Microsoft System Center Endpoint Protection Cookbook - Second Edition
eBook - ePub

Microsoft System Center Endpoint Protection Cookbook - Second Edition

Nicolai Henriksen

Partager le livre
  1. 216 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

Microsoft System Center Endpoint Protection Cookbook - Second Edition

Nicolai Henriksen

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

Over 31 simple yet incredibly effective recipes for installing and managing System Center 2016 Endpoint ProtectionAbout This Book‱ This is the most practical and up-to-date book covering important new features of System Center 2016 Endpoint protection‱ Gain confidence in managing IT and protecting your server against malware and other threats‱ Configure and automate reporting features and also prepare yourself for a simple and pain-free migration processWho This Book Is ForIf you are a System Administrator or Engineer using System Center 2016 Endpoint Protection, then this book is for you. You should have a good background with Microsoft products in general, although no knowledge of Endpoint Protection is required.What You Will Learn‱ Explore the best practices for Endpoint Protection in System Center Configuration Manager‱ Provision the Endpoint Protection Client in a Disk Image in Configuration Manager‱ Get to know more about the Security Center‱ Configure definition and engine client updates to be optimum for your bandwidth‱ Make your application or server work with Endpoint Protection enabled‱ Find out how to deal with typical issues that may occur with Endpoint Protection‱ Know how to respond to infections that often occurIn DetailSystem Center Configuration Manager is now used by over 70% of all the business in the world today and many have taken advantage engaging the System Center Endpoint Protection within that great product. Through this book, you will gain knowledge about System Center Endpoint Protection, and see how to work with it from System Center Configuration Manager from an objective perspective.We'll show you several tips, tricks, and recipes to not only help you understand and resolve your daily challenges, but hopefully enhance the security level of your business.Different scenarios will be covered, such as planning and setting up Endpoint Protection, daily operations and maintenance tips, configuring Endpoint Protection for different servers and applications, as well as workstation computers. You'll also see how to deal with malware and infected systems that are discovered. You'll find out how perform OS deployment, Bitlocker, and Applocker, and discover what to do if there is an attack or outbreak.You'll find out how to ensure good control and reporting, and great defense against threats and malware software. You'll see the huge benefits when dealing with application deployments, and get to grips with OS deployments, software updates, and disk encryption such as Bitlocker. By the end, you will be fully aware of the benefits of the System Center 2016 Endpoint Protection anti-malware product, ready to ensure your business is watertight against any threat you could face.Style and approachBuild robust SCEP and AV policies and discover the new potential of exciting new features of SCEP 2016.

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Microsoft System Center Endpoint Protection Cookbook - Second Edition est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Microsoft System Center Endpoint Protection Cookbook - Second Edition par Nicolai Henriksen en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Informatik et Systemverwaltung. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Année
2016
ISBN
9781786467676
Édition
2

Microsoft System Center Endpoint Protection Cookbook Second Edition


Table of Contents

Microsoft System Center Endpoint Protection Cookbook Second Edition
Credits
About the Author
Acknowledgment
About the Reviewer
www.PacktPub.com
eBooks, discount offers, and more
Why subscribe?
Instant updates on new Packt books
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it

How it works

There's more

See also
Conventions
Reader feedback
Customer support
Downloading the color images of this book
Errata
Piracy
Questions
1. Planning and Getting Started with System Center Endpoint Protection
Introduction
How does Endpoint Protection in Configuration Manager work
How to do it

What made Endpoint Protection that good
Planning for the Endpoint Protection
How to do it

Prerequisites of the infrastructure
Getting ready
How to do it

How it works

Best practices for Endpoint Protection in Configuration Manager
How to do it...
Administrating workflow for Endpoint Protection in Configuration Manager
Getting ready
How to do it

2. Configuring Endpoint Protection in Configuration Manager
Introduction
Configuring Endpoint Protection in Configuration Manager
Getting ready
How to do it

How it works

Configuring alerts for Endpoint Protection in Configuration Manager
Getting ready
How to do it

How it works

Configuring definition updates for Endpoint Protection in Configuration Manager
Getting ready
How to do it...
How it works

See also
Provisioning the Endpoint Protection client in a disk image in Configuration Manager
Getting ready
How to do it

3. Operations and Maintenance for Endpoint Protection in Configuration Manager
Introduction
Creating and deploying antimalware policies for Endpoint Protection in Configuration Manager
How to do it

Order and combination of policies to be merged
Exclusions
Creating and deploying Windows Firewall policies for Endpoint Protection in Configuration Manager
How to do it

Monitoring Endpoint Protection in Configuration Manager
How to do it

4. Updates
Introduction
Understanding Endpoint Protection updates
How to do it

Working with updates from WSUS
Getting ready
How to do it

Working with updates from SCCM
How to do it

What you need to consider and optimize when working with low bandwidth locations
How to do it

Why and how to use offline updates
How to do it

5. Security and Privacy for Endpoint Protection in Configuration Manager
Introduction
Security and privacy for Endpoint Protection in Configuration Manager
How to do it

The Microsoft Security Center
How to do it

Keeping third-party applications up-to-date
How to do it

Configuring automatic sample submission
How to do it

6. Configuring and Troubleshooting Performance and Advanced Protection
Introduction
What you need to consider when running antimalware on your computer
How to do it

Configuring Endpoint Protection or Defender for Windows 10
How to do it

Integrating Endpoint Protection with OS Deployment
How to do it

What you need to consider regarding BitLocker and Endpoint Protection
How to do it

7. Troubleshooting and Fixing Issues
Introduction
Dealing with Endpoint Protection issues
Getting ready
How to do it

Solving Endpoint Protection Policy issues
Getting ready
How to do it

Registry.pol files
Understanding update issues
How to do it

8. Malware Handling
Introduction
How to handle malware
How to do it

See also
Responding to infections that often occur
Getting ready
How to do it...
See also
Monitoring infectious outbreaks
How to do it

Protecting the Windows File Server from known Cryptolocker malware
Index

Microsoft System Center Endpoint Protection Cookbook Second Edition

Copyright © 2016 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the Nicolai Henriksen nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: October 2012
Second edition: December 2016
Production reference: 1151216
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78646-428-6
www.packtpub.com

Credits

Author
Nicolai Henriksen
Reviewer
Ronni Pedersen
Commissioning Editor
Kartikey Pandey
Acquisition Editor
Prachi Bisht
Content Development Editor
Abhishek Jadhav
Technical Editor
Aditya Khadye
Copy Editors
Safis Editing
Dipti Mankame
Project Coordinator
Judie Jose
Proofreader
Safis Editing
Indexer
Pratik Shirodkar
Graphics
Kirk D'Penha
Production Coordinator
Shantanu N. Zagade
Cover Work
Shantanu N. Zagade

About the Author

Nicolai Henriksen works as a chief technical architect consultant presently and lives in Bergen, Norway, with his wife and three children.
He has worked in the information technology consulting business for almost two decades, working and implementing systems in all kinds of various businesses from small to enterprises, mostly with products within the Microsoft family. But he has gained great experience and knowledge about many vendors and products.
Nicolai's educational background started with electronic engineering, and he worked for a while as a technician. That has also been his great interest, besides computers.
He started exploring computers in 1980 ...

Table des matiĂšres