- Microsoft 365 Security Administration:MS-500 Exam Guide
- Peter Rising
- 198字
- 2021-06-18 18:57:33
Summary
In this chapter, we have introduced you to the principles of RBAC and PIM.
We showed you how RBAC provides access management capabilities to Azure resources and enables Microsoft 365 administrators to manage access to these resources, the actions users can take, and what resources are accessible to them.
In addition, we demonstrated the steps you need to consider in order to diligently plan your PIM configuration, how to activate and license PIM on your tenant, and configure and assign roles to your users and resources with the principle of least privilege applied.
We also demonstrated how to make users eligible for privileged access roles to gain just-in-time access, how to assign permanent access to privileged roles where required, and how to remove this access when it is no longer required. Finally, we looked at the various monitoring capabilities of PIM, which enable you to keep on top of your PIM configuration and make sure that access is granted only when it's required.
In the next chapter, we will look at Identity Protection concepts in detail, along with techniques you can use to identify and protect against risky sign-in activities, such as impossible travel and non-compliant devices.
- unidbg逆向工程:原理與實踐
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- 黑客攻防入門秘笈
- 先進云安全研究與實踐
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- VMware vCloud Security
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- 聯(lián)邦學習原理與算法
- Securing Network Infrastructure
- Manga Studio 5 Beginner's Guide
- 社會工程:防范釣魚欺詐(卷3)
- AI+網(wǎng)絡(luò)安全:智網(wǎng)融合空間體系建設(shè)指南
- 極限黑客攻防:CTF賽題揭秘