Securing Windows Server 2016 (70-744)

(70-744) / ISBN : 978-1-64459-101-7
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

The MCSE certification is one of many Microsoft certifications that may be obtained by passing a set of exams designed to test proficiency on a combination of complementary Microsoft products. MCSE certifications address a wide spectrum of knowledge in the mitigation of malware, spyware, and other threats that can compromise the security and integrity of any organization's data.

1

Preface

  • The Microsoft Official Academic Course Program
2

Configuring Disk and File Encryption

  • Using Encryption to Protect Data
  • Deploying and Configuring BitLocker
  • Deploying and Configuring EFS
  • Managing EFS and BitLocker Certificates
  • Skill Summary
  • Business Case Scenarios
3

Implementing Server Patching and Updating Solutions

  • Managing Updates Using WSUS
  • Implementing Windows Server Update Services (WSUS) Solutions
  • Skill Summary
  • Business Case Scenarios
4

Implementing Malware Protection and Protecting Credentials

  • Implementing an Antimalware Solution with Windows Defender
  • Using AppLocker to Manage Applications
  • Implementing Windows Security Features
  • Implementing NT Lan Manager (NTLM) Blocking
  • Skill Summary
  • Business Case Scenarios
5

Creating Security Baselines

  • Creating Security Baselines with Microsoft Security Compliance Toolkit
  • Skill Summary
  • Business Case Scenarios
6

Securing Virtual Machines with Guarded Fabric and Shielding VMs

  • Implementing a Guarded Fabric Solution
  • Implementing Shielded and Encrypted-Supported VMs
  • Skill Summary
  • Business Case Scenarios
7

Configuring Windows Firewall and a Software-Defined Datacenter Firewall

  • Configuring Windows Firewall
  • Implementing a Software-Defined Distributed Firewall
  • Skill Summary
  • Business Case Scenarios
8

Securing Network Traffic

  • Configuring IPSec Policies
  • Securing SMB Protocol
  • Configuring Security for DNS
  • Installing and Configuring MMA to Analyze Network Traffic
  • Skill Summary
  • Business Case Scenarios
9

Implementing Privilege Access Management and Administrative Forests

  • Implementing Enhanced Security Administrative Environment (ESAE)
  • Implementing Just-In-Time (JIT) Administration
  • Skill Summary
  • Business Case Scenarios
10

Implementing Just-Enough-Administration (JEA)

  • Implementing Just-Enough-Administration (JEA)
  • Skill Summary
  • Business Case Scenarios
11

Implementing Privileged Access Workstations, Loc...ord Solution (LAPS), and User Rights Assignments

  • Understanding the Principle of Least Privilege
  • Running Programs as an Administrator
  • Implementing Privileged Access Workstations (PAWs)
  • Implementing Local Administrator Password Solutions (LAPS)
  • Skill Summary
  • Business Case Scenarios
12

Configuring Advanced Audit Policies

  • Configuring Advanced Audit Policies
  • Skill Summary
  • Business Case Scenarios
13

Installing and Configuring Microsoft Advanced Threat Analytics (ATA)

  • Implementing Microsoft Advanced Threat Analytics (ATA)
  • Skill Summary
  • Business Case Scenarios
14

Determining Threat Detection Solutions Using Operations Management Suite (OMS)

  • Determining Threat Detection Solutions Using OMS
  • Skill Summary
  • Business Case Scenarios
15

Securing Application Development and Server Workload Infrastructure

  • Implementing Windows PowerShell Desired State Configuration (DSC)
  • Installing and Configuring Windows Nano Server
  • Installing and Configuring Windows Containers
  • Skill Summary
  • Business Case Scenarios
16

Implementing a Secure File Services Infrastructure and Dynamic Access Control (DAC)

  • Using File Server Resource Manager
  • Supporting Work Folders
  • Using Dynamic Access Control
  • Configuring File Management Tasks
  • Skill Summary
  • Business Case Scenarios

1

Configuring Disk and File Encryption

  • Deploying BitLocker Without TPM
  • Installing the Network Unlock Feature
  • Installing BitLocker
  • Enabling BitLocker to Use Secure Boot
  • Enabling VM Security Options
  • Configuring Group Policy Settings for Network Unlock
  • Encrypting a Folder or File Using EFS
  • Adding Recovery Agents for EFS
2

Implementing Server Patching and Updating Solutions

  • Configuring Automatic Updates Using Group Policies
  • Installing a WSUS Server
  • Creating a GPO to Enable AutoUpdate for Client Computers
3

Implementing Malware Protection and Protecting Credentials

  • Scheduling a Windows Defender Scan
  • Configuring Windows Defender with GPOs
  • Configuring Windows Defender Scans Using Windows PowerShell
  • Creating Code Integrity Policy Rules
  • Enabling Credential Guard Using Regedit
  • Exporting the Local Policy
  • Creating an AppLocker Rule
  • Getting AppLocker File Information Using Windows PowerShell
  • Enabling a Virtual Machine Secure Boot and TPM
  • Enabling Device Guard
4

Creating Security Baselines

  • Backing Up GPOs
5

Securing Virtual Machines with Guarded Fabric and Shielding VMs

  • Installing the HGS Role
  • Creating a Generation 2 Virtual Machine
  • Enabling a Virtual Machine Secure Boot and Shielding
6

Configuring Windows Firewall and a Software-Defined Datacenter Firewall

  • Creating an Outbound Rule
  • Creating an Inbound Rule
  • Creating an Authentication Exemption Rule
  • Exporting a Firewall Policy
  • Creating a Firewall Rule Using PowerShell
  • Importing a Windows Firewall Rule into a Group Policy Object
  • Enabling the ICMP Traffic on the Sending Host
  • Creating the Required AD DS Security Groups
7

Securing Network Traffic

  • Creating a New GPO for Domain Isolation
  • Adding an IPsec Policy Rule
  • Enabling SMB Encryption
  • Configuring DNSSEC on an Active Directory Integrated Zone
8

Implementing Just-Enough-Administration (JEA)

  • Enabling PowerShell Module and Script Block Logging
  • Creating and Configuring a Session-Configuration File
9

Implementing Privileged Access Workstations, Loc...ord Solution (LAPS), and User Rights Assignments

  • Running Programs as an Administrator
  • Configuring User Rights Assignment
  • Enabling Restricted Admin and Windows Defender Remote Credential Guard Using Registry Editor
  • Turning on Windows Defender Remote Credential Guard by Using Group Policy
10

Configuring Advanced Audit Policies

  • Implementing an Audit Policy
  • Auditing Files and Folders
  • Enabling Dynamic Access Control Resources
  • Defining Global Object Access Auditing
  • Configuring the Monitoring of Removable Storage Devices
11

Securing Application Development and Server Workload Infrastructure

  • Installing and Configuring a Nano Server
  • Installing Windows Containers
12

Implementing a Secure File Services Infrastructure and Dynamic Access Control (DAC)

  • Installing File Server Resource Manager
  • Creating a Quota Template
  • Creating a File Screen
  • Creating File Groups
  • Creating a File Screen Template
  • Installing Work Folders
  • Enabling DAC for AD DS
  • Configuring Access-Denied Remediation

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Securing Windows Server 2016 (70-744)

$279.99

Buy Now

Related Courses

All Course
scroll to top