- Microsoft 365 Security Administration:MS-500 Exam Guide
- Peter Rising
- 128字
- 2021-06-18 18:57:32
Chapter 4: Role Assignment and Privileged Identities in Microsoft 365
In this chapter, we will be looking at role-based access control (RBAC), which is a system that authorizes specific access management capabilities to Azure resources by creating role assignments. You will learn how to plan and configure RBAC, as well as how to view activity logs to monitor RBAC changes.
We will also be looking at Azure AD Privileged Identity Management (PIM) and how it enables you to manage, control, and monitor access to resources within Azure AD. PIM can help you identify and minimize the number of people who have access to sensitive or secure information and resources within your organization.
We will cover the following topics:
- Planning, configuring, and monitoring RBAC
- Planning, configuring, and monitoring PIM
推薦閱讀
- 黑客大曝光:無線網絡安全(原書第3版)
- 腦洞大開:滲透測試另類實戰攻略
- 從0到1:CTFer成長之路
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 互聯網企業安全高級指南
- INSTANT Apple Configurator How-to
- 黑客攻防入門
- Instant OSSEC Host-based Intrusion Detection System
- 2023—2024年中國網絡安全發展藍皮書
- CCNA Security 210-260 Certification Guide
- Hands-On Spring Security 5 for Reactive Applications
- Learning Metasploit Exploitation and Development
- 精通Veeam Backup&Replication(原書第2版)
- 信息安全風險評估手冊(第2版)
- 安全之美