Close DescriptionMicrosoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape.This book will introduce readers to Microsoft security solutions. It covers Microsoft Defender, Microsoft Entra ID, and Microsoft Purview. Readers will learn how they can protect their organization across different attack vectors such as email, identity, data, endpoints, and applications. It discusses how to protect the user identities using Microsoft Entra ID, protect devices and applications using Microsoft Defender and Microsoft Sentinel, and protect organization data using Microsoft Purview. With a focus on real-world scenarios, hands-on labs, and expert guidance, cybersecurity professionals will gain a deep understanding of Microsoft security solutions and how to use them to protect their organizations from bad actors.By the end of this book, you will possess the practical knowledge and skills to design, implement, and manage a strong security posture across your organization's Microsoft infrastructure, confidently protecting identities, data, and applications from modern cyberattacks.What you will learn? Data security and governance using Microsoft Purview information protection and DLP.? Protecting devices, identities, M365, and non-M365 applications using Microsoft Defender.? Microsoft’s Zero Trust Network Access solution – secure services edge.? Manage Entra ID users, groups, RBAC, Admin Units, Protected Actions effectively.? Managing regulatory compliance and privacy.Who this book is forThis book is ideal for IT professionals and administrators seeking careers in security administration using Microsoft security technologies. Readers need foundational cloud computing knowledge (IaaS, PaaS, SaaS), basic M365 cloud and Azure familiarity, plus awareness of Zero Trust, identity and access, and platform protection.Table of Contents1. Introduction to Microsoft Entra2. Implementing Identity3. Identity Management4. Identity Protection5. Identity Governance6. Microsoft Defender XDR7. Protecting Identities8. Protecting Endpoints9. Protecting M365 Apps10. Protecting Non-Microsoft Cloud Apps11. Security Management Using Microsoft Sentinel12. Protect and Govern Sensitive Data13. Managing Insider Risks14. Managing eDiscovery Cases15. Managing Regulatory Compliance16. Managing Privacy17. Best Practices
Back

Mastering Microsoft 365 Security Technologies

QRcode

Design and implement Microsoft security, compliance, and identity (English Edition)

DescriptionMicrosoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape.This book will intro

Voir toute la description...

Auteur(s): Bhatnagar, Pramiti

Editeur: BPB Publications

Année de Publication: 2025

pages: 725

Langue: Anglais

ISBN: 978-93-6589-287-1

DescriptionMicrosoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape.This book will intro

Voir toute la description...

Découvrez aussi...