Cargando…

Microsoft 365 security, compliance, and identity administration : plan and implement security and compliance strategies for Microsoft 365 and hybrid environments /

Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap the full potential of Microsoft security and complia...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rising, Peter (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing Ltd., 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Dedication
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Implementing and Managing Identity and Access
  • Chapter 1: Planning for Hybrid Identity
  • Planning your hybrid environment
  • Authentication methods in Azure AD
  • Multi-factor authentication
  • Self-service password reset
  • Conditional Access
  • Passwordless authentication
  • Synchronization methods with Azure AD Connect
  • Password hash synchronization
  • Pass-through authentication
  • Federation
  • Azure AD Seamless Single Sign-On
  • Azure AD Connect cloud sync
  • Event monitoring and troubleshooting in Azure AD Connect
  • Summary
  • Questions
  • Further reading
  • Chapter 2: Authentication and Security
  • Implementing Azure AD dynamic group membership
  • Creating a dynamic group in Azure AD using the Azure portal
  • Creating dynamic groups with Azure AD PowerShell
  • Using group-based licensing in Azure AD
  • Implementing password management
  • Setting up SSPR
  • Registering for SSPR
  • Using SSPR to reset passwords
  • Combined registration for SSPR and MFA
  • Implementing and managing external identities
  • Implementing and managing MFA
  • Enabling MFA
  • Service settings
  • Configuring secondary authentication methods
  • Planning and implementing device authentication methods
  • Summary
  • Questions
  • Further reading
  • Chapter 3: Implementing Conditional Access Policies
  • Explaining Conditional Access
  • Creating a Simple Conditional Access policy
  • Conditional Access and Microsoft Intune
  • Introducing the types of Conditional Access
  • Device-based Conditional Access
  • App-based Conditional Access
  • Monitoring Conditional Access events
  • Summary
  • Questions
  • Further reading
  • Chapter 4: Managing Roles and Identity Governance
  • Planning and configuring PIM
  • Planning PIM
  • Configuring PIM
  • Monitoring PIM
  • Planning and configuring entitlement management
  • Planning and configuring access reviews
  • Summary
  • Questions
  • Further reading
  • Chapter 5: Azure AD Identity Protection
  • Understanding Identity Protection
  • Protecting users with risk and registration policies
  • Configuring user risk and sign-in risk policies
  • Configuring MFA registration policies
  • Configuring alert options
  • Users at risk detected alerts
  • Weekly digest
  • Managing and resolving risk events
  • Examining users at risk
  • Examining risky sign-ins
  • Examining risk detections
  • Risky workload identities (preview)
  • Risk-based Conditional Access policies
  • Summary
  • Questions
  • Further reading
  • Part 2: Implementing and Managing Threat Protection
  • Chapter 6: Configuring a Microsoft Defender for Identity Solution
  • Identifying the organizational need for MDI
  • Understanding suspicious activity
  • Exploring advanced attacks and malicious activities
  • Understanding the MDI architecture
  • Setting up MDI
  • Prerequisites for MDI
  • Installing and configuring MDI
  • Additional configuration options