- Microsoft 365 Security Administration:MS-500 Exam Guide
- Peter Rising
- 148字
- 2021-06-18 18:57:35
Summary
In this chapter, we examined Azure AD Identity Protection, which can be accessed from the Azure portal. We demonstrated how Identity Protection detects and records risky users, risky sign-ins, and risk events, and also provides us with the ability to review, investigate, and remediate these events with powerful preventative measures such as blocking user access, forcing password changes, or requiring MFA.
We also showed how reports and alerts can be generated and interpreted. Understanding these principles will enable you to effectively and diligently manage Azure AD Identity Protection in your Microsoft 365 environment and take the necessary steps to ensure that compromised users are identified and remediated in a timely fashion.
In the next chapter, we will examine the principles of Azure Advanced Threat Protection. We will show you how to plan for and configure ATP, as well as how to monitor and interpret the reporting features.
- Extending Symfony2 Web Application Framework
- RESTful Java Web Services Security
- Mobile Forensics Cookbook
- SASE原理、架構(gòu)與實(shí)踐
- Learning Python for Forensics
- 信息系統(tǒng)安全檢測與風(fēng)險(xiǎn)評估
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 軟件開發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- 數(shù)據(jù)安全實(shí)踐指南
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- 云原生安全與DevOps保障
- 解密數(shù)據(jù)恢復(fù)
- 信息安全等級保護(hù)測評與整改指導(dǎo)手冊
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 博弈論與數(shù)據(jù)安全