
Mastering Microsoft 365 Security Technologies
Design and implement Microsoft security, compliance, and identity (English Edition)
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Mastering Microsoft 365 Security Technologies
Design and implement Microsoft security, compliance, and identity (English Edition)
About this book
Description
Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape.This book will introduce readers to Microsoft security solutions. It covers Microsoft Defender, Microsoft Entra ID, and Microsoft Purview. Readers will learn how they can protect their organization across different attack vectors such as email, identity, data, endpoints, and applications. It discusses how to protect the user identities using Microsoft Entra ID, protect devices and applications using Microsoft Defender and Microsoft Sentinel, and protect organization data using Microsoft Purview. With a focus on real-world scenarios, hands-on labs, and expert guidance, cybersecurity professionals will gain a deep understanding of Microsoft security solutions and how to use them to protect their organizations from bad actors.By the end of this book, you will possess the practical knowledge and skills to design, implement, and manage a strong security posture across your organization's Microsoft infrastructure, confidently protecting identities, data, and applications from modern cyberattacks.
What you will learn
? Data security and governance using Microsoft Purview information protection and DLP.
? Protecting devices, identities, M365, and non-M365 applications using Microsoft Defender.
? Microsoft's Zero Trust Network Access solution â secure services edge.
? Manage Entra ID users, groups, RBAC, Admin Units, Protected Actions effectively.
? Managing regulatory compliance and privacy.
Who this book is for
This book is ideal for IT professionals and administrators seeking careers in security administration using Microsoft security technologies. Readers need foundational cloud computing knowledge (IaaS, PaaS, SaaS), basic M365 cloud and Azure familiarity, plus awareness of Zero Trust, identity and access, and platform protection.
Table of Contents
1. Introduction to Microsoft Entra
2. Implementing Identity
3. Identity Management
4. Identity Protection
5. Identity Governance
6. Microsoft Defender XDR
7. Protecting Identities
8. Protecting Endpoints
9. Protecting M365 Apps
10. Protecting Non-Microsoft Cloud Apps
11. Security Management Using Microsoft Sentinel
12. Protect and Govern Sensitive Data
13. Managing Insider Risks
14. Managing eDiscovery Cases
15. Managing Regulatory Compliance
16. Managing Privacy
17. Best Practices
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Reviewers
- Acknowledgement
- Preface
- Table of Contents
- 1.âIntroduction to Microsoft Entra
- 2.âImplementing Identity
- 3.âIdentity Management
- 4.âIdentity Protection
- 5.âIdentity Governance
- 6.âMicrosoft Defender XDR
- 7.âProtecting Identities
- 8.âProtecting Endpoints
- 9.âProtecting M365 Apps
- 10.âProtecting Non-Microsoft Cloud Apps
- 11.âSecurity Management Using Microsoft Sentinel
- 12.âProtect and Govern Sensitive Data
- 13.âManaging Insider Risks
- 14.âManaging eDiscovery Cases
- 15.âManaging Regulatory Compliance
- 16.âManaging Privacy
- 17.âBest Practices
- Index