Free ebooks from Microsoft Press
Quick access to online references
Errata, updates, & book support
Chapter 1 Implement server hardening solutions
Skill 1.1: Configure disk and file encryption
Determine hardware and firmware requirements for Secure Boot and encryption key functionality
Deploy BitLocker Drive Encryption
Implement the BitLocker Recovery Process
Skill 1.2: Implement server patching and updating solutions
Create computer groups and configure Automatic Updates
Troubleshoot WSUS configuration and deployment
Skill 1.3: Implement malware protection
Implement an antimalware solution with Windows Defender
Integrate Windows Defender with WSUS and Windows Update
Implement Device Guard policies
Skill 1.4: Protect credentials
Determine requirements for Credential Guard
Skill 1.5: Create security baselines
Install and Configure Security Compliance Manager
Create and import security baselines
Deploy configurations to domain and non-domain-joined servers
Chapter 2 Secure a Virtualization Infrastructure
Skill 2.1: Implement a Guarded Fabric solution
Install and configure the Host Guardian Service
Configure admin and TPM-trusted attestation
Configure Key Protection Service Using HGS
Migrate shielded VMs to other guarded hosts
Skill 2.2: Implement shielded and encryption-supported VMs
Determine requirements and scenarios for implementing shielded VMs
Create a shielded VM using Hyper-V
Determine requirements and scenarios for implementing encryption-supported VMs
Chapter 3 Secure a network infrastructure
Skill 3.1: Configure Windows Firewall
Configure Windows Firewall with Advanced Security
Configure network location profiles and deploy profile rules using Group Policy
Configure connection security rules using Group Policy, the GUI console, or Windows PowerShell
Configure Windows Firewall to allow or deny applications
Configure authenticated firewall exceptions
Skill 3.2: Implement a software-defined Distributed Firewall
Determine usage scenarios for Distributed Firewall policies and network security groups
Skill 3.3: Secure network traffic
Determine SMB 3.1.1 protocol security scenarios and implementations
Enable SMB encryption on SMB shares
Configure SMB signing and disable SMB 1.0
Secure DNS traffic using DNSSEC and DNS policies
Install and configure Microsoft Message Analzyer to analyze network traffic
Chapter 4 Manage Privileged Identities
Skill 4.2: Implement Just-in-Time administration
Configure trusts between production and bastion forests
Create shadow principals in bastion forest
Request privileged access using the MIM web portal
Determine requirements and usage scenarios for Privileged Access Management solutions
Create and implement MIM policies
Implement just-in-time administration principals using time-based policies
Request privileged access using Windows PowerShell
Skill 4.3: Implement Just-Enough-Administration
Enable a JEA solution on Windows Server 2016
Create and configure session configuration files
Create and configure role capability files
Connect to a JEA endpoint on a server for administration
Download WMF 5.1 to a Windows Server 2008 R2
Configure a JEA endpoint on a server using Desired State Configuration
Skill 4.4: Implement Privileged Access Workstations and User Rights Assignments
Configure User Rights Assignment group policies
Configure security options settings in group policy
Enable and configure Remote Credential Guard for remote desktop access
Skill 4.5: Implement Local Administrator Password Solution
Install and configure the LAPS tool
Secure local administrator passwords using LAPS
Manage password parameters and properties using LAPS
Chapter 5 Implement threat detection solutions
Skill 5.1: Configure advanced audit policies
Implement auditing using Group Policy and Auditpol.exe
Implement auditing using Windows PowerShell
Create expression-based audit policies
Configure the audit PNP activity policy
Configure the Audit Group Membership policy
Enable and configure module, script block, and transcription logging in Windows PowerShell
Skill 5.2: Install and configure Microsoft Advanced Threat Analytics
Determine usage scenarios for ATA
Determine deployment requirements for ATA
Install and Configure ATA Gateway on a Dedicated Server
Install and Configure ATA Lightweight Gateway Directly on a Domain Controller
Configure alerts in ATA Center when suspicious activity is detected
Review and edit suspicious activities on the Attack Time Line
Skill 5.3: Determine threat detection solutions using Operations Management Suite
Determine Usage and Deployment Scenarios for OMS
Determine security and auditing functions available for use
Determine log analytics usage scenarios
Chapter 6 Implement workload-specific security
Skill 6.1: Secure application development and server workload infrastructure
Determine usage scenarios, supported server workloads, and requirements for Nano Server deployments
Install and configure Nano Server
Implement security policies on Nano Servers using Desired State Configuration
Determine usage scenarios and requirements for Windows Server and Hyper-V containers
Install and configure Hyper-V containers
Skill 6.2: Implement a Secure File Services infrastructure and Dynamic Access Control
Install the File Server Resource Manager role service
Configure File Management Tasks
Configure File Classification Infrastructure using FSRM
Configure user and device claim types
Create and configure resource properties and lists
Create and configure central access rules and policies
Implement policy changes and staging
Configure file access auditing
Perform access-denied remediation
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our books and learning resources for you. To participate in a brief online survey, please visit: