Fr. 66.00

Windows Security Monitoring - Scenarios and Patterns

Anglais · Livre de poche

Expédition généralement dans un délai de 1 à 3 semaines (ne peut pas être livré de suite)

Description

En savoir plus

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
 
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system's event logging patterns for operations and changes performed within the system. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components. Scenario-based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory object modifications, local security policy changes, and other activities.
 
This book is based on the author's experience and the results of his research into Microsoft Windows security monitoring and anomaly detection. It presents the most common scenarios people should be aware of to check for any potentially suspicious activity.
 
Learn to:
* Implement the Security Logging and Monitoring policy
* Dig into the Windows security auditing subsystem
* Understand the most common monitoring event patterns related to operations and changes in the Microsoft Windows operating system
About the Author
 
Andrei Miroshnikov is a former security program manager with Microsoft. He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft's Bluehat security conference. In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents. Among his many professional qualifications, he has earned the (ISC)² CISSP and Microsoft MCSE: Security certifications.

Table des matières

Introduction xxix
 
Part I Introduction to Windows Security Monitoring 1
 
Chapter 1 Windows Security Logging and Monitoring Policy 3
 
Part II Windows Auditing Subsystem 11
 
Chapter 2 Auditing Subsystem Architecture 13
 
Chapter 3 Auditing Subcategories and Recommendations 47
 
Part III Security Monitoring Scenarios 81
 
Chapter 4 Account Logon 83
 
Chapter 5 Local User Accounts 141
 
Chapter 6 Local Security Groups 201
 
Chapter 7 Microsoft Active Directory 237
 
Chapter 8 Active Directory Objects 285
 
Chapter 9 Authentication Protocols 323
 
Chapter 10 Operating System Events 367
 
Chapter 11 Logon Rights and User Privileges 419
 
Chapter 12 Windows Applications 437
 
Chapter 13 Filesystem and Removable Storage 485
 
Chapter 14 Windows Registry 523
 
Chapter 15 Network File Shares and Named Pipes 559
 
Appendix A Kerberos AS_REQ, TGS_REQ, and AP_REQ Messages Ticket Options 585
 
Appendix B Kerberos AS_REQ, TGS_REQ, and AP_REQ Messages Result Codes 589
 
Appendix C SDDL Access Rights 597
 
Object-Specific Access Rights 598
 
Index 603

A propos de l'auteur










Andrei Miroshnikov is a former security program manager with Microsoft. He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft's Bluehat security conference. In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents. Among his many professional qualifications, he has earned the (ISC)2 CISSP and Microsoft MCSE: Security certifications.

Résumé

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system's event logging patterns for operations and changes performed within the system. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components. Scenario-based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory object modifications, local security policy changes, and other activities.

This book is based on the author's experience and the results of his research into Microsoft Windows security monitoring and anomaly detection. It presents the most common scenarios people should be aware of to check for any potentially suspicious activity.

Learn to:
* Implement the Security Logging and Monitoring policy
* Dig into the Windows security auditing subsystem
* Understand the most common monitoring event patterns related to operations and changes in the Microsoft Windows operating system
About the Author

Andrei Miroshnikov is a former security program manager with Microsoft. He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft's Bluehat security conference. In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents. Among his many professional qualifications, he has earned the (ISC)² CISSP and Microsoft MCSE: Security certifications.

Détails du produit

Auteurs a Miroshnikov, Andrei Miroshnikov
Edition Wiley, John and Sons Ltd
 
Langues Anglais
Format d'édition Livre de poche
Sortie 31.01.2018
 
EAN 9781119390640
ISBN 978-1-119-39064-0
Pages 656
Catégories Sciences naturelles, médecine, informatique, technique > Informatique, ordinateurs > Communication des données, réseaux

Computersicherheit, Informatik, windows, computer science, Networking / Security, Netzwerke / Sicherheit

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.