Part IIISecurity Monitoring Scenarios
In This Part
Chapter 4: Account Logon
Chapter 5: Local User Accounts
Chapter 6: Local Security Groups
Chapter 7: Microsoft Active Directory
Chapter 8: Active Directory Objects
Chapter 9: Authentication Protocols
Chapter 10: Operating System Events
Chapter 11: Logon Rights and User Privileges
Chapter 12: Windows Applications
Chapter 13: Filesystem and Removable Storage
Chapter 14: Windows Registry
Chapter 15: Network File Shares and Named Pipes
Get Windows Security Monitoring now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.