У нас вы можете посмотреть бесплатно Microsoft Windows Hardening P1 | Windows Security | TryHackMe или скачать в максимальном доступном качестве, которое было загружено на ютуб. Для скачивания выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this video walkthrough, we covered how to harden and secure Windows workstations from both the identity management and network side. **** Receive Cyber Security Field, Certifications Notes and Special Training Videos / @motasemhamdan ****** TryHackMe Microsoft Windows Hardening https://tryhackme.com/r/room/microsof... Writeup https://motasem-notes.net/microsoft-w... ******** Store https://buymeacoffee.com/notescatalog... Patreon / motasemhamdan Instagram / mastermindstudynotes Google Profile https://maps.app.goo.gl/eLotQQb7Dm6ai... LinkedIn [1]: / motasem-hamdan-7673289b [2]: / motasem-eldad-ha-bb42481b2 Instagram / mastermindstudynotes Twitter / manmotasem Facebook / motasemhamdantty **** 0:00 - Introduction to Windows Hardening 0:14 - What is Windows Hardening? 0:25 - Key Aspects of Windows Hardening 1:39 - Understanding Windows Components 1:51 - Windows Services 3:13 - Windows Registry 4:17 - Windows Event Viewer 6:46 - Windows Telemetry 8:04 - Lab Setup and Task Overview 8:18 - Task: Identifying Service Types 9:50 - Task: Registry Editor and Finding Keys 10:44 - Task: Accessing Diagnostic Logs 13:07 - Identity and Access Management 13:36 - Types of Accounts in Windows 15:22 - Managing Accounts and User Roles 15:51 - User Account Control (UAC) 17:31 - Setting User Account Control Prompts 18:16 - Group Policy Editor for Identity Management 20:07 - Password and Account Lockout Policies 21:52 - Task: Account Settings and Verification 22:54 - Network Management and Hardening 23:40 - Windows Defender Firewall Overview 24:36 - Configuring Inbound and Outbound Rules 25:17 - Program-Level Firewall Rules 26:16 - Port-Level Firewall Rules 27:31 - Additional Firewall Settings 29:11 - Disabling Unused Network Adapters 30:26 - Disabling SMB Protocol 31:26 - Protecting the Hosts File 33:21 - ARP Table and Network Security 35:34 - Disabling Remote Desktop Protocol (RDP) 36:47 - Task: Checking Active Firewall Profile 37:12 - Task: Verifying IP and ARP Table 39:32 - Upcoming Topics: Application and Storage Management 39:45 - Conclusion and Next Steps