Microsoft 365 Security, Compliance, and Identity Administration Plan and Implement Security and Compliance Strategies for Microsoft 365 and Hybrid Environments
Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap the full potential of Microsoft security and complia...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England :
Packt Publishing Ltd
[2023]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009764838606719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Dedication
- Contributors
- Table of Contents
- Preface
- Part 1: Implementing and Managing Identity and Access
- Chapter 1: Planning for Hybrid Identity
- Planning your hybrid environment
- Authentication methods in Azure AD
- Multi-factor authentication
- Self-service password reset
- Conditional Access
- Passwordless authentication
- Synchronization methods with Azure AD Connect
- Password hash synchronization
- Pass-through authentication
- Federation
- Azure AD Seamless Single Sign-On
- Azure AD Connect cloud sync
- Event monitoring and troubleshooting in Azure AD Connect
- Summary
- Questions
- Further reading
- Chapter 2: Authentication and Security
- Implementing Azure AD dynamic group membership
- Creating a dynamic group in Azure AD using the Azure portal
- Creating dynamic groups with Azure AD PowerShell
- Using group-based licensing in Azure AD
- Implementing password management
- Setting up SSPR
- Registering for SSPR
- Using SSPR to reset passwords
- Combined registration for SSPR and MFA
- Implementing and managing external identities
- Implementing and managing MFA
- Enabling MFA
- Service settings
- Configuring secondary authentication methods
- Planning and implementing device authentication methods
- Summary
- Questions
- Further reading
- Chapter 3: Implementing Conditional Access Policies
- Explaining Conditional Access
- Creating a Simple Conditional Access policy
- Conditional Access and Microsoft Intune
- Introducing the types of Conditional Access
- Device-based Conditional Access
- App-based Conditional Access
- Monitoring Conditional Access events
- Summary
- Questions
- Further reading
- Chapter 4: Managing Roles and Identity Governance
- Planning and configuring PIM
- Planning PIM
- Configuring PIM.
- Monitoring PIM
- Planning and configuring entitlement management
- Planning and configuring access reviews
- Summary
- Questions
- Further reading
- Chapter 5: Azure AD Identity Protection
- Understanding Identity Protection
- Protecting users with risk and registration policies
- Configuring user risk and sign-in risk policies
- Configuring MFA registration policies
- Configuring alert options
- Users at risk detected alerts
- Weekly digest
- Managing and resolving risk events
- Examining users at risk
- Examining risky sign-ins
- Examining risk detections
- Risky workload identities (preview)
- Risk-based Conditional Access policies
- Summary
- Questions
- Further reading
- Part 2: Implementing and Managing Threat Protection
- Chapter 6: Configuring a Microsoft Defender for Identity Solution
- Identifying the organizational need for MDI
- Understanding suspicious activity
- Exploring advanced attacks and malicious activities
- Understanding the MDI architecture
- Setting up MDI
- Prerequisites for MDI
- Installing and configuring MDI
- Additional configuration options
- Managing and monitoring MDI
- Entity tags
- Excluded entities
- Monitoring MDI
- Summary
- Questions
- Further reading
- Chapter 7: Configuring Device Threat Protection with Microsoft Defender for Endpoint and Intune
- Planning and implementing MDE
- Onboarding devices
- Managing and monitoring MDE
- Vulnerability management
- Partners and APIs
- Evaluation &
- tutorials
- Configuration management
- Implementing Microsoft Defender Application Guard, Application Control, and exploit protection
- Configuring Microsoft Defender Application Guard
- Configuring Microsoft Defender Application Control
- Configuring Microsoft Defender Exploit Guard
- Encrypting your Windows devices using BitLocker.
- Implementing application protection policies
- Summary
- Questions
- Further reading
- Chapter 8: Configuring Microsoft Defender for Office 365
- Protecting users and domains with anti-phishing protection and policies
- Setting up an anti-phishing policy
- Configuring Safe Attachments options and policies
- Creating a Safe Attachments policy
- Creating a Safe Attachments policy using Windows PowerShell
- Configuring Safe Links options, blocked URLs, and policies
- Creating a new Safe Links policy
- Creating a Safe Links policy using Windows PowerShell
- Monitoring and remediating with Microsoft Defender for Office 365 reports
- Running simulated attacks with Microsoft Defender for Office 365
- Further attack simulation configuration options
- Summary
- Questions
- Further reading
- Chapter 9: Using Microsoft Sentinel to Monitor Microsoft 365 Security
- Planning and configuring Microsoft Sentinel
- Connecting Microsoft Sentinel to a workspace
- Connecting Microsoft Sentinel to data sources
- Configuring playbooks in Microsoft Sentinel
- Creating a simple playbook
- Creating a playbook using templates
- Creating and using automation rules to manage responses
- Managing and monitoring your Microsoft Sentinel instance
- Summary
- Questions
- Further reading
- Chapter 10: Configuring Microsoft Defender for Cloud Apps
- Planning your MDA implementation
- Configuring MDA
- Managing Cloud App Discovery
- Managing the MDA catalog
- Managing apps and app connectors in MDA
- Configuring policies and templates
- Using Conditional Access App Control with MDA
- Reviewing and interpreting alerts, reports, and dashboards
- Summary
- Questions
- Further reading
- Part 3: Implementing and Managing Information Protection
- Chapter 11: Managing Sensitive Information.
- Planning a sensitivity label solution for your organization
- Creating and managing SITs
- Setting up sensitivity labels and policies
- Setting up labels
- Setting up label policies
- Using sensitivity labels
- Configuring and using Activity explorer
- Using sensitivity labels with Teams, SharePoint, OneDrive, and Office apps
- Summary
- Questions
- Further reading
- Chapter 12: Managing Microsoft Purview Data Loss Prevention
- Planning and implementing DLP
- Managing DLP policies for Microsoft 365 workloads
- Creating a DLP policy
- Testing your DLP policy
- Editing your DLP policy
- DLP reporting and alerting capabilities
- Using PowerShell with DLP reporting
- Required permissions for DLP reports
- Further alerting capabilities
- Implementing Endpoint DLP
- Summary
- Questions
- Further reading
- Chapter 13: Managing Microsoft Purview Data Lifecycle Management
- Planning for data lifecycle management
- Records management
- Analyzing reports and dashboards
- Content explorer
- Activity explorer
- Configuring retention labels and policies
- Creating a retention label
- Creating a retention label policy
- Applying retention labels
- Creating a retention policy
- Planning and implementing adaptive scopes
- Finding and recovering deleted Microsoft 365 data
- User mailboxes
- OneDrive
- Summary
- Questions
- Further reading
- Part 4: Managing Compliance Features in Microsoft 365
- Chapter 14: Monitoring and Analyzing Audit Logs and Reports in Microsoft Purview
- Planning for auditing and reporting
- Investigating compliance activities by using audit logs
- Performing an audit log search
- Reviewing and interpreting compliance reports and dashboards
- Configuring alert policies
- Configuring audit log retention policies
- Summary
- Questions
- Further reading.
- Chapter 15: Planning For, Conducting, and Managing eDiscovery Cases
- Recommending eDiscovery (Standard) or eDiscovery (Premium)
- Planning for content searches and eDiscovery
- Delegating the required permissions to use search and discovery tools
- Creating eDiscovery cases
- Managing eDiscovery cases
- Adding custodians
- Collecting data
- Analyzing the review set results
- Exporting and downloading case data
- Additional tasks
- Summary
- Questions
- Further reading
- Chapter 16: Managing Regulatory and Privacy Requirements
- Planning your regulatory compliance journey in Microsoft 365
- Managing regulatory compliance in Microsoft Purview Compliance Manager
- Access to Compliance Manager
- Improvement actions
- Assessments and assessment templates
- Exploring Microsoft Priva
- Implementing privacy risk management
- Implementing and managing Subject Rights Requests with Microsoft Priva
- Summary
- Questions
- Further reading
- Chapter 17: Managing Insider Risk Solutions in Microsoft 365
- Implementing Customer Lockbox
- Implementing and managing Communication Compliance policies
- Implementing and managing insider risk management policies
- Getting started with Insider Risk Management policies
- Creating Insider Risk Management policies
- Implementing and managing Information Barriers policies
- Segments and policies for Information Barriers
- Implementing and managing Privileged Access Management
- Summary
- Questions
- Further reading
- Answers
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Chapter 13
- Chapter 14
- Chapter 15
- Chapter 16
- Chapter 17
- Index
- About Packt
- Other Books You May Enjoy.