Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft 70-744: Securing Windows Server 2016 Exam Prep
Course Introduction
Introduction (0:09)
Course Introduction (2:55)
Instructor Introduction (1:24)
Chapter 01 - Introduction to Attacks, Breaches, and Detection
Chapter 01 Introduction (1:51)
Topic A: Understanding Types of Attacks (0:23)
Assume Breach (3:16)
Methods of Attack (12:46)
Attack Stages (7:01)
Prioritizing Resources (3:30)
Incident Response Strategy (2:11)
Ensuring Compliance (2:04)
Topic B: Detecting Security Breaches (0:21)
Locating Evidence (1:40)
Event Logs (2:35)
Examining Other Configurations (1:56)
Topic C: Using Sysinternals Tools (0:22)
Introducing Sysinternals (2:31)
Demo - Examining Sysinternals Tools (1:51)
System Monitor (2:05)
AccessChk (1:31)
Autoruns (1:34)
LogonSessions (1:24)
Process Explorer (1:37)
Process Monitor (1:27)
Sigcheck (1:18)
Demo - Using Sysinternals Tools (13:45)
Chapter 01 Summary (1:31)
Chapter 01 Review (0:09)
Chapter 01 Quiz
Chapter 02 - Protecting Users and Workstations
Chapter 02 Introduction (2:12)
Topic A: User Rights and Privileges (0:18)
Principle of Least Privilege (5:05)
Configuring User Rights (3:24)
Configuring Account Security Options (9:33)
Demo - User Rights and Account Security Options (16:04)
Account Security Controls (2:15)
Complexity Options (3:29)
Password and Lockout Policies (3:34)
Demo - Configuring Account Policies in Group Policy (4:22)
Configuring Fine-Grained Password Policies (1:26)
Understanding PSO Application (2:55)
Protected Users Security Groups (3:22)
Delegating Administrative Control (4:12)
Demo - Delegating Control in AD DS (3:23)
Local Administrator Password Solutions (LAPS) (6:25)
LAPS Requirements (1:40)
LAPS Process (1:13)
Configuring and Managing Passwords (3:40)
Demo - Using LAPS (11:06)
Topic B: Working with Computer and Service Accounts (0:10)
What is a Computer Account? (1:40)
Computer Account Functionality (1:19)
Working with Secure Channel Passwords (1:54)
Service Account Types (2:05)
Group MSAs (3:12)
Demo - Configuring Group MSAs (8:33)
Topic C: Protecting User Credentials (0:10)
Introducing Credential Guard (2:13)
Credential Guard Requirements (1:30)
Configuring Credential Guard (1:17)
Verifying Credential Guard Operation (1:22)
Credential Guard Weaknesses (1:19)
NTLM Blocking (3:33)
Searching AD DS for Problem Accounts (2:05)
Demo - Locating Problem Accounts (5:42)
Topic D: Using Privileged Access Workstations (0:32)
The Need for Privileged Access Workstations (1:52)
Privileged Access Workstations (1:41)
Jump Servers (1:09)
Securing Domain Controllers (6:20)
Chapter 02 Summary (2:18)
Chapter 02 Review (0:09)
Chapter 02 Quiz
Chapter 03 - Managing Administrative Access
Chapter 03 Introduction (1:50)
Topic A: Understanding and Deploying JEA (0:17)
Introduction to JEA (6:01)
JEA Components (1:05)
Session Configuration Files (3:06)
Demo - Creating a Session Configuration File (3:17)
Role Capability Files (2:32)
Demo - Create a Role Capability File (7:31)
JEA Endpoints (1:12)
Demo - Creating a JEA Endpoint (2:15)
Connecting to JEA Endpoints (1:52)
Deploying JEA Endpoints (2:05)
Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests (0:17)
ESAE Forests (2:34)
Administrative Tiers (1:47)
ESAE Best Practices (2:41)
The Clean Source Principle (2:08)
Implementing the Clean Source Principle (2:25)
Topic C: Using Microsoft Identity Manager (0:23)
Overview of MIM (2:36)
MIM Requirements (1:50)
MIM Service Accounts (2:50)
Topic D: Using JIT Administration and PAM (0:31)
Overview of JIT Administration (1:32)
Privileged Access Management (PAM) (2:32)
PAM Components (2:13)
Creating an Administrative Forest (1:26)
Configuring Trust Relationships (3:21)
Shadow Principals (2:09)
Configuring the MIM Web Portal (1:00)
Managing and Configuring PAM Roles (1:05)
Chapter 03 Summary (2:48)
Chapter 03 Review (0:09)
Chapter 03 Quiz
Chapter 04 - Configuring Anti-Malware and Patch Management
Chapter 04 Introduction (1:45)
Topic A: Configuring and Managing Windows Defender (0:08)
Understanding Malware (4:43)
Malware Sources (1:41)
Mitigation Methods (3:26)
Windows Defender (1:40)
Demo - Using Windows Defender (6:43)
Topic B: Restricting Software (0:13)
Controlling Applications (1:40)
Software Restriction Policies (2:48)
Security Levels (1:16)
AppLocker (2:40)
Support for AppLocker (3:03)
AppLocker Rules (1:56)
Creating Default Rules (3:01)
Demo - Using AppLocker (11:15)
Topic C: Using Device Guard (0:14)
Overview of Device Guard (2:06)
Device Guard Features (2:11)
Configuring Device Guard (1:43)
Device Guard Policies (2:27)
Deploying Code Integrity Policies (1:33)
Control Flow Guard (1:24)
Topic D: Patch Management with WSUS (0:09)
Overview of WSUS (2:25)
Deployment Options (2:05)
Server Requirements (1:52)
Configuring Clients (1:27)
Administering WSUS (1:08)
Approving Updates (1:47)
Demo - Installing and Configuring WSUS (18:03)
Chapter 04 Summary (2:07)
Chapter 04 Review (0:09)
Chapter 04 Quiz
Chapter 05 - Auditing and Advanced Threat Analytics
Chapter 05 Introduction (1:12)
Topic A: Configuring Auditing for Windows Server 2016 (0:10)
Overview of Auditing (1:49)
The Purpose of Auditing (1:29)
Types of Events (4:49)
Auditing Goals (0:56)
Auditing File and Object Access (1:52)
Demo - Configuring Auditing (10:03)
Topic B: Advanced Auditing and Management (0:38)
Advanced Auditing (1:11)
Advanced Auditing Subcategories (2:40)
Dynamic Auditing (2:38)
Event Log Subscriptions (2:27)
Audit Collection Services (ACS) (2:00)
Demo - Configuring Event Forwarding (6:59)
Auditing with Windows PowerShell (1:58)
Demo - Using PowerShell with Audit Logs (7:59)
Transaction Logging (2:02)
Module Logging (1:06)
Script Block Logging (0:50)
Demo - Configuring PowerShell Logging (8:57)
Topic C: Deploying and Configuring ATA (0:08)
Overview of ATA (2:34)
Usage Scenarios (5:08)
Deployment Requirements (2:13)
ATA Gateways (2:03)
Port Mirroring (1:17)
Configuring ATA Center (1:38)
Topic D: Deploying and Configuring Operations Management Suite (0:06)
Introduction to Operations Management Suite (0:53)
Deployment Overview (1:40)
OMS Solutions (1:32)
Installing OMS (1:26)
OMS Solutions (1:21)
Chapter 05 Summary (1:59)
Chapter 05 Review (0:10)
Chapter 05 Quiz
Chapter 06 - Securing the Infrastructure
Chapter 06 - Introduction (0:53)
Topic A: Secure the Virtualization Infrastructure (0:27)
Introduction to Guarded Fabric (3:15)
Host Guardian Service (1:31)
Preparing HGS Nodes (1:20)
Installing and Configuring HGS (2:10)
Attestation and Encryption (1:35)
Attestation Methods (1:22)
Initializing HGS (1:59)
Configuring HSG Clients (1:24)
Topic B: Deploying Security Baselines (0:07)
Security Compliance Manager (SCM) (3:33)
SCM Requirements (1:21)
Demo - Installing SCM (3:12)
Demo - Configuring and Deploying Security Baselines (11:53)
Topic C: Deploying Nano Server (0:13)
Planning for Nano Server (1:05)
Understanding Nano Server Roles (0:45)
Installing Nano Server Roles (2:06)
Nano Server Installation (1:00)
Installation Steps (1:53)
Chapter 06 Summary (0:46)
Chapter 06 Review (0:10)
Chapter 06 Quiz
Chapter 07 - Configuring Data Protection
Chapter 07 Introduction (1:49)
Topic A: Planning and Implementing File Encryption (0:11)
Introducing Encrypting File System (6:35)
EFS Features (6:26)
Encryption and Decryption (3:47)
Recovering EFS Files (2:54)
Demo - Using EFS (8:47)
Topic B: Planning and Implementing BitLocker (0:13)
Overview of BitLocker (3:21)
BitLocker and TPMs (2:19)
BitLocker Requirements (2:00)
Tools for Configuring and Managing BitLocker (1:48)
Deploying BitLocker (1:40)
Demo - Deploying BitLocker (10:17)
BitLocker on Hyper-V VMs (0:41)
BitLocker and CSVs (1:42)
Enabling BitLocker for CSV (1:08)
Network Unlock (1:56)
Network Unlock Process (1:12)
BitLocker Recovery (3:01)
Microsoft BitLocker Administration and Monitoring (MBAM) (0:46)
Chapter 07 Summary (0:48)
Chapter 07 Review (0:09)
Chapter 07 Quiz
Chapter 08 - Advanced File Server Management
Chapter 08 Introduction (1:06)
Topic A: Using File Server Resource Manager (0:17)
Capacity Management (2:51)
Storage Management (1:15)
Introduction to FSRM (1:16)
Storage Management with File Server Resource Manager (0:24)
Overview of FSRM (1:14)
Installing and Configuring FSRM (1:30)
Demo - Installing and Configuring FSRM (5:51)
Quota Management (2:53)
Demo - Create and Manage Quotas (11:51)
File Screening (2:31)
Using File Groups (1:54)
Exceptions and Templates (1:55)
Demo - Implementing File Screening (10:07)
Storage Reports (2:12)
Report Tasks (0:47)
Demo - Generating Storage Reports (6:51)
Automatic File Management (1:26)
Topic B: Implementing Classification and File Management Tasks (0:11)
File Classification (2:23)
Classification Rules (1:56)
Demo - Configure File Classification (8:06)
File Management Tasks (3:34)
Topic C: Working with Dynamic Access Control (0:10)
Overview of Dynamic Access Control (2:43)
Dynamic Access Control Scenarios (3:37)
DAC Technologies (1:13)
Understanding Identity (3:12)
Understanding Claims (3:14)
Types of Claims (2:18)
Central Access Policies (1:26)
Policy Components (1:35)
DAC Prerequisites (3:07)
Demo - Implementing DAC (16:09)
Chapter 08 Summary (1:51)
Chapter 08 Review (0:09)
Chapter 08 Quiz
Chapter 09 - Securing the Network Infrastructure
Chapter 09 Introduction (2:11)
Topic A: Using the Windows Firewall with Advanced Security (0:07)
Types of Firewalls (3:47)
Well-Known Ports (2:11)
Host-Based Firewall (2:24)
Network Profiles (2:16)
Configuring the Windows Firewall (4:12)
Demo - Working with the Windows Firewall (17:44)
Topic B: Datacenter Firewall (0:37)
Network Controller (2:09)
Datacenter Firewall (2:24)
Network Security Groups (0:52)
Scenarios for Datacenter Firewall (2:19)
Topic C: Utilizing IP Security (0:12)
Overview of IP Security (2:06)
IPSec Protocols (2:07)
IPSec Usage Scenarios (4:09)
IPSec Configuration Tools (0:59)
Connection Security Rules (0:54)
Understanding Rule Types (1:38)
Rule Endpoints (1:46)
Authentication Settings (2:57)
Authentication Methods (2:31)
Encryption Settings (1:32)
Monitoring Connections (0:56)
Demo - Implementing IPSec (7:09)
Topic D: Configuring Advanced DNS Settings (0:05)
Managing DNS Services (3:35)
Optimizing DNS Name Resolution (3:17)
The GlobalNames Zone (1:37)
Implementing DNS Security (4:44)
DNS Security (DNSSEC) (1:44)
Implementing DNSSEC (2:44)
Demo - Configuring DNSSEC (6:54)
Introducing DNS Policies (1:46)
Implementing DNS Policies (3:11)
RRL Feature (3:07)
Demo - Configuring DNS Policies (8:41)
Topic E: Monitoring Network Traffic (0:04)
Microsoft Message Analyzer (2:53)
Demo - Using Microsoft Message Analyzer (6:00)
Topic F: Securing SMB Traffic (0:30)
SMB 3.1.1 Protocol Security (2:12)
SMB Encryption Requirements (1:34)
Encrypting SMB Shares (1:26)
Disabling Support for SMB 1.0 (1:23)
Chapter 09 Summary (1:48)
Chapter 09 Review (0:09)
Chapter 09 Quiz
Course Closure (2:14)
Chapter 02 Review
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock