|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1396230092 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
230906s2023 enka ob 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCO
|d EBLCP
|
020 |
|
|
|z 9781804611920
|
035 |
|
|
|a (OCoLC)1396230092
|
037 |
|
|
|a 9781804611920
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.774.M44
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230906
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rising, Peter,
|e author.
|
245 |
1 |
0 |
|a Microsoft 365 security, compliance, and identity administration :
|b plan and implement security and compliance strategies for Microsoft 365 and hybrid environments /
|c Peter Rising.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing Ltd.,
|c 2023.
|
300 |
|
|
|a 1 online resource (630 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap the full potential of Microsoft security and compliance suite Explore a range of strategies for effective security and compliance Gain practical knowledge to resolve real-world challenges Book Description The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments. With this book, you'll first configure, administer identity and access within Microsoft 365. You'll learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, you'll discover how RBAC and Azure AD Identity Protection can be used to detect risks and secure information in your organization. You'll also explore concepts such as Microsoft Defender for endpoint and identity, along with threat intelligence. As you progress, you'll uncover additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention (DLP), and Microsoft Defender for Cloud Apps. By the end of this book, you'll be well-equipped to manage and implement security measures within your Microsoft 365 suite successfully. What you will learn Get up to speed with implementing and managing identity and access Understand how to employ and manage threat protection Manage Microsoft 365's governance and compliance features Implement and manage information protection techniques Explore best practices for effective configuration and deployment Ensure security and compliance at all levels of Microsoft 365 Who this book is for This book is for IT professionals, administrators, or anyone looking to pursue a career in security administration and wants to enhance their skills in utilizing Microsoft 365 Security Administration. A basic understanding of administration principles of Microsoft 365 and Azure Active Directory is a must. A good grip of on-premises Active Directory will be beneficial.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Implementing and Managing Identity and Access -- Chapter 1: Planning for Hybrid Identity -- Planning your hybrid environment -- Authentication methods in Azure AD -- Multi-factor authentication -- Self-service password reset -- Conditional Access -- Passwordless authentication -- Synchronization methods with Azure AD Connect -- Password hash synchronization -- Pass-through authentication -- Federation -- Azure AD Seamless Single Sign-On -- Azure AD Connect cloud sync
|
505 |
8 |
|
|a Event monitoring and troubleshooting in Azure AD Connect -- Summary -- Questions -- Further reading -- Chapter 2: Authentication and Security -- Implementing Azure AD dynamic group membership -- Creating a dynamic group in Azure AD using the Azure portal -- Creating dynamic groups with Azure AD PowerShell -- Using group-based licensing in Azure AD -- Implementing password management -- Setting up SSPR -- Registering for SSPR -- Using SSPR to reset passwords -- Combined registration for SSPR and MFA -- Implementing and managing external identities -- Implementing and managing MFA -- Enabling MFA
|
505 |
8 |
|
|a Service settings -- Configuring secondary authentication methods -- Planning and implementing device authentication methods -- Summary -- Questions -- Further reading -- Chapter 3: Implementing Conditional Access Policies -- Explaining Conditional Access -- Creating a Simple Conditional Access policy -- Conditional Access and Microsoft Intune -- Introducing the types of Conditional Access -- Device-based Conditional Access -- App-based Conditional Access -- Monitoring Conditional Access events -- Summary -- Questions -- Further reading -- Chapter 4: Managing Roles and Identity Governance
|
505 |
8 |
|
|a Planning and configuring PIM -- Planning PIM -- Configuring PIM -- Monitoring PIM -- Planning and configuring entitlement management -- Planning and configuring access reviews -- Summary -- Questions -- Further reading -- Chapter 5: Azure AD Identity Protection -- Understanding Identity Protection -- Protecting users with risk and registration policies -- Configuring user risk and sign-in risk policies -- Configuring MFA registration policies -- Configuring alert options -- Users at risk detected alerts -- Weekly digest -- Managing and resolving risk events -- Examining users at risk
|
505 |
8 |
|
|a Examining risky sign-ins -- Examining risk detections -- Risky workload identities (preview) -- Risk-based Conditional Access policies -- Summary -- Questions -- Further reading -- Part 2: Implementing and Managing Threat Protection -- Chapter 6: Configuring a Microsoft Defender for Identity Solution -- Identifying the organizational need for MDI -- Understanding suspicious activity -- Exploring advanced attacks and malicious activities -- Understanding the MDI architecture -- Setting up MDI -- Prerequisites for MDI -- Installing and configuring MDI -- Additional configuration options
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Microsoft software.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Logiciels Microsoft.
|
655 |
|
0 |
|a Electronic books.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781804611920/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30671943
|
994 |
|
|
|a 92
|b IZTAP
|