舉報

會員
Microsoft 365 Security Administration:MS-500 Exam Guide
TheMicrosoft365SecurityAdministration(MS-500)examisdesignedtomeasureyourabilitytoperformtechnicaltaskssuchasmanaging,implementing,andmonitoringsecurityandcompliancesolutionsforMicrosoft365environments.ThisbookstartsbyshowingyouhowtoconfigureandadministeridentityandaccesswithinMicrosoft365.Youwilllearnabouthybrididentity,authenticationmethods,andconditionalaccesspolicieswithMicrosoftIntune.Next,thebookshowsyouhowRBACandAzureADIdentityProtectioncanbeusedtohelpyoudetectrisksandsecureinformationinyourorganization.Youwillalsoexploreconcepts,suchasAdvancedThreatProtection,WindowsDefenderATP,andThreatIntelligence.Asyouprogress,youwilllearnaboutadditionaltoolsandtechniquestoconfigureandmanageMicrosoft365,includingAzureInformationProtection,DataLossPrevention,andCloudAppDiscoveryandSecurity.Thebookalsoensuresyouarewellpreparedtotaketheexambygivingyoutheopportunitytoworkthroughamockpaper,topicsummaries,illustrationsthatbrieflyreviewkeypoints,andreal-worldscenarios.BytheendofthisMicrosoft365book,youwillbeabletoapplyyourskillsintherealworld,whilealsobeingwellpreparedtoachieveMicrosoftcertification.
最新章節
- Other Books You May Enjoy
- Chapter 18 – Data Privacy Compliance
- Chapter 17 – Search and Investigation
- Chapter 16 – Data Governance and Retention
- Chapter 15 – Personal Data Protection in Microsoft 365
- Chapter 14 – Security Analytics and Auditing Capabilities
品牌:中圖公司
上架時間:2021-06-18 18:00:43
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Other Books You May Enjoy 更新時間:2021-06-18 18:58:09
- Chapter 18 – Data Privacy Compliance
- Chapter 17 – Search and Investigation
- Chapter 16 – Data Governance and Retention
- Chapter 15 – Personal Data Protection in Microsoft 365
- Chapter 14 – Security Analytics and Auditing Capabilities
- Chapter 13 – Cloud App Discovery and Security
- Chapter 12 – Data Loss Prevention
- Chapter 11 – Azure Information Protection
- Chapter 10 – Controlling Secure Access to Information Stored in Office 365
- Chapter 9 – Threat Intelligence and Tracking
- Chapter 8 – Message Protection in Office 365
- Chapter 7 – Configuring Microsoft Defender ATP to Protect Devices
- Chapter 6 – Configuring an Advanced Threat Protection Solution
- Chapter 5 – Azure AD Identity Protection
- Chapter 4 – Role Assignment and Privileged Identities in Microsoft 365
- Chapter 3 – Implementing Conditional Access Policies
- Chapter 2 – Authentication and Security
- Chapter 1 – Planning for Hybrid Identity
- Chapter 21: Assessments
- Answers and explanations
- Chapter 20: Mock Exam Answers
- Case Study
- Chapter 19: Mock Exam
- Section 5: Mock Exam and Assessment
- References
- Questions
- Summary
- Completing DSRs
- Accessing the GDPR dashboards and reports
- Planning for regulatory compliance in Microsoft 365
- Chapter 18: Data Privacy Compliance
- References
- Questions
- Summary
- Exporting content search results
- Creating eDiscovery cases placing locations on hold and performing content searches
- eDiscovery delegated role groups
- Understanding eDiscovery and content search in Microsoft 365
- Chapter 17: Search and Investigation
- References
- Questions
- Summary
- Configuring archiving
- Importing data into Office 365 from the Security & Compliance Center
- Configuring litigation holds to preserve Office 365 data
- Configuring retention tags retention policies and supervision policies
- Navigating data governance reports and dashboards
- Understanding data governance and the retention requirements for your organization
- Chapter 16: Data Governance and Retention
- References
- Questions
- Summary
- Accessing logs and reports to search for and monitor personal data leaks
- Using retention labels to protect personal data
- Conducting searches for personal data
- Chapter 15: Personal Data Protection in Microsoft 365
- References
- Questions
- Summary
- Configuring an audit alert policy
- Performing an audit log search
- Configuring Office 365 auditing
- Understanding Desktop Analytics Windows diagnostics and Office Telemetry
- Chapter 14: Security Analytics and Auditing Capabilities
- Section 4: Data Governance and Compliance in Microsoft 365
- References
- Questions
- Summary
- Using the Cloud App Security dashboard reports and logs
- Configuring Cloud App Security
- Understanding Cloud App Security
- Chapter 13: Cloud App Discovery and Security
- References
- Questions
- Summary
- DLP reporting and alerting capabilities
- Managing sensitive information types
- Creating DLP policies and assigning them to Office 365 locations
- Planning and implementing DLP
- Chapter 12: Data Loss Prevention
- References
- Questions
- Summary
- Tracking and revoking protected documents
- Using the AIP Scanner to detect and protect on-premises content
- Setting up AIP labels and policies
- Planning and implementing an AIP deployment for your organization
- Chapter 11: Azure Information Protection
- References
- Questions
- Summary
- Allowing external user access with B2B sharing
- Protecting access to the collaboration components of Office 365
- Understanding Customer Lockbox
- Understanding privileged access management
- Chapter 10: Controlling Secure Access to Information Stored in Office 365
- Section 3: Information Protection in Microsoft 365
- References
- Questions
- Summary
- Performing controlled simulated attacks
- Managing quarantined messages and files
- Using Office 365 Threat Explorer and threat trackers
- Understanding the Office 365 threat management security dashboard
- Chapter 9: Threat Intelligence and Tracking
- References
- Questions
- Summary
- Exploring Office 365 ATP Safe Links options blocked URLs and policies
- Exploring Office 365 ATP Safe Attachments options and policies
- Configuring Office 365 anti-spam protection
- Protecting users and domains with ATP anti-phishing protection and policies
- Chapter 8: Message Protection in Office 365
- References
- Questions
- Summary
- Managing device encryption for your Windows 10 devices
- Implementing additional Microsoft Defender features
- Managing and monitoring Microsoft Defender ATP
- Implementing Microsoft Defender ATP
- Technical requirements
- Chapter 7: Configuring Microsoft Defender ATP to Protect Devices
- References
- Questions
- Summary
- Managing Azure ATP activities
- Setting up an Azure ATP instance
- Identifying the organizational needs for Azure ATP
- Chapter 6: Configuring an Advanced Threat Protection Solution
- Section 2: Implementing and Managing Threat Protection
- References
- Questions
- Summary
- Managing and resolving risk events
- Configuring alert options
- Configuring MFA registration policies
- Understanding Identity Protection
- Chapter 5: Azure AD Identity Protection
- References
- Questions
- Summary
- Planning configuring and monitoring PIM
- Planning configuring and monitoring RBAC
- Chapter 4: Role Assignment and Privileged Identities in Microsoft 365
- References
- Questions
- Summary
- Monitoring Conditional Access events
- App-based Conditional Access
- Device-based Conditional Access
- Enhancing Conditional Access with Intune
- Explaining Conditional Access
- Chapter 3: Implementing Conditional Access Policies
- References
- Questions
- Summary
- Managing Azure AD access reviews
- Implementing and managing Multi-Factor Authentication (MFA)
- Implementing Azure AD self-service password reset (SSPR)
- Implementing Azure AD dynamic group membership
- Chapter 2: Authentication and Security
- References
- Questions
- Summary
- Event monitoring and troubleshooting in Azure AD Connect
- Additional authentication security
- Synchronization methods with Azure AD Connect
- Planning your hybrid environment
- Chapter 1: Planning for Hybrid Identity
- Section 1: Configuring and Administering Identity and Access in Microsoft 365
- Preface
- Packt is searching for authors like you
- About the reviewers
- Contributors About the author
- Why subscribe?
- 版權信息
- 封面
- 封面
- 版權信息
- Why subscribe?
- Contributors About the author
- About the reviewers
- Packt is searching for authors like you
- Preface
- Section 1: Configuring and Administering Identity and Access in Microsoft 365
- Chapter 1: Planning for Hybrid Identity
- Planning your hybrid environment
- Synchronization methods with Azure AD Connect
- Additional authentication security
- Event monitoring and troubleshooting in Azure AD Connect
- Summary
- Questions
- References
- Chapter 2: Authentication and Security
- Implementing Azure AD dynamic group membership
- Implementing Azure AD self-service password reset (SSPR)
- Implementing and managing Multi-Factor Authentication (MFA)
- Managing Azure AD access reviews
- Summary
- Questions
- References
- Chapter 3: Implementing Conditional Access Policies
- Explaining Conditional Access
- Enhancing Conditional Access with Intune
- Device-based Conditional Access
- App-based Conditional Access
- Monitoring Conditional Access events
- Summary
- Questions
- References
- Chapter 4: Role Assignment and Privileged Identities in Microsoft 365
- Planning configuring and monitoring RBAC
- Planning configuring and monitoring PIM
- Summary
- Questions
- References
- Chapter 5: Azure AD Identity Protection
- Understanding Identity Protection
- Configuring MFA registration policies
- Configuring alert options
- Managing and resolving risk events
- Summary
- Questions
- References
- Section 2: Implementing and Managing Threat Protection
- Chapter 6: Configuring an Advanced Threat Protection Solution
- Identifying the organizational needs for Azure ATP
- Setting up an Azure ATP instance
- Managing Azure ATP activities
- Summary
- Questions
- References
- Chapter 7: Configuring Microsoft Defender ATP to Protect Devices
- Technical requirements
- Implementing Microsoft Defender ATP
- Managing and monitoring Microsoft Defender ATP
- Implementing additional Microsoft Defender features
- Managing device encryption for your Windows 10 devices
- Summary
- Questions
- References
- Chapter 8: Message Protection in Office 365
- Protecting users and domains with ATP anti-phishing protection and policies
- Configuring Office 365 anti-spam protection
- Exploring Office 365 ATP Safe Attachments options and policies
- Exploring Office 365 ATP Safe Links options blocked URLs and policies
- Summary
- Questions
- References
- Chapter 9: Threat Intelligence and Tracking
- Understanding the Office 365 threat management security dashboard
- Using Office 365 Threat Explorer and threat trackers
- Managing quarantined messages and files
- Performing controlled simulated attacks
- Summary
- Questions
- References
- Section 3: Information Protection in Microsoft 365
- Chapter 10: Controlling Secure Access to Information Stored in Office 365
- Understanding privileged access management
- Understanding Customer Lockbox
- Protecting access to the collaboration components of Office 365
- Allowing external user access with B2B sharing
- Summary
- Questions
- References
- Chapter 11: Azure Information Protection
- Planning and implementing an AIP deployment for your organization
- Setting up AIP labels and policies
- Using the AIP Scanner to detect and protect on-premises content
- Tracking and revoking protected documents
- Summary
- Questions
- References
- Chapter 12: Data Loss Prevention
- Planning and implementing DLP
- Creating DLP policies and assigning them to Office 365 locations
- Managing sensitive information types
- DLP reporting and alerting capabilities
- Summary
- Questions
- References
- Chapter 13: Cloud App Discovery and Security
- Understanding Cloud App Security
- Configuring Cloud App Security
- Using the Cloud App Security dashboard reports and logs
- Summary
- Questions
- References
- Section 4: Data Governance and Compliance in Microsoft 365
- Chapter 14: Security Analytics and Auditing Capabilities
- Understanding Desktop Analytics Windows diagnostics and Office Telemetry
- Configuring Office 365 auditing
- Performing an audit log search
- Configuring an audit alert policy
- Summary
- Questions
- References
- Chapter 15: Personal Data Protection in Microsoft 365
- Conducting searches for personal data
- Using retention labels to protect personal data
- Accessing logs and reports to search for and monitor personal data leaks
- Summary
- Questions
- References
- Chapter 16: Data Governance and Retention
- Understanding data governance and the retention requirements for your organization
- Navigating data governance reports and dashboards
- Configuring retention tags retention policies and supervision policies
- Configuring litigation holds to preserve Office 365 data
- Importing data into Office 365 from the Security & Compliance Center
- Configuring archiving
- Summary
- Questions
- References
- Chapter 17: Search and Investigation
- Understanding eDiscovery and content search in Microsoft 365
- eDiscovery delegated role groups
- Creating eDiscovery cases placing locations on hold and performing content searches
- Exporting content search results
- Summary
- Questions
- References
- Chapter 18: Data Privacy Compliance
- Planning for regulatory compliance in Microsoft 365
- Accessing the GDPR dashboards and reports
- Completing DSRs
- Summary
- Questions
- References
- Section 5: Mock Exam and Assessment
- Chapter 19: Mock Exam
- Case Study
- Chapter 20: Mock Exam Answers
- Answers and explanations
- Chapter 21: Assessments
- Chapter 1 – Planning for Hybrid Identity
- Chapter 2 – Authentication and Security
- Chapter 3 – Implementing Conditional Access Policies
- Chapter 4 – Role Assignment and Privileged Identities in Microsoft 365
- Chapter 5 – Azure AD Identity Protection
- Chapter 6 – Configuring an Advanced Threat Protection Solution
- Chapter 7 – Configuring Microsoft Defender ATP to Protect Devices
- Chapter 8 – Message Protection in Office 365
- Chapter 9 – Threat Intelligence and Tracking
- Chapter 10 – Controlling Secure Access to Information Stored in Office 365
- Chapter 11 – Azure Information Protection
- Chapter 12 – Data Loss Prevention
- Chapter 13 – Cloud App Discovery and Security
- Chapter 14 – Security Analytics and Auditing Capabilities
- Chapter 15 – Personal Data Protection in Microsoft 365
- Chapter 16 – Data Governance and Retention
- Chapter 17 – Search and Investigation
- Chapter 18 – Data Privacy Compliance
- Other Books You May Enjoy 更新時間:2021-06-18 18:58:09