دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Peter Rising
سری:
ISBN (شابک) : 1804611921, 9781804611920
ناشر: Packt Publishing
سال نشر: 2023
تعداد صفحات: 630
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 40 Mb
در صورت تبدیل فایل کتاب Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies [True PDF] [Team-IRA] به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب Microsoft 365 Security, Compliance, and Identity Administration: برنامه ریزی و اجرای استراتژی های امنیتی و انطباق [True PDF] [Team-IRA] نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
نکات و تکنیکهای متخصص را برای مدیریت مؤثر امنیت، انطباق و ویژگیهای هویت در برنامههای مایکروسافت 365 خود کاوش کنید. خرید کتاب چاپی یا Kindle شامل یک کتاب الکترونیکی PDF رایگان است. ویژگیهای کلیدی: تکنیکهایی را برای بهرهگیری از پتانسیل کامل امنیت و انطباق مایکروسافت کشف کنید. مجموعهای از استراتژیها برای امنیت مؤثر و انطباق کسب دانش عملی برای حل چالشهای دنیای واقعی شرح کتاب: مدیریت امنیت، انطباق و هویت Microsoft 365 برای کمک به مدیریت، پیادهسازی و نظارت بر راهحلهای امنیتی و انطباق برای محیطهای Microsoft 365 طراحی شده است. . با این کتاب، ابتدا پیکربندی، مدیریت هویت و دسترسی در مایکروسافت 365 را انجام خواهید داد. در مورد هویت ترکیبی، روشهای احراز هویت و سیاستهای دسترسی مشروط با Microsoft Intune آشنا خواهید شد. در مرحله بعد، خواهید فهمید که چگونه RBAC و Azure AD Identity Protection می توانند برای شناسایی خطرات و اطلاعات ایمن در سازمان شما استفاده شوند. همچنین مفاهیمی مانند Microsoft Defender برای نقطه پایانی و هویت، همراه با اطلاعات تهدید را بررسی خواهید کرد. با پیشرفت، ابزارها و تکنیکهای بیشتری را برای پیکربندی و مدیریت Microsoft 365 کشف خواهید کرد، از جمله محافظت از اطلاعات Azure، پیشگیری از از دست دادن داده (DLP) و Microsoft Defender برای برنامههای ابری. در پایان این کتاب، شما برای مدیریت و اجرای موفقیت آمیز اقدامات امنیتی در مجموعه Microsoft 365 خود به خوبی مجهز خواهید شد. آنچه خواهید آموخت: با پیاده سازی و مدیریت هویت و دسترسی به سرعت برسید درک نحوه بکارگیری و مدیریت حفاظت از تهدیدات مدیریت ویژگی های حاکمیت و انطباق Microsoft 365 پیاده سازی و مدیریت تکنیک های حفاظت از اطلاعات کاوش بهترین شیوه ها برای پیکربندی و استقرار موثر اطمینان از امنیت و انطباق در تمام سطوح مایکروسافت 365 این کتاب برای چه کسانی است: این کتاب برای متخصصان فناوری اطلاعات، مدیران، یا هر کسی است که به دنبال شغلی در مدیریت امنیت است و میخواهد مهارتهای خود را در استفاده از Microsoft 365 Security Administration افزایش دهد. درک اولیه اصول مدیریت Microsoft 365 و Azure Active Directory ضروری است. دسترسی خوب به اکتیو دایرکتوری داخلی مفید خواهد بود.
Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features: Discover techniques to reap the full potential of Microsoft security and compliance suite Explore a range of strategies for effective security and compliance Gain practical knowledge to resolve real-world challenges Book Description: The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments. With this book, you\'ll first configure, administer identity and access within Microsoft 365. You\'ll learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, you\'ll discover how RBAC and Azure AD Identity Protection can be used to detect risks and secure information in your organization. You\'ll also explore concepts such as Microsoft Defender for endpoint and identity, along with threat intelligence. As you progress, you\'ll uncover additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention (DLP), and Microsoft Defender for Cloud Apps. By the end of this book, you\'ll be well-equipped to manage and implement security measures within your Microsoft 365 suite successfully. What You Will Learn: Get up to speed with implementing and managing identity and access Understand how to employ and manage threat protection Manage Microsoft 365\'s governance and compliance features Implement and manage information protection techniques Explore best practices for effective configuration and deployment Ensure security and compliance at all levels of Microsoft 365 Who this book is for: This book is for IT professionals, administrators, or anyone looking to pursue a career in security administration and wants to enhance their skills in utilizing Microsoft 365 Security Administration. A basic understanding of administration principles of Microsoft 365 and Azure Active Directory is a must. A good grip of on-premises Active Directory will be beneficial.
Cover Title Page Copyright and Credits Dedication Contributors Table of Contents Preface Part 1: Implementing and Managing Identity and Access Chapter 1: Planning for Hybrid Identity Planning your hybrid environment Authentication methods in Azure AD Multi-factor authentication Self-service password reset Conditional Access Passwordless authentication Synchronization methods with Azure AD Connect Password hash synchronization Pass-through authentication Federation Azure AD Seamless Single Sign-On Azure AD Connect cloud sync Event monitoring and troubleshooting in Azure AD Connect Summary Questions Further reading Chapter 2: Authentication and Security Implementing Azure AD dynamic group membership Creating a dynamic group in Azure AD using the Azure portal Creating dynamic groups with Azure AD PowerShell Using group-based licensing in Azure AD Implementing password management Setting up SSPR Registering for SSPR Using SSPR to reset passwords Combined registration for SSPR and MFA Implementing and managing external identities Implementing and managing MFA Enabling MFA Service settings Configuring secondary authentication methods Planning and implementing device authentication methods Summary Questions Further reading Chapter 3: Implementing Conditional Access Policies Explaining Conditional Access Creating a Simple Conditional Access policy Conditional Access and Microsoft Intune Introducing the types of Conditional Access Device-based Conditional Access App-based Conditional Access Monitoring Conditional Access events Summary Questions Further reading Chapter 4: Managing Roles and Identity Governance Planning and configuring PIM Planning PIM Configuring PIM Monitoring PIM Planning and configuring entitlement management Planning and configuring access reviews Summary Questions Further reading Chapter 5: Azure AD Identity Protection Understanding Identity Protection Protecting users with risk and registration policies Configuring user risk and sign-in risk policies Configuring MFA registration policies Configuring alert options Users at risk detected alerts Weekly digest Managing and resolving risk events Examining users at risk Examining risky sign-ins Examining risk detections Risky workload identities (preview) Risk-based Conditional Access policies Summary Questions Further reading Part 2: Implementing and Managing Threat Protection Chapter 6: Configuring a Microsoft Defender for Identity Solution Identifying the organizational need for MDI Understanding suspicious activity Exploring advanced attacks and malicious activities Understanding the MDI architecture Setting up MDI Prerequisites for MDI Installing and configuring MDI Additional configuration options Managing and monitoring MDI Entity tags Excluded entities Monitoring MDI Summary Questions Further reading Chapter 7: Configuring Device Threat Protection with Microsoft Defender for Endpoint and Intune Planning and implementing MDE Onboarding devices Managing and monitoring MDE Vulnerability management Partners and APIs Evaluation & tutorials Configuration management Implementing Microsoft Defender Application Guard, Application Control, and exploit protection Configuring Microsoft Defender Application Guard Configuring Microsoft Defender Application Control Configuring Microsoft Defender Exploit Guard Encrypting your Windows devices using BitLocker Implementing application protection policies Summary Questions Further reading Chapter 8: Configuring Microsoft Defender for Office 365 Protecting users and domains with anti-phishing protection and policies Setting up an anti-phishing policy Configuring Safe Attachments options and policies Creating a Safe Attachments policy Creating a Safe Attachments policy using Windows PowerShell Configuring Safe Links options, blocked URLs, and policies Creating a new Safe Links policy Creating a Safe Links policy using Windows PowerShell Monitoring and remediating with Microsoft Defender for Office 365 reports Running simulated attacks with Microsoft Defender for Office 365 Further attack simulation configuration options Summary Questions Further reading Chapter 9: Using Microsoft Sentinel to Monitor Microsoft 365 Security Planning and configuring Microsoft Sentinel Connecting Microsoft Sentinel to a workspace Connecting Microsoft Sentinel to data sources Configuring playbooks in Microsoft Sentinel Creating a simple playbook Creating a playbook using templates Creating and using automation rules to manage responses Managing and monitoring your Microsoft Sentinel instance Summary Questions Further reading Chapter 10: Configuring Microsoft Defender for Cloud Apps Planning your MDA implementation Configuring MDA Managing Cloud App Discovery Managing the MDA catalog Managing apps and app connectors in MDA Configuring policies and templates Using Conditional Access App Control with MDA Reviewing and interpreting alerts, reports, and dashboards Summary Questions Further reading Part 3: Implementing and Managing Information Protection Chapter 11: Managing Sensitive Information Planning a sensitivity label solution for your organization Creating and managing SITs Setting up sensitivity labels and policies Setting up labels Setting up label policies Using sensitivity labels Configuring and using Activity explorer Using sensitivity labels with Teams, SharePoint, OneDrive, and Office apps Summary Questions Further reading Chapter 12: Managing Microsoft Purview Data Loss Prevention Planning and implementing DLP Managing DLP policies for Microsoft 365 workloads Creating a DLP policy Testing your DLP policy Editing your DLP policy DLP reporting and alerting capabilities Using PowerShell with DLP reporting Required permissions for DLP reports Further alerting capabilities Implementing Endpoint DLP Summary Questions Further reading Chapter 13: Managing Microsoft Purview Data Lifecycle Management Planning for data lifecycle management Records management Analyzing reports and dashboards Content explorer Activity explorer Configuring retention labels and policies Creating a retention label Creating a retention label policy Applying retention labels Creating a retention policy Planning and implementing adaptive scopes Finding and recovering deleted Microsoft 365 data User mailboxes OneDrive Summary Questions Further reading Part 4: Managing Compliance Features in Microsoft 365 Chapter 14: Monitoring and Analyzing Audit Logs and Reports in Microsoft Purview Planning for auditing and reporting Investigating compliance activities by using audit logs Performing an audit log search Reviewing and interpreting compliance reports and dashboards Configuring alert policies Configuring audit log retention policies Summary Questions Further reading Chapter 15: Planning For, Conducting, and Managing eDiscovery Cases Recommending eDiscovery (Standard) or eDiscovery (Premium) Planning for content searches and eDiscovery Delegating the required permissions to use search and discovery tools Creating eDiscovery cases Managing eDiscovery cases Adding custodians Collecting data Analyzing the review set results Exporting and downloading case data Additional tasks Summary Questions Further reading Chapter 16: Managing Regulatory and Privacy Requirements Planning your regulatory compliance journey in Microsoft 365 Managing regulatory compliance in Microsoft Purview Compliance Manager Access to Compliance Manager Improvement actions Assessments and assessment templates Exploring Microsoft Priva Implementing privacy risk management Implementing and managing Subject Rights Requests with Microsoft Priva Summary Questions Further reading Chapter 17: Managing Insider Risk Solutions in Microsoft 365 Implementing Customer Lockbox Implementing and managing Communication Compliance policies Implementing and managing insider risk management policies Getting started with Insider Risk Management policies Creating Insider Risk Management policies Implementing and managing Information Barriers policies Segments and policies for Information Barriers Implementing and managing Privileged Access Management Summary Questions Further reading Answers Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Index About Packt Other Books You May Enjoy