舉報

會員
Microsoft 365 Security Administration:MS-500 Exam Guide
最新章節(jié):
Other Books You May Enjoy
TheMicrosoft365SecurityAdministration(MS-500)examisdesignedtomeasureyourabilitytoperformtechnicaltaskssuchasmanaging,implementing,andmonitoringsecurityandcompliancesolutionsforMicrosoft365environments.ThisbookstartsbyshowingyouhowtoconfigureandadministeridentityandaccesswithinMicrosoft365.Youwilllearnabouthybrididentity,authenticationmethods,andconditionalaccesspolicieswithMicrosoftIntune.Next,thebookshowsyouhowRBACandAzureADIdentityProtectioncanbeusedtohelpyoudetectrisksandsecureinformationinyourorganization.Youwillalsoexploreconcepts,suchasAdvancedThreatProtection,WindowsDefenderATP,andThreatIntelligence.Asyouprogress,youwilllearnaboutadditionaltoolsandtechniquestoconfigureandmanageMicrosoft365,includingAzureInformationProtection,DataLossPrevention,andCloudAppDiscoveryandSecurity.Thebookalsoensuresyouarewellpreparedtotaketheexambygivingyoutheopportunitytoworkthroughamockpaper,topicsummaries,illustrationsthatbrieflyreviewkeypoints,andreal-worldscenarios.BytheendofthisMicrosoft365book,youwillbeabletoapplyyourskillsintherealworld,whilealsobeingwellpreparedtoachieveMicrosoftcertification.
目錄(178章)
倒序
- 封面
- 版權信息
- Why subscribe?
- Contributors About the author
- About the reviewers
- Packt is searching for authors like you
- Preface
- Section 1: Configuring and Administering Identity and Access in Microsoft 365
- Chapter 1: Planning for Hybrid Identity
- Planning your hybrid environment
- Synchronization methods with Azure AD Connect
- Additional authentication security
- Event monitoring and troubleshooting in Azure AD Connect
- Summary
- Questions
- References
- Chapter 2: Authentication and Security
- Implementing Azure AD dynamic group membership
- Implementing Azure AD self-service password reset (SSPR)
- Implementing and managing Multi-Factor Authentication (MFA)
- Managing Azure AD access reviews
- Summary
- Questions
- References
- Chapter 3: Implementing Conditional Access Policies
- Explaining Conditional Access
- Enhancing Conditional Access with Intune
- Device-based Conditional Access
- App-based Conditional Access
- Monitoring Conditional Access events
- Summary
- Questions
- References
- Chapter 4: Role Assignment and Privileged Identities in Microsoft 365
- Planning configuring and monitoring RBAC
- Planning configuring and monitoring PIM
- Summary
- Questions
- References
- Chapter 5: Azure AD Identity Protection
- Understanding Identity Protection
- Configuring MFA registration policies
- Configuring alert options
- Managing and resolving risk events
- Summary
- Questions
- References
- Section 2: Implementing and Managing Threat Protection
- Chapter 6: Configuring an Advanced Threat Protection Solution
- Identifying the organizational needs for Azure ATP
- Setting up an Azure ATP instance
- Managing Azure ATP activities
- Summary
- Questions
- References
- Chapter 7: Configuring Microsoft Defender ATP to Protect Devices
- Technical requirements
- Implementing Microsoft Defender ATP
- Managing and monitoring Microsoft Defender ATP
- Implementing additional Microsoft Defender features
- Managing device encryption for your Windows 10 devices
- Summary
- Questions
- References
- Chapter 8: Message Protection in Office 365
- Protecting users and domains with ATP anti-phishing protection and policies
- Configuring Office 365 anti-spam protection
- Exploring Office 365 ATP Safe Attachments options and policies
- Exploring Office 365 ATP Safe Links options blocked URLs and policies
- Summary
- Questions
- References
- Chapter 9: Threat Intelligence and Tracking
- Understanding the Office 365 threat management security dashboard
- Using Office 365 Threat Explorer and threat trackers
- Managing quarantined messages and files
- Performing controlled simulated attacks
- Summary
- Questions
- References
- Section 3: Information Protection in Microsoft 365
- Chapter 10: Controlling Secure Access to Information Stored in Office 365
- Understanding privileged access management
- Understanding Customer Lockbox
- Protecting access to the collaboration components of Office 365
- Allowing external user access with B2B sharing
- Summary
- Questions
- References
- Chapter 11: Azure Information Protection
- Planning and implementing an AIP deployment for your organization
- Setting up AIP labels and policies
- Using the AIP Scanner to detect and protect on-premises content
- Tracking and revoking protected documents
- Summary
- Questions
- References
- Chapter 12: Data Loss Prevention
- Planning and implementing DLP
- Creating DLP policies and assigning them to Office 365 locations
- Managing sensitive information types
- DLP reporting and alerting capabilities
- Summary
- Questions
- References
- Chapter 13: Cloud App Discovery and Security
- Understanding Cloud App Security
- Configuring Cloud App Security
- Using the Cloud App Security dashboard reports and logs
- Summary
- Questions
- References
- Section 4: Data Governance and Compliance in Microsoft 365
- Chapter 14: Security Analytics and Auditing Capabilities
- Understanding Desktop Analytics Windows diagnostics and Office Telemetry
- Configuring Office 365 auditing
- Performing an audit log search
- Configuring an audit alert policy
- Summary
- Questions
- References
- Chapter 15: Personal Data Protection in Microsoft 365
- Conducting searches for personal data
- Using retention labels to protect personal data
- Accessing logs and reports to search for and monitor personal data leaks
- Summary
- Questions
- References
- Chapter 16: Data Governance and Retention
- Understanding data governance and the retention requirements for your organization
- Navigating data governance reports and dashboards
- Configuring retention tags retention policies and supervision policies
- Configuring litigation holds to preserve Office 365 data
- Importing data into Office 365 from the Security & Compliance Center
- Configuring archiving
- Summary
- Questions
- References
- Chapter 17: Search and Investigation
- Understanding eDiscovery and content search in Microsoft 365
- eDiscovery delegated role groups
- Creating eDiscovery cases placing locations on hold and performing content searches
- Exporting content search results
- Summary
- Questions
- References
- Chapter 18: Data Privacy Compliance
- Planning for regulatory compliance in Microsoft 365
- Accessing the GDPR dashboards and reports
- Completing DSRs
- Summary
- Questions
- References
- Section 5: Mock Exam and Assessment
- Chapter 19: Mock Exam
- Case Study
- Chapter 20: Mock Exam Answers
- Answers and explanations
- Chapter 21: Assessments
- Chapter 1 – Planning for Hybrid Identity
- Chapter 2 – Authentication and Security
- Chapter 3 – Implementing Conditional Access Policies
- Chapter 4 – Role Assignment and Privileged Identities in Microsoft 365
- Chapter 5 – Azure AD Identity Protection
- Chapter 6 – Configuring an Advanced Threat Protection Solution
- Chapter 7 – Configuring Microsoft Defender ATP to Protect Devices
- Chapter 8 – Message Protection in Office 365
- Chapter 9 – Threat Intelligence and Tracking
- Chapter 10 – Controlling Secure Access to Information Stored in Office 365
- Chapter 11 – Azure Information Protection
- Chapter 12 – Data Loss Prevention
- Chapter 13 – Cloud App Discovery and Security
- Chapter 14 – Security Analytics and Auditing Capabilities
- Chapter 15 – Personal Data Protection in Microsoft 365
- Chapter 16 – Data Governance and Retention
- Chapter 17 – Search and Investigation
- Chapter 18 – Data Privacy Compliance
- Other Books You May Enjoy 更新時間:2021-06-18 18:58:09
推薦閱讀
- CTF實戰(zhàn):技術、解題與進階
- 黑客大曝光:無線網(wǎng)絡安全(原書第3版)
- Metasploit Penetration Testing Cookbook(Second Edition)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實錄
- Wireshark 2 Quick Start Guide
- 走進新安全:讀懂網(wǎng)絡安全威脅、技術與新思想
- Mastering Kali Linux for Advanced Penetration Testing
- 網(wǎng)絡安全技術及應用(第3版)
- API安全技術與實戰(zhàn)
- 從實踐中學習密碼安全與防護
- 捍衛(wèi)隱私
- 數(shù)字銀行安全體系構建
- Instant OSSEC Host-based Intrusion Detection System
- 計算機網(wǎng)絡安全與應用技術(第2版)
- 大中型網(wǎng)絡入侵要案直擊與防御
- 商用密碼應用與安全性評估
- 復雜網(wǎng)絡環(huán)境下訪問控制技術
- 從實踐中學習Web防火墻構建
- Securing Docker
- 網(wǎng)絡關鍵設備安全通用要求解讀
- Android Security Cookbook
- 漏洞
- 機器學習互聯(lián)網(wǎng)業(yè)務安全實踐
- 網(wǎng)絡安全之機器學習
- 計算機網(wǎng)絡安全與防護
- 網(wǎng)絡空間安全通識教程
- 黑客攻防從入門到精通(社會工程學篇)
- 內(nèi)網(wǎng)滲透實戰(zhàn)攻略
- Mastering Azure Security