دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Rising. Peter
سری:
ISBN (شابک) : 9781838983123
ناشر: Packt Publishing
سال نشر: 0
تعداد صفحات: 643
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 34 مگابایت
کلمات کلیدی مربوط به کتاب راهنمای آزمون Microsoft 365 Security Administration MS-500: برنامه ریزی و اجرای استراتژی های امنیتی و انطباق برای Microsoft 365 و محیط های ترکیبی: مایکروسافت، MS-500
در صورت تبدیل فایل کتاب Microsoft 365 Security Administration MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای آزمون Microsoft 365 Security Administration MS-500: برنامه ریزی و اجرای استراتژی های امنیتی و انطباق برای Microsoft 365 و محیط های ترکیبی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
خلاصه داستان با راهنمایی ها و تکنیک های متخصص به سرعت به شما کمک می کند تا به طور موثر برای آزمون MS-500 آماده شوید ویژگی های کلیدی راهنمایی مناسب را دریافت کنید و تکنیک هایی را برای بهبود اثربخشی مطالعه خود و آماده شدن برای امتحان کشف کنید طیف گسترده ای از استراتژی ها را برای امنیت و انطباق کاوش کنید دانشی را به دست آورید که می تواند در موقعیت های واقعی استفاده شود توضیحات کتاب آزمون Microsoft 365 Security Administration (MS-500) برای سنجش توانایی شما در انجام وظایف فنی مانند مدیریت، پیاده سازی و نظارت بر راه حل های امنیتی و انطباق برای محیط های Microsoft 365 طراحی شده است. این کتاب با نشان دادن نحوه پیکربندی و مدیریت هویت و دسترسی در مایکروسافت 365 شروع میشود. شما با هویت ترکیبی، روشهای احراز هویت و سیاستهای دسترسی مشروط با Microsoft Intune آشنا خواهید شد. در مرحله بعد، این کتاب به شما نشان میدهد که چگونه RBAC و Azure AD Identity Protection میتوانند برای کمک به شناسایی خطرات و اطلاعات ایمن در سازمان خود استفاده شوند. همچنین مفاهیمی مانند محافظت از تهدید پیشرفته، Windows Defender ATP و Threat Intelligence را بررسی خواهید کرد. همانطور که پیشرفت می کنید، با ابزارها و تکنیک های اضافی برای پیکربندی و مدیریت Microsoft 365، از جمله محافظت از اطلاعات Azure، پیشگیری از از دست دادن داده، و کشف و امنیت برنامه های ابری آشنا خواهید شد. این کتاب همچنین تضمین میکند که شما برای شرکت در امتحان به خوبی آماده هستید و به شما فرصت میدهد تا روی مقاله ساختگی، خلاصههای موضوع، تصاویری که به طور خلاصه نکات کلیدی و سناریوهای دنیای واقعی را مرور میکنند، کار کنید. با پایان این کتاب مایکروسافت 365، میتوانید مهارتهای خود را در دنیای واقعی به کار ببرید و در عین حال برای دریافت گواهینامه مایکروسافت به خوبی آماده باشید. آنچه خواهید آموخت با پیاده سازی و مدیریت هویت و دسترسی به سرعت برسید نحوه به کارگیری و مدیریت حفاظت از تهدید را بدانید با مدیریت مدیریت و ویژگیهای انطباق در Microsoft 365 آشنا شوید بهترین روشها را برای پیکربندی و استقرار مؤثر کاوش کنید پیاده سازی و مدیریت حفاظت از اطلاعات آماده شدن برای قبولی در آزمون مایکروسافت و کسب گواهینامه با کمک سوالات خود ارزیابی و آزمون آزمایشی این کتاب برای چه کسی است این کتاب گواهینامه مایکروسافت برای کمک به متخصصان فناوری اطلاعات، مدیران، یا هرکسی که میخواهد با دریافت گواهینامه مبتنی بر نقش مایکروسافت به دنبال شغلی در مدیریت امنیت باشد، طراحی شده است. کسانی که سعی می کنند مهارت های خود را تأیید کنند و مزیت رقابتی خود را با Microsoft 365 Security Administration بهبود بخشند، این کتاب را نیز منبع مفیدی خواهند یافت.
Synopsis Get up to speed with expert tips and techniques to help you prepare effectively for the MS-500 Exam Key Features Get the right guidance and discover techniques to improve the effectiveness of your studying and prepare for the exam Explore a wide variety of strategies for security and compliance Gain knowledge that can be applied in real-world situations Book Description The Microsoft 365 Security Administration (MS-500) exam is designed to measure your ability to perform technical tasks such as managing, implementing, and monitoring security and compliance solutions for Microsoft 365 environments. This book starts by showing you how to configure and administer identity and access within Microsoft 365. You will learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, the book shows you how RBAC and Azure AD Identity Protection can be used to help you detect risks and secure information in your organization. You will also explore concepts, such as Advanced Threat Protection, Windows Defender ATP, and Threat Intelligence. As you progress, you will learn about additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention, and Cloud App Discovery and Security. The book also ensures you are well prepared to take the exam by giving you the opportunity to work through a mock paper, topic summaries, illustrations that briefly review key points, and real-world scenarios. By the end of this Microsoft 365 book, you will be able to apply your skills in the real world, while also being well prepared to achieve Microsoft certification. What you will learn Get up to speed with implementing and managing identity and access Understand how to employ and manage threat protection Get to grips with managing governance and compliance features in Microsoft 365 Explore best practices for effective configuration and deployment Implement and manage information protection Prepare to pass the Microsoft exam and achieve certification with the help of self-assessment questions and a mock exam Who this book is for This Microsoft certification book is designed to help IT professionals, administrators, or anyone looking to pursue a career in security administration by becoming certified with Microsoft's role-based qualification. Those trying to validate their skills and improve their competitive advantage with Microsoft 365 Security Administration will also find this book to be a useful resource.
Cover Title Page Copyright and Credits About Packt Contributors Table of Contents Preface Section 1: Configuring and Administering Identity and Access in Microsoft 365 Chapter 1: Planning for Hybrid Identity Planning your hybrid environment Synchronization methods with Azure AD Connect Password hash synchronization Pass-through authentication Federation Azure AD Seamless Single Sign-On Additional authentication security Multi-factor authentication Self-service password reset Conditional Access Event monitoring and troubleshooting in Azure AD Connect Summary Questions References Chapter 2: Authentication and Security Implementing Azure AD dynamic group membership Creating a dynamic group in Azure AD using the Azure portal Creating dynamic groups with Azure AD PowerShell Using group-based licensing in Azure AD Implementing Azure AD self-service password reset (SSPR) Setting up SSPR Registering for SSPR Using SSPR to reset passwords Combined registration for SSPR and MFA Implementing and managing Multi-Factor Authentication (MFA) Enabling MFA Service settings Configuring the secondary authentication method Managing Azure AD access reviews Performing an access review Summary Questions References Chapter 3: Implementing Conditional Access Policies Explaining Conditional Access Creating a simple Conditional Access policy Enhancing Conditional Access with Intune Device-based Conditional Access Creating a device-based Conditional Access policy App-based Conditional Access Creating an app-based Conditional Access policy Monitoring Conditional Access events Summary Questions References Chapter 4: Role Assignment and Privileged Identities in Microsoft 365 Planning, configuring, and monitoring RBAC Planning RBAC Configuring RBAC Monitoring RBAC Planning, configuring, and monitoring PIM Planning PIM Configuring PIM Monitoring PIM Summary Questions References Chapter 5: Azure AD Identity Protection Understanding Identity Protection Configuring MFA registration policies Configuring alert options Users at risk detected alerts Weekly digest Managing and resolving risk events Examining users at risk Examining risky sign-ins Examining risk detections Summary Questions References Section 2: Implementing and Managing Threat Protection Chapter 6: Configuring an Advanced Threat Protection Solution Identifying the organizational needs for Azure ATP Understanding suspicious activity Exploring advanced attacks and malicious activities Understanding the Azure ATP architecture Setting up an Azure ATP instance Additional configuration options Managing Azure ATP activities The security alerts timeline in the Azure ATP portal Azure ATP reports The Azure ATP workspace health center Summary Questions References Chapter 7: Configuring Microsoft Defender ATP to Protect Devices Technical requirements Licensing requirements Supported operating systems Implementing Microsoft Defender ATP Configuring Microsoft Defender ATP Managing and monitoring Microsoft Defender ATP Attack surface reduction capabilities The Secure score dashboard Integrating with Azure ATP The Microsoft Defender Security Center settings Implementing additional Microsoft Defender features Configuring Microsoft Defender Application Guard Configuring Microsoft Defender Application Control Configuring Microsoft Defender Exploit Guard Using WIP to configure WIP policies and protect data Managing device encryption for your Windows 10 devices Introduction to BitLocker Summary Questions References Chapter 8: Message Protection in Office 365 Protecting users and domains with ATP anti-phishing protection and policies Setting up an ATP anti-phishing policy Configuring Office 365 anti-spam protection Default spam filter policy Connection filter policy Outbound spam filter policy Exploring Office 365 ATP Safe Attachments options and policies Creating a Safe Attachments policy from the Security and Compliance Center Creating a Safe Attachments policy using Windows PowerShell Exploring Office 365 ATP Safe Links options, blocked URLs, and policies Viewing or modifying the default Safe Links policy from the Security and Compliance Center Creating a new Safe Links policy from the Security and Compliance Center Creating a Safe Links policy using Windows PowerShell Summary Questions References Chapter 9: Threat Intelligence and Tracking Understanding the Office 365 threat management security dashboard Threat protection status Insights Threat Intelligence Trends Using Office 365 Threat Explorer and threat trackers Using Threat Explorer Using threat trackers Managing quarantined messages and files Performing controlled simulated attacks Launching an attack Summary Questions References Section 3: Information Protection in Microsoft 365 Chapter 10: Controlling Secure Access to Information Stored in Office 365 Understanding privileged access management Enabling PAM Submitting and approving PAM requests Understanding Customer Lockbox Enabling Customer Lockbox Responding to Customer Lockbox requests Protecting access to the collaboration components of Office 365 Allowing external user access with B2B sharing Summary Questions References Chapter 11: Azure Information Protection Planning and implementing an AIP deployment for your organization Checking AIP activation status using the Office 365 Admin Center Checking AIP activation status using the Azure portal Checking AIP activation status using the Azure AIPService PowerShell Configuring AIP superusers Setting up AIP labels and policies Setting up labels Setting up label policies Enabling Unified labeling User experience Using the AIP Scanner to detect and protect on-premises content Installing the AIP Scanner Tracking and revoking protected documents Summary Questions References Chapter 12: Data Loss Prevention Planning and implementing DLP Creating DLP policies and assigning them to Office 365 locations Testing your DLP policy Editing your DLP policy Managing sensitive information types DLP reporting and alerting capabilities Summary Questions References Chapter 13: Cloud App Discovery and Security Understanding Cloud App Security Cloud Discovery Sanctioning or unsanctioning cloud apps Using app connectors to gain visibility and control of third-party apps Using Azure AD Conditional Access App Control in conjunction with Cloud App Security Using built-in policies or creating custom policies to control SaaS app usage Configuring Cloud App Security Using the Cloud App Security dashboard, reports, and logs Summary Questions References Section 4: Data Governance and Compliance in Microsoft 365 Chapter 14: Security Analytics and Auditing Capabilities Understanding Desktop Analytics, Windows diagnostics, and Office Telemetry Desktop Analytics Windows diagnostics Office Telemetry Configuring Office 365 auditing Turning on the audit log Performing an audit log search Configuring an audit alert policy Summary Questions References Chapter 15: Personal Data Protection in Microsoft 365 Conducting searches for personal data Using retention labels to protect personal data Accessing logs and reports to search for and monitor personal data leaks Data loss prevention reports Alert policies Microsoft Cloud App Security Summary Questions References Chapter 16: Data Governance and Retention Understanding data governance and the retention requirements for your organization The content is modified or deleted during the retention period The content is unchanged during the retention period Mailbox and public folder content Navigating data governance reports and dashboards Configuring retention tags, retention policies, and supervision policies Creating a retention policy using the Exchange admin center Creating a retention policy using the Security & Compliance Center Creating a supervision policy Configuring litigation holds to preserve Office 365 data Litigation Hold Importing data into Office 365 from the Security & Compliance Center Configuring archiving Summary Questions References Chapter 17: Search and Investigation Understanding eDiscovery and content search in Microsoft 365 eDiscovery cases Content search Advanced eDiscovery eDiscovery delegated role groups Creating eDiscovery cases, placing locations on hold, and performing content searches Creating an eDiscovery case and placing locations on hold Performing a content search Exporting content search results Summary Questions References Chapter 18: Data Privacy Compliance Planning for regulatory compliance in Microsoft 365 Phase 1 – the first 30 days Phase 2 – after 90 days Phase 3 – ongoing Accessing the GDPR dashboards and reports Service Trust Portal Microsoft Compliance Score The GDPR dashboard and the GDPR toolbox Completing DSRs Summary Questions References Section 5: Mock Exam and Assessment Chapter 19: Mock Exam Case Study Overview Chapter 20: Mock Exam Answers Answers and explanations Chapter 21: Assessments Chapter 1 – Planning for Hybrid Identity Chapter 2 – Authentication and Security Chapter 3 – Implementing Conditional Access Policies Chapter 4 – Role Assignment and Privileged Identities in Microsoft 365 Chapter 5 – Azure AD Identity Protection Chapter 6 – Configuring an Advanced Threat Protection Solution Chapter 7 – Configuring Microsoft Defender ATP to Protect Devices Chapter 8 – Message Protection in Office 365 Chapter 9 – Threat Intelligence and Tracking Chapter 10 – Controlling Secure Access to Information Stored in Office 365 Chapter 11 – Azure Information Protection Chapter 12 – Data Loss Prevention Chapter 13 – Cloud App Discovery and Security Chapter 14 – Security Analytics and Auditing Capabilities Chapter 15 – Personal Data Protection in Microsoft 365 Chapter 16 – Data Governance and Retention Chapter 17 – Search and Investigation Chapter 18 – Data Privacy Compliance Other Books You May Enjoy Leave a review - let other readers know what you think Index