O'Reilly logo

Microsoft System Center Endpoint Protection Cookbook - Second Edition by Nicolai Henriksen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Monitoring infectious outbreaks

If you don't want to go as far as implementing AppLocker as described in the preceding recipe, there is another method that you can consider.

We will look into how to protect your computers with more tools than System Center Endpoint Protection will give you. We will be looking at scenarios for the Enhanced Mitigation Experience Toolkit (EMET).

Another possibility that we can investigate is simply blocking certain file extensions that all known cryptolocker and ransomware programs use, such as .locky, and .zepto. Later in this chapter I will show you how you can achieve this.

How to do it…

First, Exploits need some explaining.

These are vulnerability holes in software installed on computers. Malware can slip through ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required