Chapter 13. Microsoft Windows Incident Handling and Management
DESPITE THE BEST EFFORTS to secure a computing environment, no organization is completely safe. Sooner or later you will encounter a security policy violation. It may be a minor violation such as a user attempting to log on too many times after forgetting a password. Or, it could be a major incident such as an attacker destroying your organization's primary database. Either way, learn how to react. When you discover a security violation, you have only one proper response—to follow your plan.
Map out your response to security violations before any occur. In this chapter, you'll find out how to plan for the inevitable actions that result in security violations. You'll learn how to recognize ...
Get Security Strategies in Windows Platforms and Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.