Windows 10 for Enterprise Administrators

 
 
Packt Publishing
  • erschienen am 11. September 2017
  • |
  • 314 Seiten
 
E-Book | PDF mit Adobe-DRM | Systemvoraussetzungen
978-1-78646-317-3 (ISBN)
 
Learn the art of configuring, deploying, managing and securing Windows 10 for your enterprise.About This BookEnhance your enterprise administration skills to manage Windows 10 Redstone 3Get acquainted with configuring Azure Active Directory for enabling cloud-based services and Remote Server Admin Tools for managing Windows ServerProvide enterprise-level security with ease using the built-in data loss prevention of Windows 10Who This Book Is ForIf you are a system administrator who has been given the responsibility of administering and managing Windows 10 Redstone 3, then this book is for you. If you have deployed and managed previous versions of Windows, it would be an added advantage.What You Will LearnUnderstand the remote access capabilitiesUse third-party tools to deploy Windows 10Customize image and user Interface experienceImplement assigned access rightsConfigure remote administrationManage Windows 10 securityWork with Azure AD and Intune managementIn DetailMicrosoft's launch of Windows 10 is a step toward satisfying the enterprise administrator's needs for management and user experience customization. This book provides the enterprise administrator with the knowledge needed to fully utilize the advanced feature set of Windows 10 Enterprise.This practical guide shows Windows 10 from an administrator's point of view. You'll focus on areas such as installation and configuration techniques based on your enterprise requirements, various deployment scenarios and management strategies, and setting up and managing admin and other user accounts. You'll see how to configure Remote Server Administration Tools to remotely manage Windows Server and Azure Active Directory.Lastly, you will learn modern Mobile Device Management for effective BYOD and how to enable enhanced data protection, system hardening, and enterprise-level security with the new Windows 10 in order to prevent data breaches and impede attacks.By the end of this book, you will know the key technologies and capabilities in Windows 10 and will confidently be able to manage and deploy these features in your organization.Style and approachThis step-by-step guide will show you how to configure, deploy, manage, and secure the all new Windows 10 Redstone 3 for your enterprise.
  • Englisch
  • Birmingham
  • |
  • Großbritannien
  • Für Beruf und Forschung
  • 12,44 MB
978-1-78646-317-3 (9781786463173)
weitere Ausgaben werden ermittelt
Jeff Stokes is a Windows / Microsoft Engineer currently employed at Microsoft. He specializes in Operating System Health, Reliability, and Performance. He is skilled in Windows Deployment with MDT (Microsoft Deployment Toolkit) and has exceptional skills in VDI (Virtual Desktop) and performance analysis. He is an active writer and blogger and loves technology. Manuel Singer works as a Senior Premier Field Engineer for Windows Client at Microsoft and is based in Germany. He has more than 10 years of experience in system management and deployment using Microsoft technologies. He specializes in client enterprise design, deployment, performance, reliability, and Microsoft devices. Manuel works with local and international top customers from the private and public sector to provide professional technical and technological support. Richard Diver has been an IT Professional for 20+ years with experience across multiple industries, technologies, and geographies. He is currently working as a Solutions Architect with a focus on Microsoft Cloud Architecture, Enterprise Mobility and Identity Management solutions. This is Richard's first time as an author, though his previous book contributions include topics such as Sysinternals Tools, Microsoft Office 365, and Microsoft Intune.
Richard has a deep passion for simplifying complex topics, and visualizing and sharing knowledge. He is a family man, with three daughters, and enjoys travelling, reading, and public speaking at events and conferences.
  • Cover
  • Copyright
  • Credits
  • About the Authors
  • About the Reviewer
  • www.PacktPub.com
  • Customer Feedback
  • Table of Contents
  • Preface
  • Chapter 1: Installation and Upgrading
  • Which branch to select?
  • Current Branch, also known as Semi-Annual Channel (Targeted)
  • Current Branch for Business, also known as Semi-Annual Channel
  • Support timeline before 1709
  • Support timeline since 1709
  • The Long-Term Servicing Branch
  • LTSB problem silicon support - potential risk with Zen, Cannonlake, and newer CPUs
  • Limitations of LTSB
  • Recommendations
  • New deployment methods
  • Why in-place upgrades?
  • Limitations and blocker of the in-place upgrade
  • Changing from BIOS/legacy mode to UEFI mode
  • Changing from Windows 32-bit/x86 to 64-bit/x64
  • Changing the base OS language
  • Changing primary disk partitioning
  • Using the Windows To Go or boot from VHD features
  • Image creation process (sysprep after upgrade not supported)
  • Certain third-party disk encryption products
  • Changing too many apps (bulk application swap)
  • Changing the environment
  • Traditional wipe and load
  • An alternative: provisioning
  • Improvements in deployment since Windows 10 1511
  • Windows 10 1607, also known as Anniversary Update
  • Windows 10 1703/1709, also known as Fall Creators Update
  • Tips and tricks for smooth in-place upgrade from 7, 8.1, or 10 to 10
  • Integrating cumulative updates into install sources
  • Updating graphics driver
  • Looking at Setupact.log and Setupapi.dev.log
  • Using Windows Upgrade Analytics aka Windows Upgrade Readiness
  • Selecting the deployment tools
  • Summary
  • Chapter 2: Configuration and Customization
  • Introducing Windows as a service
  • Cortana
  • Security mitigation
  • Image customization
  • Imaging process
  • Customizing the image
  • Upgrade expectations
  • Internet Explorer 11 Enterprise Mode configuration
  • Windows 10 Start and taskbar layout
  • Audit mode
  • Tips
  • Virtual Desktop Infrastructure
  • Layering technologies
  • Security Compliance Manager
  • AppLocker
  • Microsoft Windows Store for Business, also known as Private Store
  • Microsoft telemetry
  • Windows Spotlight
  • Mandatory user profiles
  • Assigned Access, also known as kiosk mode
  • Bring Your Own Device scenarios
  • Windows libraries
  • User Experience Virtualization
  • Summary
  • Chapter 3: User Account Administration
  • Windows account types
  • Account privileges
  • Local Admin Password Solution
  • Create policies to control local accounts
  • Password policy
  • Account lockout policy
  • Manage user sign in options
  • Mobile device management security settings
  • User Account Control
  • Windows Hello for Business
  • Manage options for Windows Hello for Business
  • Credential Guard
  • Privileged Access Workstation
  • Summary
  • Chapter 4: Remote Administration Tools
  • Remote Server Administration Tools
  • Installing RSAT
  • RSAT usage
  • PowerShell
  • PowerShell setup
  • PowerShell usage
  • PowerShell in the Enterprise
  • Desired State Configuration
  • Windows Sysinternals tools suite
  • BgInfo
  • Configuring BGInfo
  • Deployment
  • Introducing PsTools
  • Installing PsTools
  • Using PsTools
  • Custom code repository
  • Summary
  • Chapter 5: Device Management
  • Evolving business needs
  • Mobile device management
  • Changes to GPOs in Windows 10
  • Enterprise/Education - only GPOs
  • Known issues when upgrading the central policy store
  • Known issues with Group Policy Preferences/GPMC
  • Servicing and patching
  • Why cumulative updates?
  • Update delivery solutions
  • Windows Update
  • Windows Update for Business
  • Windows Server Update Services
  • SCCM and third-party solutions
  • Windows 10 servicing
  • Summary
  • Chapter 6: Protecting Enterprise Data in BYOD Scenarios
  • Bring Your Own Device
  • What is BYOD?
  • Choose Your Own Device
  • Key considerations
  • Device choice
  • Ownership
  • Management responsibility
  • Comparing options
  • Protection options
  • Identity and access management
  • Connect to work or school
  • Microsoft Passport
  • Windows Hello
  • Credential Guard
  • Device Configuration
  • Application management
  • Provisioning packages
  • Windows Store for Business
  • Mobile Application Management
  • Information protection
  • BitLocker and device pin
  • Windows Information Protection
  • Document classification and encryption
  • Data loss prevention
  • Alternative options
  • Enable remote/virtual desktops - RDS/VDI
  • Enable virtual private networks
  • Publish applications via proxy
  • End user behavior analytics
  • OneDrive for Business
  • Work Folders
  • Work Folders compared to other sync technologies
  • Summary
  • Chapter 7: Windows 10 Security
  • Today's security challenges
  • Windows Hello/Windows Hello for Business
  • Differences between Windows Hello and Windows Hello for Business
  • Virtualization-based security
  • Credential Guard
  • Device Guard
  • Windows Defender Application Guard for Microsoft Edge
  • Windows Defender Exploit Guard
  • Device Health Attestation
  • Windows Defender Security Center
  • New BitLocker options
  • Local Administrator Password Solution
  • AD preparation
  • Now to the installation
  • LAPS UI
  • Group Policy client-side extension
  • Group Policy configuration options
  • Summary
  • Chapter 8: Windows Defender Advanced Threat Protection
  • Prerequisites
  • Windows Defender
  • Windows Defender Security Center
  • Windows Defender ATP
  • Plan - environment analysis
  • Deploy - service activation
  • Sign up and activate Windows Defender ATP
  • Portal configuration
  • Check service health
  • Check sensor status
  • Enable SIEM integration
  • Onboard endpoints
  • Configure sensor data
  • Additional configuration
  • Detect - using the ATP portal
  • Alerts queue
  • Machine list
  • Preferences setup
  • Endpoint management
  • Protect Post-breach response
  • Types of threats
  • Ransomware
  • Credential theft
  • Exploits
  • Backdoors
  • General malware
  • Potentially Unwanted Application
  • Take responsive actions
  • Taking responsive actions on a machine
  • Collecting an investigation package
  • Isolate a machine
  • Take responsive actions on a file or process
  • Request deep analysis
  • Stop and quarantine file
  • Block file
  • Pivot into Office 365
  • Summary
  • Chapter 9: Advanced Configurations
  • Virtual desktops
  • VDI infrastructure best practices
  • VDI configuration considerations
  • The Windows ICD
  • Windows 10 Kiosk Mode
  • AutoPilot mode
  • The Set up School PCs application
  • Device lockdown
  • Custom Logon
  • Keyboard filter
  • Shell Launcher
  • Unbranded Boot
  • Unified Write Filter
  • Summary
  • Chapter 10: RedStone 3 Changes
  • OneDrive - file on demand
  • Task Manager shows GPU usage graph
  • No SMB1
  • Ubuntu, openSUSE and SUSE LSE available as Linux subsystem
  • New features of Microsoft Edge
  • New Google Chrome to Microsoft Edge migration feature
  • Hyper-V improvements
  • Change of network profiles in GUI
  • Improved storage sense feature
  • Microsoft Fluent Design
  • My people app
  • Eye tracking
  • Controlled folder access
  • Summary
  • Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

42,49 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe-DRM
siehe Systemvoraussetzungen
E-Book bestellen