Cargando…

Mastering Microsoft 365 defender implement Microsoft Defender for endpoint, identity, cloud apps, and Office 365 and respond to threats /

Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ebook Key Features Help in understanding Microsoft 365 Defender and how it is crucial for secur...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Campbell, Ruairidh (Autor), Hedberg, Viktor (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1390189335
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 230713s2023 enk o 000 0 eng d
040 |a YDX  |b eng  |c YDX  |d ORMDA  |d EBLCP  |d OCLCQ  |d IEEEE  |d OCLCO 
019 |a 1390122600  |a 1390557802 
020 |a 9781803240749  |q (electronic bk.) 
020 |a 1803240741  |q (electronic bk.) 
020 |z 9781803241708 
020 |z 1803241705 
035 |a (OCoLC)1390189335  |z (OCoLC)1390122600  |z (OCoLC)1390557802 
037 |a 9781803241708  |b O'Reilly Media 
037 |a 10251381  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230808 
049 |a UAMI 
100 1 |a Campbell, Ruairidh,  |e author. 
245 1 0 |a Mastering Microsoft 365 defender  |h [electronic resource] :  |b implement Microsoft Defender for endpoint, identity, cloud apps, and Office 365 and respond to threats /  |c Ru Campbell, Viktor Hedberg. 
250 |a 1st edition. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2023. 
300 |a 1 online resource 
520 |a Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ebook Key Features Help in understanding Microsoft 365 Defender and how it is crucial for security operations Implementation of the proactive security defense capabilities of Microsoft Defender for Endpoint, Identity, Office 365, and Cloud Apps so that attacks can be stopped before they start A guide to hunting and responding to threats using M365D's extended detection and response capabilities Book Description This book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively. You'll start with a quick overview of cybersecurity risks that modern organizations face, such as ransomware and APT attacks, how Microsoft is making massive investments in security today, and gain an understanding of how to deploy Microsoft Defender for Endpoint by diving deep into configurations and their architecture. As you progress, you'll learn how to configure Microsoft Defender Antivirus, and onboard and manage macOS, Android, and Linux MDE devices for effective solutions. You'll also learn how to deploy Microsoft Defender for Identity and explore its different deployment methods that can protect your hybrid identity platform, as well as how to configure Microsoft Defender for Office 365 and Cloud Apps, and manage KQL queries for advanced hunting with ease. Toward the end, you'll find out how M365D can be integrated with Sentinel and how to use APIs for incident response. By the end of this book, you will have a deep understanding of Microsoft 365 Defender, and how to protect and respond to security threats. What you will learn Understand the Threat Landscape for enterprises Effectively implement end-point security Manage identity and access management using Microsoft 365 defender Protect the productivity suite with Microsoft Defender for Office 365 Hunting for threats using Microsoft 365 Defender Who this book is for You're a security engineer, incident responder, blue teamer, or an IT security professional who wants to deploy and manage Microsoft 365 Defender services and successfully investigate and respond tocyber threats You have a basic understanding of networking, vulnerabilities, operating systems, email, Active Directory, and cloud apps. 
505 0 |a Table of Contents Microsoft and Modern Cybersecurity Threats Microsoft 365 Defender: The Big Picture The Fundamentals of Microsoft Defender for Endpoint Onboarding Windows Clients and Servers Getting Started with Microsoft Defender Antivirus for Windows Advanced Microsoft Defender Antivirus for Windows Managing Attack Surface Reduction for Windows Managing Additional Capabilities for Windows Onboarding and Managing macOS Onboarding and Managing Linux Servers Onboarding and Managing iOS and Android Deploying Microsoft Defender for Identity Managing Defender for Identity Deploying Exchange Online Protection Deploying Defender for Office 365 Implementing and Managing Microsoft Defender for Cloud Apps Maintaining Security Hygiene and Threat Awareness Extended Detection and Response with Microsoft 365 Defender Advanced Hunting with KQL Microsoft Sentinel Integration Understanding Microsoft 365 Defender APIs Glossary Answers. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Microsoft software. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels Microsoft. 
700 1 |a Hedberg, Viktor,  |e author. 
776 0 8 |i Print version:  |z 9781803240749 
776 0 8 |i Print version:  |z 9781803241708  |z 1803241705  |w (OCoLC)1381121702 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803241708/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 305570507 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30623856 
994 |a 92  |b IZTAP