舉報

會員
Least Privilege Security for Windows 7, Vista and XP
最新章節:
Index
Thispracticalhandbookhasdetailedstep-by-stepinstructionsforimplementingLeastPrivilegeSecurityandrelatedmanagementtechnologies.IthassolutionstothemostcommontechnicalchallengesandMicrosoftbestpracticeadvice.ItalsocoverstechniquesformanagingLeastPrivilegeonthedesktop.ThisbookisforSystemAdministratorsordesktopsupportstaffwhowanttoimplementLeastPrivilegeSecurityonWindowssystems.
目錄(103章)
倒序
- 封面
- 版權頁
- Credits
- About the Author
- About the Reviewers
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. An Overview of Least Privilege Security in Microsoft Windows
- What is privilege?
- What is Least Privilege Security?
- Least Privilege Security in Windows
- Advanced Least Privilege Security concepts
- Least Privilege Security in the real world
- Benefits of Least Privilege Security on the desktop
- What problems does Least Privilege Security not solve?
- Common challenges of Least Privilege Security on the desktop
- Least Privilege and your organization's bottom line
- Summary
- Chapter 2. Political and Cultural Challenges for Least Privilege Security
- Company culture
- Getting support from management
- User acceptance
- Applying Least Privilege Security throughout the enterprise
- Managing expectations
- Maintaining flexibility
- User education
- Summary
- Chapter 3. Solving Least Privilege Problems with the Application Compatibility Toolkit
- Quick compatibility fixes using the Program Compatibility Wizard
- Achieving application compatibility in enterprise environments
- Summary
- Chapter 4. User Account Control
- User Account Control components
- The shield icon
- User Account Control access token model
- Conveniently elevating to admin privileges
- Summary
- Chapter 5. Tools and Techniques for Solving Least Privilege Security Problems
- Granting temporary administrative privileges
- Bypassing user account control for selected operations
- Configuring applications to run with elevated privileges on-the-fly
- Solving LUA problems with Avecto Privilege Guard
- Suppressing unwanted User Account Control prompts
- Setting permissions on files and registry keys
- Fixing problems with the HKey Classes Root registry hive
- Mapping .ini files to the registry
- Using LUA Buglight to identify file and registry access violations
- Summary
- Chapter 6. Software Distribution using Group Policy
- Installing software using Group Policy
- Summary
- Chapter 7. Managing Internet Explorer Add-ons
- ActiveX controls
- Managing add-ons
- Summary
- Chapter 8. Supporting Users Running with Least Privilege
- Providing support
- Troubleshooting using remote access
- Enabling and using command-line remote access tools
- Enabling and using graphical remote access tools
- Configuring Windows Firewall to allow remote access
- Summary
- Chapter 9. Deploying Software Restriction Policies and AppLocker
- Controlling applications
- Implementing Software Restriction Policy
- AppLocker
- Summary
- Chapter 10. Least Privilege in Windows XP
- Installing Windows XP using the Microsoft Deployment Toolkit
- Windows XP security model
- CD burning
- ActiveX controls
- Changing the system time and time zone
- Power management
- Managing network configuration
- Identifying LUA problems using Standard User Analyzer
- Summary
- Chapter 11. Preparing Vista and Windows 7 for Least Privilege Security
- The Application Compatibility Toolkit
- Creating a Data Collection Package
- Printers and Least Privilege Security
- Logon scripts
- Why do a desktop refresh from a technical perspective?
- Different methods of reinstalling Windows
- Reinstall Vista or Windows 7 with Least Privilege Security
- Summary
- Chapter 12. Provisioning Applications on Secure Desktops with Remote Desktop Services
- Introducing Remote Desktop Services
- Summary
- Chapter 13. Balancing Flexibility and Security with Application Virtualization
- Microsoft Application Virtualization 4.5 SP1 for Windows desktops
- VMware ThinApp
- Summary
- Chapter 14. Deploying XP Mode VMs with MED-V
- Solving least privilege security problems using virtual machines
- Microsoft Enterprise Desktop Virtualization (MED-V)
- Summary
- Index 更新時間:2021-08-05 16:18:38
推薦閱讀
- Adobe創意大學After Effects CS5 影視特效師標準實訓教材
- 中文版Photoshop CS6平面設計實用教程(第2版)
- Blender 3D Architecture, Buildings, and Scenery
- Photoshop+CorelDRAW平面設計實例教程(第4版)
- 印象筆記留給你的空間2.0:個人知識管理實踐指南
- Elasticsearch數據搜索與分析實戰
- 中望3D從入門到精通
- Adobe創意大學Premiere Pro產品專家認證標準教材(CS6修訂版)
- Transformer自然語言處理實戰:使用Hugging Face Transformers庫構建NLP應用
- AutoCAD 2019中文版實戰從入門到精通
- Mobile Web Development
- 中文版Photoshop CS5基礎培訓教程(移動學習版)
- VRP12虛擬現實編輯器標準教程
- Adobe Audition CS6音頻編輯入門與應用
- Photoshop CS5平面設計教程
- UG NX 2007中文版完全自學一本通
- Excel 2016從新手到高手
- AutoCAD機械繪圖(修訂版)
- Microsoft Exchange 2010 PowerShell Cookbook
- UG NX6完全自學手冊
- 中文版CorelDRAW X7實用教程
- Flex企業應用開發實戰
- Photoshop CC 視覺設計案例教程
- PADS Layout 2007印制電路板設計與實例
- Building Websites with e107
- Photoshop人像攝影后期處理專業技法
- Google Web Toolkit GWT Java AJAX Programming
- Photoshop CS6平面設計教程
- 中文版Photoshop CC 2020完全自學一本通
- 中文版3ds Max 2014/VRay效果圖制作完全自學教程(超值版)