Securing endpoints
When I described some of the different ransomware attacks in Chapter 1, often, many of them started with a single compromised endpoint that then allowed the attacker to use that as an entry point to the infrastructure.
Therefore, it is important to secure your endpoints. We do not want to have a compromised machine that attackers can use to attack our infrastructure.
So, what is important when it comes to securing a Windows-based endpoint? Consider the following:
- Having centralized management – This allows us to centrally manage security mechanisms and apply security configuration to the endpoints. It also allows us to change the configuration of the endpoint according to new guidance and features from Microsoft.
- Update Management – This allows us to centrally deploy operating system and software updates to the machines. Patching software is crucial to ensure that attackers are not able to exploit new vulnerabilities on the operating...