Beginning Security with Microsoft Technologies
Protecting Office 365, Devices, and Data
Seiten
2019
|
1st ed.
Apress (Verlag)
978-1-4842-4852-2 (ISBN)
Apress (Verlag)
978-1-4842-4852-2 (ISBN)
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more.
Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you’ll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you’ll see that there are a variety of ways in which you can protect your information.
After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions.
What You Will Learn
Keep corporate data and user identities safe and secure
Identify various levels and stages of attacks
Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location
Use advanced threat analytics, Azure Security Center, and Azure ATP
Who This Book Is For
Administrators who want to build secure infrastructure at multiple levels such as email security, device security, cloud infrastructure security, and more.
Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you’ll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you’ll see that there are a variety of ways in which you can protect your information.
After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions.
What You Will Learn
Keep corporate data and user identities safe and secure
Identify various levels and stages of attacks
Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location
Use advanced threat analytics, Azure Security Center, and Azure ATP
Who This Book Is For
Administrators who want to build secure infrastructure at multiple levels such as email security, device security, cloud infrastructure security, and more.
Vasantha Lakshmi works at Microsoft, India as a partner technical consultant. She has been working on various security products within Microsoft for the last three years. She has more than 8 years' experience working as an architect for end-to-end solutions for Microsoft Office 365. She has created many integrated security solutions for the modern workplace that seamlessly integrate advanced threat analytics, Windows Defender Advanced Threat Protection, Microsoft cloud app security, Intune, and Office ATP.
Chapter 1: Current Security Outline.- Chapter 2: Securing Email and Office 365.- Chapter 3: Device Level Security.- Chapter 4: Identity Protection.- Chapter 5: Data Protection.
Erscheinungsdatum | 13.09.2019 |
---|---|
Zusatzinfo | 209 Illustrations, black and white; XV, 235 p. 209 illus. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 178 x 254 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
ISBN-10 | 1-4842-4852-X / 148424852X |
ISBN-13 | 978-1-4842-4852-2 / 9781484248522 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €