Hacking
Sasha Kranjac
Microsoft Defender for Cloud is a multi-cloud and hybrid cloud security posture management solution that enables security administrators to build cyber defense for their Azure and non-Azure resources by providing both recommendations and security protection capabilities.This book will start with a foundational overview of Microsoft Defender for Cloud and its core capabilities. Then, the reader is taken on a journey from enabling the service, selecting the correct tier, and configuring the data collection, to working on remediation. Next, we will continue with hands-on guidance on how to implement several security features of Microsoft Defender for Cloud, finishing with monitoring and maintenance-related topics, gaining visibility in advanced threat protection in distributed infrastructure and preventing security failures through automation.By the end of this book, you will know how to get a view of your security posture and where to optimize security protection in your environment as well as the ins and outs of Microsoft Defender for Cloud.
Sasha Kranjac
Microsoft Defender for Cloud is a multi-cloud and hybrid cloud security posture management solution that enables security administrators to build cyber defense for their Azure and non-Azure resources by providing both recommendations and security protection capabilities.This book will start with a foundational overview of Microsoft Defender for Cloud and its core capabilities. Then, the reader is taken on a journey from enabling the service, selecting the correct tier, and configuring the data collection, to working on remediation. Next, we will continue with hands-on guidance on how to implement several security features of Microsoft Defender for Cloud, finishing with monitoring and maintenance-related topics, gaining visibility in advanced threat protection in distributed infrastructure and preventing security failures through automation.By the end of this book, you will know how to get a view of your security posture and where to optimize security protection in your environment as well as the ins and outs of Microsoft Defender for Cloud.
Paul Huijbregts, Joe Anich, Justen Graves
With all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization.This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you’ll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you’ll be taken through a day in the life of a security analyst working with the product. You’ll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture.By the end of the book, you’ll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.
Paul Huijbregts, Joe Anich, Justen Graves
With all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization.This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you’ll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you’ll be taken through a day in the life of a security analyst working with the product. You’ll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture.By the end of the book, you’ll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.
Paul Huijbregts, Joe Anich, Justen Graves
With all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization.This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you’ll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you’ll be taken through a day in the life of a security analyst working with the product. You’ll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture.By the end of the book, you’ll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.
Paul Huijbregts, Ru Campbell, Joe Anich, Justen...
Modern organizations run on constantly changing endpoints, yet many teams still struggle to make Microsoft Defender for Endpoint a dependable control. Coverage gaps, noisy detections, mixed platforms, and unclear device behavior often get in the way of effective prevention, detection, and response.This second edition helps you tackle those challenges directly. Updated for today’s Defender for Endpoint and the broader Microsoft Defender ecosystem, it shows how MDE works across clients, servers, and now mobile devices, and how to align deployments with real-world constraints. New chapters on mobile threat defense, production rollout, and tuning provide practical guidance for moving beyond pilot environments, handling edge cases, and protecting critical and legacy assets.Throughout, the book brings together IT and SecOps viewpoints to help you operate Defender for Endpoint with more clarity and less friction. You’ll learn how to maintain sensor health, interpret incidents confidently, reduce noise without weakening protection, and troubleshoot recurring issues.Whether you’re refining an existing deployment or planning a new one, this edition gives you a clearer path to making Defender for Endpoint a reliable part of your security program.
Paul Huijbregts, Ru Campbell, Joe Anich, Justen...
Modern organizations run on constantly changing endpoints, yet many teams still struggle to make Microsoft Defender for Endpoint a dependable control. Coverage gaps, noisy detections, mixed platforms, and unclear device behavior often get in the way of effective prevention, detection, and response.This second edition helps you tackle those challenges directly. Updated for today’s Defender for Endpoint and the broader Microsoft Defender ecosystem, it shows how MDE works across clients, servers, and now mobile devices, and how to align deployments with real-world constraints. New chapters on mobile threat defense, production rollout, and tuning provide practical guidance for moving beyond pilot environments, handling edge cases, and protecting critical and legacy assets.Throughout, the book brings together IT and SecOps viewpoints to help you operate Defender for Endpoint with more clarity and less friction. You’ll learn how to maintain sensor health, interpret incidents confidently, reduce noise without weakening protection, and troubleshoot recurring issues.Whether you’re refining an existing deployment or planning a new one, this edition gives you a clearer path to making Defender for Endpoint a reliable part of your security program.
Paul Huijbregts, Ru Campbell, Joe Anich, Justen...
Modern organizations run on constantly changing endpoints, yet many teams still struggle to make Microsoft Defender for Endpoint a dependable control. Coverage gaps, noisy detections, mixed platforms, and unclear device behavior often get in the way of effective prevention, detection, and response.This second edition helps you tackle those challenges directly. Updated for today’s Defender for Endpoint and the broader Microsoft Defender ecosystem, it shows how MDE works across clients, servers, and now mobile devices, and how to align deployments with real-world constraints. New chapters on mobile threat defense, production rollout, and tuning provide practical guidance for moving beyond pilot environments, handling edge cases, and protecting critical and legacy assets.Throughout, the book brings together IT and SecOps viewpoints to help you operate Defender for Endpoint with more clarity and less friction. You’ll learn how to maintain sensor health, interpret incidents confidently, reduce noise without weakening protection, and troubleshoot recurring issues.Whether you’re refining an existing deployment or planning a new one, this edition gives you a clearer path to making Defender for Endpoint a reliable part of your security program.
Paul Huijbregts, Ru Campbell, Joe Anich, Justen...
Modern organizations run on constantly changing endpoints, yet many teams still struggle to make Microsoft Defender for Endpoint a dependable control. Coverage gaps, noisy detections, mixed platforms, and unclear device behavior often get in the way of effective prevention, detection, and response.This second edition helps you tackle those challenges directly. Updated for today’s Defender for Endpoint and the broader Microsoft Defender ecosystem, it shows how MDE works across clients, servers, and now mobile devices, and how to align deployments with real-world constraints. New chapters on mobile threat defense, production rollout, and tuning provide practical guidance for moving beyond pilot environments, handling edge cases, and protecting critical and legacy assets.Throughout, the book brings together IT and SecOps viewpoints to help you operate Defender for Endpoint with more clarity and less friction. You’ll learn how to maintain sensor health, interpret incidents confidently, reduce noise without weakening protection, and troubleshoot recurring issues.Whether you’re refining an existing deployment or planning a new one, this edition gives you a clearer path to making Defender for Endpoint a reliable part of your security program.
Pierre Thoor, Matthew Zorich
Written by a recognized cybersecurity expert, Microsoft Defender for Identity in Depth not only lays the groundwork for deploying and managing MDI, but also takes your knowledge to expert levels, enabling you to strengthen your organization against the most advanced cyber threats.You’ll familiarize yourself with the essentials of MDI, from seamless setup to leveraging PowerShell for automation, setting the stage for exploring advanced integrations and capabilities. Through practical, real-world examples, you’ll learn how to extend MDI’s reach by using APIs and conducting proactive threat hunting with KQL to turn insights into actions.The book gradually shifts focus to operational excellence, helping you develop expertise in investigating alerts, optimizing action accounts, and troubleshooting, which will empower you to master the building and maintenance of a robust ITDR framework and strengthen your security posture.By the end of this book, you’ll be able to harness the full potential of MDI’s functionalities, positioning you as a key player in your organization’s cybersecurity defenses.
Jordan Krause
DirectAccess is an amazing Microsoft technology that is truly the evolution of VPN; any Microsoft-centric shop needs this technology. DirectAccess is an automatic remote access solution that takes care of everything from planning to deployment.Microsoft DirectAccess Best Practices and Troubleshooting will provide you with the precise steps you need to take for the very best possible implementation of DirectAccess in your network. You will find answers to some of the most frequently asked questions from administrators and explore unique troubleshooting scenarios that you will want to understand in case they happen to you.Microsoft DirectAccess Best Practices and Troubleshooting outlines best practices for configuring DirectAccess in any network. You will learn how to configure Manage Out capabilities to plan, administer, and deploy DirectAccess client computers from inside the corporate network. You will also learn about a couple of the lesser-known capabilities within a DirectAccess environment and the log information that is available on the client machines.This book also focuses on some specific cases that portray unique or interesting troubleshooting scenarios that DirectAccess administrators may encounter. By describing the problem, the symptoms, and the fixes to these problems, the reader will be able to gain a deeper understanding of the way DirectAccess works and why these external influences are important to the overall solution.
Kent Nordstrom, Kent Nordstr?É?íÂ!?m
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems.The Microsoft Forefront Identity Manager 2010 R2 Handbook is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting.Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for strong administrative accounts within Active Directory. You will learn to implement all the features of FIM 2010 R2. You will see how to install a complete FIM 2010 R2 infrastructure including both test and production environment. You will be introduced to Self-Service management of both users and groups. FIM Reports to audit the identity management lifecycle are also discussed in detail.With the Microsoft Forefront Identity Manager 2010 R2 Handbook you will be able implement and manage FIM 2010 R2 almost effortlessly.
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation.You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks.By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation.You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks.By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation.You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks.By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation.You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks.By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
David Steadman, Jeff Ingalls
Microsoft Identity Manager 2016 is Microsoft’s solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement. The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.
Shabaz Darr, Viktor Hedberg, Simon Binder
Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance.Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam.By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.
Andrew Taylor
Microsoft Intune is a powerful cloud-managed mobile device management (MDM) tool that empowers you to manage your end-user device estate across various platforms. While it is an excellent platform, the initial setup and configuration can be a daunting process, and mistakes made early on can be more challenging to resolve later. This book addresses these issues by guiding you through the end-to-end configuration of an Intune environment, incorporating best practices and utilizing the latest functionalities.In addition to setting up your environment, you’ll delve into the Microsoft Graph platform to understand the underlying mechanisms behind the web GUI. This knowledge will enable you to automate a significant portion of your daily tasks using PowerShell.By the end of this book, you’ll have established an Intune environment that supports Windows, Apple iOS, Apple macOS, and Android devices. You’ll possess the expertise to add new configurations, policies, and applications, tailoring an environment to your specific requirements. Additionally, you’ll have the ability to troubleshoot any issues that may arise and package and deploy your company applications. Overall, this book is an excellent resource for anyone who wants to learn how to use Microsoft Intune to manage their organization's end-user devices.
Andrew Taylor, Lior Bela, Lavanya Lakshman
Microsoft Intune Cookbook, Second Edition is a hands-on guide for IT administrators managing and supporting modern endpoints, built around the latest Intune capabilities and endpoint security enhancements. Written by Andrew Taylor, an experienced Intune practitioner and active community contributor, it focuses on everyday admin tasks and turns them into clear, repeatable recipes. You’ll start by preparing an Intune tenant and setting up key Entra ID foundations, then work through managing Windows, macOS, iOS, Android, and Linux using practical, proven workflows. Along the way, you’ll configure policies, enroll devices, deploy apps, and strengthen security with compliance, Defender integration, encryption, and conditional access. You’ll also go beyond the portal by using PowerShell and Microsoft Graph to automate routine work, reduce manual effort, and make changes at scale. Monitoring and reporting are covered so you can track device health, security posture, and deployment outcomes with confidence.Advanced scenarios include secure remote support, privilege elevation, cloud-based certificate management, real-time queries, and AI-assisted guidance to speed up troubleshooting and decision-making. By the end, you’ll have practical techniques you can apply immediately to run a modern, cloud-first Intune environment.
Andrew Taylor, Lior Bela, Lavanya Lakshman
Microsoft Intune Cookbook, Second Edition is a hands-on guide for IT administrators managing and supporting modern endpoints, built around the latest Intune capabilities and endpoint security enhancements. Written by Andrew Taylor, an experienced Intune practitioner and active community contributor, it focuses on everyday admin tasks and turns them into clear, repeatable recipes. You’ll start by preparing an Intune tenant and setting up key Entra ID foundations, then work through managing Windows, macOS, iOS, Android, and Linux using practical, proven workflows. Along the way, you’ll configure policies, enroll devices, deploy apps, and strengthen security with compliance, Defender integration, encryption, and conditional access. You’ll also go beyond the portal by using PowerShell and Microsoft Graph to automate routine work, reduce manual effort, and make changes at scale. Monitoring and reporting are covered so you can track device health, security posture, and deployment outcomes with confidence.Advanced scenarios include secure remote support, privilege elevation, cloud-based certificate management, real-time queries, and AI-assisted guidance to speed up troubleshooting and decision-making. By the end, you’ll have practical techniques you can apply immediately to run a modern, cloud-first Intune environment.
Dwayne Natwick, Sonia Cuff
Cloud technologies have made building a defense-in-depth security strategy of paramount importance. Without proper planning and discipline in deploying the security posture across Microsoft 365 and Azure, you are compromising your infrastructure and data. Microsoft Security, Compliance, and Identity Fundamentals is a comprehensive guide that covers all of the exam objectives for the SC-900 exam while walking you through the core security services available for Microsoft 365 and Azure.This book starts by simplifying the concepts of security, compliance, and identity before helping you get to grips with Azure Active Directory, covering the capabilities of Microsoft’s identity and access management (IAM) solutions. You'll then advance to compliance center, information protection, and governance in Microsoft 365. You'll find out all you need to know about the services available within Azure and Microsoft 365 for building a defense-in-depth security posture, and finally become familiar with Microsoft's compliance monitoring capabilities.By the end of the book, you'll have gained the knowledge you need to take the SC-900 certification exam and implement solutions in real-life scenarios.
Dwayne Natwick, Sonia Cuff
Cloud technologies have made building a defense-in-depth security strategy of paramount importance. Without proper planning and discipline in deploying the security posture across Microsoft 365 and Azure, you are compromising your infrastructure and data. Microsoft Security, Compliance, and Identity Fundamentals is a comprehensive guide that covers all of the exam objectives for the SC-900 exam while walking you through the core security services available for Microsoft 365 and Azure.This book starts by simplifying the concepts of security, compliance, and identity before helping you get to grips with Azure Active Directory, covering the capabilities of Microsoft’s identity and access management (IAM) solutions. You'll then advance to compliance center, information protection, and governance in Microsoft 365. You'll find out all you need to know about the services available within Azure and Microsoft 365 for building a defense-in-depth security posture, and finally become familiar with Microsoft's compliance monitoring capabilities.By the end of the book, you'll have gained the knowledge you need to take the SC-900 certification exam and implement solutions in real-life scenarios.
Microsoft Security Copilot. Master strategies for AI-driven cyber defense
Bi Yue Xu, Rod Trent
Be at the forefront of cybersecurity innovation with Microsoft Security Copilot, where advanced AI tackles the intricate challenges of digital defense. This book unveils Security Copilot’s powerful features, from AI-powered analytics revolutionizing security operations to comprehensive orchestration tools streamlining incident response and threat management. Through real-world case studies and frontline stories, you’ll learn how to truly harness AI advancements and unlock the full potential of Security Copilot within the expansive Microsoft ecosystem.Designed for security professionals navigating increasingly sophisticated cyber threats, this book equips you with the skills to accelerate threat detection and investigation, refine your security processes, and optimize cyber defense strategies.By the end of this book, you’ll have become a Security Copilot ninja, confidently crafting effective prompts, designing promptbooks, creating custom plugins, and integrating logic apps for enhanced automation.
Trevor Stuart, Joe Anich
Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.
Richard Diver, Gary Bushey, John Perkins
Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you integrate cloud security and artificial intelligence (AI). This book will teach you how to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic.The first part of this book will introduce you to Microsoft Sentinel and Log Analytics, then move on to understanding data collection and management, as well as how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. The next part will focus on useful features, such as entity behavior analytics and Microsoft Sentinel playbooks, along with exploring the new bi-directional connector for ServiceNow. In the next part, you’ll be learning how to develop solutions that automate responses needed to handle security incidents and find out more about the latest developments in security, techniques to enhance your cloud security architecture, and explore how you can contribute to the security community.By the end of this book, you’ll have learned how to implement Microsoft Sentinel to fit your needs and protect your environment from cyber threats and other security issues.
Andrew J Plue, Andrew Plue
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems against threats with leading malware detection technologies. Built on Configuration Manager, it provides a unified infrastructure for client security and compliance management and Microsoft System Center 2012 Endpoint Protection Cookbook will help you get to grips with vital tasks for implementing this security tool.With the release of System Center 2012 Endpoint Protection, Microsoft is continuing its commitment to offering a cutting edge, enterprise- ready Anti-Virus solution. With its practical and easy to follow recipes, Microsoft System Center 2012 Endpoint Protection Cookbook fully prepares you for a simple, headache-free migration. This hands-on, practical cookbook will have you equipped with the knowledge to install and manage System Center 2012 Endpoint Protection like a pro in no time by following step by step recipes.You'll gain insight into a wide range of management tasks, such as building your SCEP infrastructure, deploying SCEP clients and building the perfect AV policies for your workstation and servers. You'll also benefit from a complete SCEP walk-through in a bonus appendix chapter.With Microsoft System Center 2012 Endpoint Protection Cookbook in hand, you will have the confidence to tackle essential tasks like deployment, policy and much more for SCEP.