Summary
In this chapter, we looked at how to modify enterprise capabilities to enhance security, including the implementation of firewall rules as well as IDS and IPS to protect our perimeter and internal networks, respectively. The final sections examined secure protocols and email security, before exploring DLP and how it can be used to prevent sensitive data from leaving our network.
The knowledge gained in this chapter will prepare you to answer any questions relating to Exam Objective 4.5 in your CompTIA Security+ certification exam.
The next chapter will be Chapter 19, Given a scenario, implement and maintain identity and access management.