Microsoft 365 security, compliance, and identity administration : plan and implement security and compliance strategies for Microsoft 365 and hybrid environments /
Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap the full potential of Microsoft security and complia...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing Ltd.,
2023.
|
Edición: | 1st edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Dedication
- Contributors
- Table of Contents
- Preface
- Part 1: Implementing and Managing Identity and Access
- Chapter 1: Planning for Hybrid Identity
- Planning your hybrid environment
- Authentication methods in Azure AD
- Multi-factor authentication
- Self-service password reset
- Conditional Access
- Passwordless authentication
- Synchronization methods with Azure AD Connect
- Password hash synchronization
- Pass-through authentication
- Federation
- Azure AD Seamless Single Sign-On
- Azure AD Connect cloud sync
- Event monitoring and troubleshooting in Azure AD Connect
- Summary
- Questions
- Further reading
- Chapter 2: Authentication and Security
- Implementing Azure AD dynamic group membership
- Creating a dynamic group in Azure AD using the Azure portal
- Creating dynamic groups with Azure AD PowerShell
- Using group-based licensing in Azure AD
- Implementing password management
- Setting up SSPR
- Registering for SSPR
- Using SSPR to reset passwords
- Combined registration for SSPR and MFA
- Implementing and managing external identities
- Implementing and managing MFA
- Enabling MFA
- Service settings
- Configuring secondary authentication methods
- Planning and implementing device authentication methods
- Summary
- Questions
- Further reading
- Chapter 3: Implementing Conditional Access Policies
- Explaining Conditional Access
- Creating a Simple Conditional Access policy
- Conditional Access and Microsoft Intune
- Introducing the types of Conditional Access
- Device-based Conditional Access
- App-based Conditional Access
- Monitoring Conditional Access events
- Summary
- Questions
- Further reading
- Chapter 4: Managing Roles and Identity Governance
- Planning and configuring PIM
- Planning PIM
- Configuring PIM
- Monitoring PIM
- Planning and configuring entitlement management
- Planning and configuring access reviews
- Summary
- Questions
- Further reading
- Chapter 5: Azure AD Identity Protection
- Understanding Identity Protection
- Protecting users with risk and registration policies
- Configuring user risk and sign-in risk policies
- Configuring MFA registration policies
- Configuring alert options
- Users at risk detected alerts
- Weekly digest
- Managing and resolving risk events
- Examining users at risk
- Examining risky sign-ins
- Examining risk detections
- Risky workload identities (preview)
- Risk-based Conditional Access policies
- Summary
- Questions
- Further reading
- Part 2: Implementing and Managing Threat Protection
- Chapter 6: Configuring a Microsoft Defender for Identity Solution
- Identifying the organizational need for MDI
- Understanding suspicious activity
- Exploring advanced attacks and malicious activities
- Understanding the MDI architecture
- Setting up MDI
- Prerequisites for MDI
- Installing and configuring MDI
- Additional configuration options