Summary

In this chapter, you learned about the current situation and the basics of securing the execution of PowerShell by mitigating and possibly responding to attacks. There is a huge number of technical security controls and dependencies available, which makes the topic a very complex one. Try to start with the implementation of the most important technical security controls, and build up and follow a roadmap afterwards. Always validate how many resources you want to invest into a specific task and whether it's worth it. In the next chapter, we will dive into Just Enough Administration, which is one more tool for your security strategy. 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.83.150