
      2. How to handle malware
        1. How to do it…
        2. See also
      3. Responding to infections that often occur
        1. Getting ready
        2. How to do it...
        3. See also
      4. Monitoring infectious outbreaks
        1. How to do it…
          1. Protecting the Windows File Server from known Cryptolocker malware
    17. Index