Part IIISecurity Monitoring Scenarios

 

In This Part

Chapter 4: Account Logon

Chapter 5: Local User Accounts

Chapter 6: Local Security Groups

Chapter 7: Microsoft Active Directory

Chapter 8: Active Directory Objects

Chapter 9: Authentication Protocols

Chapter 10: Operating System Events

Chapter 11: Logon Rights and User Privileges

Chapter 12: Windows Applications

Chapter 13: Filesystem and Removable Storage

Chapter 14: Windows Registry

Chapter 15: Network File Shares and Named Pipes

Get Windows Security Monitoring now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.