Microsoft 365 Security and Compliance for Administrators A Definitive Guide to Planning, Implementing, and Maintaining Microsoft 365 Security Posture
Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and managing privacy and risk in the Microsoft 365 environment Key Features Protect and defend your organization with the capabilities of the Microsoft 365 Defender family Discover, classif...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England :
Packt Publishing Ltd
[2024]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009810645306719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Contributors
- Table of Contents
- Preface
- Part 1: Introduction to Microsoft 365
- Chapter 1: Getting Started with Microsoft 365 Security and Compliance
- Technical requirements
- Introduction to Microsoft 365 offers, plans, and licenses
- Microsoft 365 plans and components
- Microsoft 365 licensing
- Introduction to Microsoft 365 security
- Introduction to Microsoft 365 compliance
- Summary
- Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security
- Technical requirements
- Microsoft Entra ID plans and features
- Microsoft Entra ID roles and groups
- Azure roles, or Azure RBAC roles
- Microsoft Entra ID roles
- Classic roles
- Microsoft 365 roles in Microsoft Entra ID
- Best practices for roles
- Microsoft 365 groups
- Microsoft Entra ID Protection
- Summary
- Part 2: Microsoft 365 Security
- Chapter 3: Microsoft Defender for Office 365
- Technical requirements
- Getting started with Microsoft Defender for Office 365
- Protecting assets with Microsoft Defender for Office 365
- Quarantine policy
- Anti-phishing
- Anti-spam
- Anti-malware
- Safe Attachment
- Safe Links
- Rules
- Attack simulation training
- Responding to alerts and mitigating threats
- Summary
- Chapter 4: Microsoft Defender for Endpoint
- Introducing Microsoft Defender for Endpoint
- Technical and license requirements
- Configuring Microsoft Defender for Endpoint
- Microsoft Defender Vulnerability Management dashboard
- Microsoft Defender for Endpoint Device inventory
- Windows devices
- Configuring advanced features in Microsoft Defender for Endpoint
- Security recommendations
- The Microsoft Defender for Endpoint configuration management dashboard
- Microsoft Defender for Endpoint Tutorials &
- simulations.
- Microsoft Defender for Endpoint Co-management Authority
- Configuring a compliance policy for Windows devices
- Configuring a configuration profile for Windows devices
- Windows 365
- Enrollment device platform restrictions
- Enrollment device limit restrictions
- Configuring quality updates for Windows 10 and later in Intune
- How to create a profile for update policies for iOS/iPadOS in Intune
- How to create a profile for update policies for macOS in the Intune portal
- How to create app protection policies in the Microsoft Intune admin portal
- How to create app configuration policies
- How to create policies for Office apps in the Intune admin portal
- Endpoint Security
- Creating a profile for a security baseline for Windows 10 and later
- Creating a Microsoft Defender for Endpoint baseline
- Creating a Microsoft Edge baseline
- Creating a Windows 365 security baseline
- Managing and creating different policies under Endpoint Security
- Configuring an antivirus policy in the Intune portal
- Configuring disk encryption
- Configuring a firewall policy
- Setting up endpoint detection and response
- Configuring attack surface reduction
- Configuring account protection
- Configuring device compliance
- Configuring Conditional Access policies
- Summary
- Chapter 5: Getting Started with Microsoft Purview
- About Microsoft Purview
- How it works…
- Benefits
- Technical and license requirements
- Configuring Microsoft Purview
- Compliance Score
- Classifiers in Microsoft 365 Purview
- Configuring sensitive info types
- Configuring content explorer
- Content search
- Streamlining data discovery
- Enhancing data governance and compliance
- Independence and objectivity
- Regulatory oversight and accountability
- Risk mitigation and control
- A comprehensive compliance oversight.
- Collaboration and cross-functional alignment
- Data loss prevention
- Endpoint DLP settings
- Summary
- Chapter 6: Microsoft Defender for Cloud Apps
- Introducing Microsoft Defender for Cloud Apps
- Discovering shadow IT with Microsoft Defender for Cloud Apps
- Discovering and managing shadow IT in Microsoft Defender for Cloud Apps
- Technical and license requirements
- Configuring Microsoft Defender for Cloud Apps
- Managing OAuth applications with Microsoft Defender for Cloud Apps
- Managing files in Microsoft Defender for Cloud Apps
- Managing the activity log in Microsoft Defender for Cloud Apps
- Governance log
- Microsoft Defender for Cloud Apps policies
- Summary
- Chapter 7: Microsoft Defender Vulnerability Management
- Getting started with Microsoft Defender Vulnerability Management
- Microsoft Defender Vulnerability Management licensing and technical requirements
- Key features and capabilities
- Benefits of using the Vulnerability Management dashboard
- Permissions
- Recommendations and remediation
- Security recommendations
- Remediation tasks in Microsoft Intune
- Remediation
- Inventories and weaknesses
- Inventories
- Weaknesses
- Summary
- Chapter 8: Microsoft Defender for Identity
- Introducing Microsoft Defender for Identity
- Technical and license requirements
- Configuring Microsoft Defender for Identity
- Configuring sensors for Microsoft Defender for Identity
- Entity tags
- Working with detection rules
- Configuring Microsoft Defender for Identity and Microsoft Sentinel
- Summary
- Part 3: Microsoft 365 Governance and Compliance
- Chapter 9: Microsoft Purview Insider Risk Management
- Technical requirements
- Insider Risk Management
- Initial setup
- Resolving insider risk cases
- Information barriers and access management
- Microsoft Purview IB requirements.
- Communication Compliance
- Summary
- Further readings
- Chapter 10: Microsoft Purview Information Protection
- About Microsoft Purview Information Protection
- Data classification
- Configuring Information Protection
- Information Protection
- Publishing label policies
- Information Protection scanner
- Installing the Microsoft Purview Information Protection scanner
- Summary
- Chapter 11: Understanding the Lifecycle of Auditing and Records
- Getting started with the lifecycle of auditing and records
- The lifecycle of audits and records in Microsoft 365
- Microsoft Purview Records Management
- Microsoft data lifecycle management
- Creating retention policies
- Creating and publishing labels
- Records management
- eDiscovery and data holds
- Configuring eDiscovery Standard and Premium
- Creating and configuring eDiscovery premium cases
- Auditing and alerts
- Summary
- Index
- Other Books You May Enjoy.