舉報

會員
Least Privilege Security for Windows 7, Vista and XP
最新章節:
Index
Thispracticalhandbookhasdetailedstep-by-stepinstructionsforimplementingLeastPrivilegeSecurityandrelatedmanagementtechnologies.IthassolutionstothemostcommontechnicalchallengesandMicrosoftbestpracticeadvice.ItalsocoverstechniquesformanagingLeastPrivilegeonthedesktop.ThisbookisforSystemAdministratorsordesktopsupportstaffwhowanttoimplementLeastPrivilegeSecurityonWindowssystems.
最新章節
- Index
- Summary
- Microsoft Enterprise Desktop Virtualization (MED-V)
- Solving least privilege security problems using virtual machines
- Chapter 14. Deploying XP Mode VMs with MED-V
- Summary
品牌:中圖公司
上架時間:2021-08-05 16:07:30
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Index 更新時間:2021-08-05 16:18:38
- Summary
- Microsoft Enterprise Desktop Virtualization (MED-V)
- Solving least privilege security problems using virtual machines
- Chapter 14. Deploying XP Mode VMs with MED-V
- Summary
- VMware ThinApp
- Microsoft Application Virtualization 4.5 SP1 for Windows desktops
- Chapter 13. Balancing Flexibility and Security with Application Virtualization
- Summary
- Introducing Remote Desktop Services
- Chapter 12. Provisioning Applications on Secure Desktops with Remote Desktop Services
- Summary
- Reinstall Vista or Windows 7 with Least Privilege Security
- Different methods of reinstalling Windows
- Why do a desktop refresh from a technical perspective?
- Logon scripts
- Printers and Least Privilege Security
- Creating a Data Collection Package
- The Application Compatibility Toolkit
- Chapter 11. Preparing Vista and Windows 7 for Least Privilege Security
- Summary
- Identifying LUA problems using Standard User Analyzer
- Managing network configuration
- Power management
- Changing the system time and time zone
- ActiveX controls
- CD burning
- Windows XP security model
- Installing Windows XP using the Microsoft Deployment Toolkit
- Chapter 10. Least Privilege in Windows XP
- Summary
- AppLocker
- Implementing Software Restriction Policy
- Controlling applications
- Chapter 9. Deploying Software Restriction Policies and AppLocker
- Summary
- Configuring Windows Firewall to allow remote access
- Enabling and using graphical remote access tools
- Enabling and using command-line remote access tools
- Troubleshooting using remote access
- Providing support
- Chapter 8. Supporting Users Running with Least Privilege
- Summary
- Managing add-ons
- ActiveX controls
- Chapter 7. Managing Internet Explorer Add-ons
- Summary
- Installing software using Group Policy
- Chapter 6. Software Distribution using Group Policy
- Summary
- Using LUA Buglight to identify file and registry access violations
- Mapping .ini files to the registry
- Fixing problems with the HKey Classes Root registry hive
- Setting permissions on files and registry keys
- Suppressing unwanted User Account Control prompts
- Solving LUA problems with Avecto Privilege Guard
- Configuring applications to run with elevated privileges on-the-fly
- Bypassing user account control for selected operations
- Granting temporary administrative privileges
- Chapter 5. Tools and Techniques for Solving Least Privilege Security Problems
- Summary
- Conveniently elevating to admin privileges
- User Account Control access token model
- The shield icon
- User Account Control components
- Chapter 4. User Account Control
- Summary
- Achieving application compatibility in enterprise environments
- Quick compatibility fixes using the Program Compatibility Wizard
- Chapter 3. Solving Least Privilege Problems with the Application Compatibility Toolkit
- Summary
- User education
- Maintaining flexibility
- Managing expectations
- Applying Least Privilege Security throughout the enterprise
- User acceptance
- Getting support from management
- Company culture
- Chapter 2. Political and Cultural Challenges for Least Privilege Security
- Summary
- Least Privilege and your organization's bottom line
- Common challenges of Least Privilege Security on the desktop
- What problems does Least Privilege Security not solve?
- Benefits of Least Privilege Security on the desktop
- Least Privilege Security in the real world
- Advanced Least Privilege Security concepts
- Least Privilege Security in Windows
- What is Least Privilege Security?
- What is privilege?
- Chapter 1. An Overview of Least Privilege Security in Microsoft Windows
- Customer support
- Reader feedback
- Conventions
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- About the Reviewers
- About the Author
- Credits
- 版權頁
- 封面
- 封面
- 版權頁
- Credits
- About the Author
- About the Reviewers
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. An Overview of Least Privilege Security in Microsoft Windows
- What is privilege?
- What is Least Privilege Security?
- Least Privilege Security in Windows
- Advanced Least Privilege Security concepts
- Least Privilege Security in the real world
- Benefits of Least Privilege Security on the desktop
- What problems does Least Privilege Security not solve?
- Common challenges of Least Privilege Security on the desktop
- Least Privilege and your organization's bottom line
- Summary
- Chapter 2. Political and Cultural Challenges for Least Privilege Security
- Company culture
- Getting support from management
- User acceptance
- Applying Least Privilege Security throughout the enterprise
- Managing expectations
- Maintaining flexibility
- User education
- Summary
- Chapter 3. Solving Least Privilege Problems with the Application Compatibility Toolkit
- Quick compatibility fixes using the Program Compatibility Wizard
- Achieving application compatibility in enterprise environments
- Summary
- Chapter 4. User Account Control
- User Account Control components
- The shield icon
- User Account Control access token model
- Conveniently elevating to admin privileges
- Summary
- Chapter 5. Tools and Techniques for Solving Least Privilege Security Problems
- Granting temporary administrative privileges
- Bypassing user account control for selected operations
- Configuring applications to run with elevated privileges on-the-fly
- Solving LUA problems with Avecto Privilege Guard
- Suppressing unwanted User Account Control prompts
- Setting permissions on files and registry keys
- Fixing problems with the HKey Classes Root registry hive
- Mapping .ini files to the registry
- Using LUA Buglight to identify file and registry access violations
- Summary
- Chapter 6. Software Distribution using Group Policy
- Installing software using Group Policy
- Summary
- Chapter 7. Managing Internet Explorer Add-ons
- ActiveX controls
- Managing add-ons
- Summary
- Chapter 8. Supporting Users Running with Least Privilege
- Providing support
- Troubleshooting using remote access
- Enabling and using command-line remote access tools
- Enabling and using graphical remote access tools
- Configuring Windows Firewall to allow remote access
- Summary
- Chapter 9. Deploying Software Restriction Policies and AppLocker
- Controlling applications
- Implementing Software Restriction Policy
- AppLocker
- Summary
- Chapter 10. Least Privilege in Windows XP
- Installing Windows XP using the Microsoft Deployment Toolkit
- Windows XP security model
- CD burning
- ActiveX controls
- Changing the system time and time zone
- Power management
- Managing network configuration
- Identifying LUA problems using Standard User Analyzer
- Summary
- Chapter 11. Preparing Vista and Windows 7 for Least Privilege Security
- The Application Compatibility Toolkit
- Creating a Data Collection Package
- Printers and Least Privilege Security
- Logon scripts
- Why do a desktop refresh from a technical perspective?
- Different methods of reinstalling Windows
- Reinstall Vista or Windows 7 with Least Privilege Security
- Summary
- Chapter 12. Provisioning Applications on Secure Desktops with Remote Desktop Services
- Introducing Remote Desktop Services
- Summary
- Chapter 13. Balancing Flexibility and Security with Application Virtualization
- Microsoft Application Virtualization 4.5 SP1 for Windows desktops
- VMware ThinApp
- Summary
- Chapter 14. Deploying XP Mode VMs with MED-V
- Solving least privilege security problems using virtual machines
- Microsoft Enterprise Desktop Virtualization (MED-V)
- Summary
- Index 更新時間:2021-08-05 16:18:38