Microsoft 365 security, compliance, and identity administration : plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
(eBook)

Book Cover
Average Rating
Published
Birmingham, UK : Packt Publishing Ltd., 2023.
Format
eBook
Edition
1st edition.
Physical Desc
1 online resource (630 pages) : illustrations
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Syndetics Unbound

More Details

Language
English

Notes

Bibliography
Includes bibliographical references and index.
Description
Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap the full potential of Microsoft security and compliance suite Explore a range of strategies for effective security and compliance Gain practical knowledge to resolve real-world challenges Book Description The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments. With this book, you'll first configure, administer identity and access within Microsoft 365. You'll learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, you'll discover how RBAC and Azure AD Identity Protection can be used to detect risks and secure information in your organization. You'll also explore concepts such as Microsoft Defender for endpoint and identity, along with threat intelligence. As you progress, you'll uncover additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention (DLP), and Microsoft Defender for Cloud Apps. By the end of this book, you'll be well-equipped to manage and implement security measures within your Microsoft 365 suite successfully. What you will learn Get up to speed with implementing and managing identity and access Understand how to employ and manage threat protection Manage Microsoft 365's governance and compliance features Implement and manage information protection techniques Explore best practices for effective configuration and deployment Ensure security and compliance at all levels of Microsoft 365 Who this book is for This book is for IT professionals, administrators, or anyone looking to pursue a career in security administration and wants to enhance their skills in utilizing Microsoft 365 Security Administration. A basic understanding of administration principles of Microsoft 365 and Azure Active Directory is a must. A good grip of on-premises Active Directory will be beneficial.

Citations

APA Citation, 7th Edition (style guide)

Rising, P. (2023). Microsoft 365 security, compliance, and identity administration: plan and implement security and compliance strategies for Microsoft 365 and hybrid environments (1st edition.). Packt Publishing Ltd..

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Rising, Peter. 2023. Microsoft 365 Security, Compliance, and Identity Administration: Plan and Implement Security and Compliance Strategies for Microsoft 365 and Hybrid Environments. Packt Publishing Ltd.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Rising, Peter. Microsoft 365 Security, Compliance, and Identity Administration: Plan and Implement Security and Compliance Strategies for Microsoft 365 and Hybrid Environments Packt Publishing Ltd, 2023.

MLA Citation, 9th Edition (style guide)

Rising, Peter. Microsoft 365 Security, Compliance, and Identity Administration: Plan and Implement Security and Compliance Strategies for Microsoft 365 and Hybrid Environments 1st edition., Packt Publishing Ltd., 2023.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
b45c1b7d-a0ec-ddee-b3c5-7f890fde0493-eng
Go To Grouped Work

Grouping Information

Grouped Work IDb45c1b7d-a0ec-ddee-b3c5-7f890fde0493-eng
Full titlemicrosoft 365 security compliance and identity administration plan and implement security and compliance strategies for microsoft 365 and hybrid environments
Authorrising peter
Grouping Categorybook
Last Update2024-09-06 16:31:08PM
Last Indexed2024-09-25 04:01:20AM

Marc Record

First DetectedJul 29, 2024 04:08:35 PM
Last File Modification TimeSep 06, 2024 04:54:46 PM

MARC Record

LEADER06616cam a22004097i 4500
001on1396230092
003OCoLC
00520240830103855.0
006m     o  d        
007cr cnu|||unuuu
008230906s2023    enka    ob    001 0 eng d
020 |z 9781804611920
035 |a (OCoLC)1396230092
037 |a 9781804611920|b O'Reilly Media
040 |a ORMDA|b eng|e rda|e pn|c ORMDA|d OCLCO|d EBLCP|d OCLCQ|d OCLCF|d UKAHL
049 |a FMGA
050 4|a QA76.774.M44
08204|a 005.8|2 23/eng/20230906
1001 |a Rising, Peter,|e author.
24510|a Microsoft 365 security, compliance, and identity administration :|b plan and implement security and compliance strategies for Microsoft 365 and hybrid environments /|c Peter Rising.
250 |a 1st edition.
264 1|a Birmingham, UK :|b Packt Publishing Ltd.,|c 2023.
300 |a 1 online resource (630 pages) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
504 |a Includes bibliographical references and index.
5050 |a Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Implementing and Managing Identity and Access -- Chapter 1: Planning for Hybrid Identity -- Planning your hybrid environment -- Authentication methods in Azure AD -- Multi-factor authentication -- Self-service password reset -- Conditional Access -- Passwordless authentication -- Synchronization methods with Azure AD Connect -- Password hash synchronization -- Pass-through authentication -- Federation -- Azure AD Seamless Single Sign-On -- Azure AD Connect cloud sync
5058 |a Event monitoring and troubleshooting in Azure AD Connect -- Summary -- Questions -- Further reading -- Chapter 2: Authentication and Security -- Implementing Azure AD dynamic group membership -- Creating a dynamic group in Azure AD using the Azure portal -- Creating dynamic groups with Azure AD PowerShell -- Using group-based licensing in Azure AD -- Implementing password management -- Setting up SSPR -- Registering for SSPR -- Using SSPR to reset passwords -- Combined registration for SSPR and MFA -- Implementing and managing external identities -- Implementing and managing MFA -- Enabling MFA
5058 |a Service settings -- Configuring secondary authentication methods -- Planning and implementing device authentication methods -- Summary -- Questions -- Further reading -- Chapter 3: Implementing Conditional Access Policies -- Explaining Conditional Access -- Creating a Simple Conditional Access policy -- Conditional Access and Microsoft Intune -- Introducing the types of Conditional Access -- Device-based Conditional Access -- App-based Conditional Access -- Monitoring Conditional Access events -- Summary -- Questions -- Further reading -- Chapter 4: Managing Roles and Identity Governance
5058 |a Planning and configuring PIM -- Planning PIM -- Configuring PIM -- Monitoring PIM -- Planning and configuring entitlement management -- Planning and configuring access reviews -- Summary -- Questions -- Further reading -- Chapter 5: Azure AD Identity Protection -- Understanding Identity Protection -- Protecting users with risk and registration policies -- Configuring user risk and sign-in risk policies -- Configuring MFA registration policies -- Configuring alert options -- Users at risk detected alerts -- Weekly digest -- Managing and resolving risk events -- Examining users at risk
5058 |a Examining risky sign-ins -- Examining risk detections -- Risky workload identities (preview) -- Risk-based Conditional Access policies -- Summary -- Questions -- Further reading -- Part 2: Implementing and Managing Threat Protection -- Chapter 6: Configuring a Microsoft Defender for Identity Solution -- Identifying the organizational need for MDI -- Understanding suspicious activity -- Exploring advanced attacks and malicious activities -- Understanding the MDI architecture -- Setting up MDI -- Prerequisites for MDI -- Installing and configuring MDI -- Additional configuration options
520 |a Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap the full potential of Microsoft security and compliance suite Explore a range of strategies for effective security and compliance Gain practical knowledge to resolve real-world challenges Book Description The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments. With this book, you'll first configure, administer identity and access within Microsoft 365. You'll learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, you'll discover how RBAC and Azure AD Identity Protection can be used to detect risks and secure information in your organization. You'll also explore concepts such as Microsoft Defender for endpoint and identity, along with threat intelligence. As you progress, you'll uncover additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention (DLP), and Microsoft Defender for Cloud Apps. By the end of this book, you'll be well-equipped to manage and implement security measures within your Microsoft 365 suite successfully. What you will learn Get up to speed with implementing and managing identity and access Understand how to employ and manage threat protection Manage Microsoft 365's governance and compliance features Implement and manage information protection techniques Explore best practices for effective configuration and deployment Ensure security and compliance at all levels of Microsoft 365 Who this book is for This book is for IT professionals, administrators, or anyone looking to pursue a career in security administration and wants to enhance their skills in utilizing Microsoft 365 Security Administration. A basic understanding of administration principles of Microsoft 365 and Azure Active Directory is a must. A good grip of on-premises Active Directory will be beneficial.
650 0|a Computer security|x Management.
650 0|a Microsoft software.|0 http://id.loc.gov/authorities/subjects/sh94005975
650 0|a Electronic data processing personnel|x Certification|v Study guides.
85640|u https://www.aclib.us/OReilly