๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies [True PDF] [Team-IRA]

โœ Scribed by Peter Rising


Publisher
Packt Publishing
Year
2023
Tongue
English
Leaves
630
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications

Purchase of the print or Kindle book includes a free PDF eBook

Key Features

  • Discover techniques to reap the full potential of Microsoft security and compliance suite
  • Explore a range of strategies for effective security and compliance
  • Gain practical knowledge to resolve real-world challenges

Book Description

The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments.

With this book, you'll first configure, administer identity and access within Microsoft 365. You'll learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, you'll discover how RBAC and Azure AD Identity Protection can be used to detect risks and secure information in your organization. You'll also explore concepts such as Microsoft Defender for endpoint and identity, along with threat intelligence. As you progress, you'll uncover additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention (DLP), and Microsoft Defender for Cloud Apps.

By the end of this book, you'll be well-equipped to manage and implement security measures within your Microsoft 365 suite successfully.

What you will learn

  • Get up to speed with implementing and managing identity and access
  • Understand how to employ and manage threat protection
  • Manage Microsoft 365's governance and compliance features
  • Implement and manage information protection techniques
  • Explore best practices for effective configuration and deployment
  • Ensure security and compliance at all levels of Microsoft 365

Who this book is for

This book is for IT professionals, administrators, or anyone looking to pursue a career in security administration and wants to enhance their skills in utilizing Microsoft 365 Security Administration. A basic understanding of administration principles of Microsoft 365 and Azure Active Directory is a must. A good grip of on-premises Active Directory will be beneficial.

Table of Contents

  1. Planning for Hybrid Identity
  2. Authentication and Security
  3. Implementing Conditional Access Policies
  4. Managing Roles and Identity Governance
  5. Azure AD Identity Protection
  6. Configuring a Microsoft Defender for Identity Solution
  7. Configuring Device Threat Protection with Microsoft Defender for Endpoint and Intune
  8. Configuring Microsoft Defender for Office 365
  9. Using Microsoft Sentinel to Monitor Microsoft 365 Security
  10. Configuring Microsoft Defender for Cloud Apps
  11. Managing Sensitive Information
  12. Managing Microsoft Purview Data Loss Prevention
  13. Managing Microsoft Purview Data Lifecycle Management
  14. Managing and Analyzing Audit Logs and Reports in Microsoft Purview
  15. Planning For, Conducting, and Managing eDiscovery Cases
  16. Managing Regulatory and Privacy Requirements
  17. Managing Insider Risk Solutions in Microsoft 365

โœฆ Table of Contents


Cover
Title Page
Copyright and Credits
Dedication
Contributors
Table of Contents
Preface
Part 1: Implementing and Managing Identity and Access
Chapter 1: Planning for Hybrid Identity
Planning your hybrid environment
Authentication methods in Azure AD
Multi-factor authentication
Self-service password reset
Conditional Access
Passwordless authentication
Synchronization methods with Azure AD Connect
Password hash synchronization
Pass-through authentication
Federation
Azure AD Seamless Single Sign-On
Azure AD Connect cloud sync
Event monitoring and troubleshooting in Azure AD Connect
Summary
Questions
Further reading
Chapter 2: Authentication and Security
Implementing Azure AD dynamic group membership
Creating a dynamic group in Azure AD using the Azure portal
Creating dynamic groups with Azure AD PowerShell
Using group-based licensing in Azure AD
Implementing password management
Setting up SSPR
Registering for SSPR
Using SSPR to reset passwords
Combined registration for SSPR and MFA
Implementing and managing external identities
Implementing and managing MFA
Enabling MFA
Service settings
Configuring secondary authentication methods
Planning and implementing device authentication methods
Summary
Questions
Further reading
Chapter 3: Implementing Conditional Access Policies
Explaining Conditional Access
Creating a Simple Conditional Access policy
Conditional Access and Microsoft Intune
Introducing the types of Conditional Access
Device-based Conditional Access
App-based Conditional Access
Monitoring Conditional Access events
Summary
Questions
Further reading
Chapter 4: Managing Roles and Identity Governance
Planning and configuring PIM
Planning PIM
Configuring PIM
Monitoring PIM
Planning and configuring entitlement management
Planning and configuring access reviews
Summary
Questions
Further reading
Chapter 5: Azure AD Identity Protection
Understanding Identity Protection
Protecting users with risk and registration policies
Configuring user risk and sign-in risk policies
Configuring MFA registration policies
Configuring alert options
Users at risk detected alerts
Weekly digest
Managing and resolving risk events
Examining users at risk
Examining risky sign-ins
Examining risk detections
Risky workload identities (preview)
Risk-based Conditional Access policies
Summary
Questions
Further reading
Part 2: Implementing and Managing Threat Protection
Chapter 6: Configuring a Microsoft Defender for Identity Solution
Identifying the organizational need for MDI
Understanding suspicious activity
Exploring advanced attacks and malicious activities
Understanding the MDI architecture
Setting up MDI
Prerequisites for MDI
Installing and configuring MDI
Additional configuration options
Managing and monitoring MDI
Entity tags
Excluded entities
Monitoring MDI
Summary
Questions
Further reading
Chapter 7: Configuring Device Threat Protection with Microsoft Defender for Endpoint and Intune
Planning and implementing MDE
Onboarding devices
Managing and monitoring MDE
Vulnerability management
Partners and APIs
Evaluation & tutorials
Configuration management
Implementing Microsoft Defender Application Guard, Application Control, and exploit protection
Configuring Microsoft Defender Application Guard
Configuring Microsoft Defender Application Control
Configuring Microsoft Defender Exploit Guard
Encrypting your Windows devices using BitLocker
Implementing application protection policies
Summary
Questions
Further reading
Chapter 8: Configuring Microsoft Defender for Office 365
Protecting users and domains with anti-phishing protection and policies
Setting up an anti-phishing policy
Configuring Safe Attachments options and policies
Creating a Safe Attachments policy
Creating a Safe Attachments policy using Windows PowerShell
Configuring Safe Links options, blocked URLs, and policies
Creating a new Safe Links policy
Creating a Safe Links policy using Windows PowerShell
Monitoring and remediating with Microsoft Defender for Office 365 reports
Running simulated attacks with Microsoft Defender for Office 365
Further attack simulation configuration options
Summary
Questions
Further reading
Chapter 9: Using Microsoft Sentinel to Monitor Microsoft 365 Security
Planning and configuring Microsoft Sentinel
Connecting Microsoft Sentinel to a workspace
Connecting Microsoft Sentinel to data sources
Configuring playbooks in Microsoft Sentinel
Creating a simple playbook
Creating a playbook using templates
Creating and using automation rules to manage responses
Managing and monitoring your Microsoft Sentinel instance
Summary
Questions
Further reading
Chapter 10: Configuring Microsoft Defender for Cloud Apps
Planning your MDA implementation
Configuring MDA
Managing Cloud App Discovery
Managing the MDA catalog
Managing apps and app connectors in MDA
Configuring policies and templates
Using Conditional Access App Control with MDA
Reviewing and interpreting alerts, reports, and dashboards
Summary
Questions
Further reading
Part 3: Implementing and Managing Information Protection
Chapter 11: Managing Sensitive Information
Planning a sensitivity label solution for your organization
Creating and managing SITs
Setting up sensitivity labels and policies
Setting up labels
Setting up label policies
Using sensitivity labels
Configuring and using Activity explorer
Using sensitivity labels with Teams, SharePoint, OneDrive, and Office apps
Summary
Questions
Further reading
Chapter 12: Managing Microsoft Purview Data Loss Prevention
Planning and implementing DLP
Managing DLP policies for Microsoft 365 workloads
Creating a DLP policy
Testing your DLP policy
Editing your DLP policy
DLP reporting and alerting capabilities
Using PowerShell with DLP reporting
Required permissions for DLP reports
Further alerting capabilities
Implementing Endpoint DLP
Summary
Questions
Further reading
Chapter 13: Managing Microsoft Purview Data Lifecycle Management
Planning for data lifecycle management
Records management
Analyzing reports and dashboards
Content explorer
Activity explorer
Configuring retention labels and policies
Creating a retention label
Creating a retention label policy
Applying retention labels
Creating a retention policy
Planning and implementing adaptive scopes
Finding and recovering deleted Microsoft 365 data
User mailboxes
OneDrive
Summary
Questions
Further reading
Part 4: Managing Compliance Features in Microsoft 365
Chapter 14: Monitoring and Analyzing Audit Logs and Reports in Microsoft Purview
Planning for auditing and reporting
Investigating compliance activities by using audit logs
Performing an audit log search
Reviewing and interpreting compliance reports and dashboards
Configuring alert policies
Configuring audit log retention policies
Summary
Questions
Further reading
Chapter 15: Planning For, Conducting, and Managing eDiscovery Cases
Recommending eDiscovery (Standard) or eDiscovery (Premium)
Planning for content searches and eDiscovery
Delegating the required permissions to use search and discovery tools
Creating eDiscovery cases
Managing eDiscovery cases
Adding custodians
Collecting data
Analyzing the review set results
Exporting and downloading case data
Additional tasks
Summary
Questions
Further reading
Chapter 16: Managing Regulatory and Privacy Requirements
Planning your regulatory compliance journey in Microsoft 365
Managing regulatory compliance in Microsoft Purview Compliance Manager
Access to Compliance Manager
Improvement actions
Assessments and assessment templates
Exploring Microsoft Priva
Implementing privacy risk management
Implementing and managing Subject Rights Requests with Microsoft Priva
Summary
Questions
Further reading
Chapter 17: Managing Insider Risk Solutions in Microsoft 365
Implementing Customer Lockbox
Implementing and managing Communication Compliance policies
Implementing and managing insider risk management policies
Getting started with Insider Risk Management policies
Creating Insider Risk Management policies
Implementing and managing Information Barriers policies
Segments and policies for Information Barriers
Implementing and managing Privileged Access Management
Summary
Questions
Further reading
Answers
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Index
About Packt
Other Books You May Enjoy


๐Ÿ“œ SIMILAR VOLUMES


Microsoft 365 Security Administration: M
โœ Peter Rising ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Get up to speed with expert tips and techniques to help you prepare effectively for the MS-500 Exam</b></p> <h4>Key Features</h4> <ul><li>Get the right guidance and discover techniques to improve the effectiveness of your studying and prepare for the exam </li> <li>Explore a wide variety of st

Microsoft 365 Security Administration MS
โœ Rising, Peter ๐Ÿ“‚ Library ๐Ÿ“… 0 ๐Ÿ› Packt Publishing ๐ŸŒ English

Synopsis Get up to speed with expert tips and techniques to help you prepare effectively for the MS-500 Exam Key Features Get the right guidance and discover techniques to improve the effectiveness of your studying and prepare for the exam Explore a wide variety of strategies for security

Microsoft 365 Security and Compliance fo
โœ Sasha Kranjac, Omar Kudoviฤ‡ ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Packt Publishing Pvt Ltd ๐ŸŒ English

n today's hostile cyber landscape, securing data and complying with regulations is paramount for individuals, businesses, and organizations alike. Learn how Microsoft 365 Security and Compliance offers powerful tools to protect sensitive data and defend against evolving cyber threats with this compr

Microsoft Security, Compliance, and Iden
โœ Dwayne Natwick ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Packt Publishing ๐ŸŒ English

Understand the fundamentals of security, compliance, and identity solutions across Microsoft Azure, Microsoft 365, and related cloud-based Microsoft services Key Features Grasp Azure AD services and identity principles, secure authentication, and access management Understand threat prot

Exam Ref SC-900 Microsoft Security, Comp
โœ Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Microsoft Press ๐ŸŒ English

<p><span>Prepare for Microsoft Exam SC-900</span><span> and help demonstrate your real-world knowledge of the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. Designed for business stakeholders, new and existing IT professionals, functional