Beginning security with Microsoft technologies : protecting Office 365, devices, and data
著者
書誌事項
Beginning security with Microsoft technologies : protecting Office 365, devices, and data
(Books for professionals by professionals)
Apress, c2019
- : pbk
大学図書館所蔵 全1件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes index
内容説明・目次
内容説明
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more.
Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you'll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you'll see that there are a variety of ways in which you can protect your information.
After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions.
What You Will Learn
Keep corporate data and user identities safe and secure
Identify various levels and stages of attacks
Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location
Use advanced threat analytics, Azure Security Center, and Azure ATP
Who This Book Is For
Administrators who want to build secure infrastructure at multiple levels such as email security, device security, cloud infrastructure security, and more.
目次
Chapter 1: Current Security Outline Chapter Goal: To introduce all the products that will be explained in detail as we go into further chapters and how these products are solving the current security challenges
No of pages 20 -25 pages.
Sub -Topics
1. Explain about spams & phishing attacks and how Office ATP helps fight these attacks
2. Explain about the importance of device level security and how various products such as device guard, Intune, Windows Defender, credential guard, secure boot etc. helps an organization with Pre-breach scenarios. Also explain how WDATP helps with post breach scenario
3. Then comes the lateral movement of an attacker into an organization's infrastructure and trying to gain domain dominance by attacks such as pass the hash and pass the ticket. It could be hosted on-premises or on Azure. Advanced threat analytics, Azure Security Center & Azure ATP can help in these scenarios.
4. Explain information protection and how data loss prevention is an important criterion for every organization. How products such as Azure Information Protection, MCAS, Windows Information Protection can help everyone safe guard their information regardless of where the document lies including cloud-apps.
Chapter 2: Securing Emails & O365 Chapter Goal: Explain how O365 fights phishing & spams.
No of pages:50-70 Pages
Sub - Topics
1. Threat management strategy for O365
2. Exchange Online Protection
3. Advanced Threat Protection
4. O365 Trust Center & Service Trust Portal
Chapter 3: Device Level Security Chapter Goal: Understanding Pre-breach & Post breach protection for Windows devices
No of pages: 60-80
Sub - Topics:
1. Pre-breach options in windows such as windows defender, credential guard, device guard etc.
2. Secure Boot, Device Health Attestation
3. Windows 10 Exploit Guard
4. Post breach solution - WDATP in Endpoint Detection & Response
Chapter 4: Enterprise Level Protection Chapter Goal: Explain how ATA aids in Enterprise Level Protection
No of pages: 60-80 pages
Sub - Topics:
1. Advanced Threat Analytics
2. Azure Advanced Threat Protection
3. Azure Security Center
3. Operation Management Suite with ASC
4. Network, Storage Protection on Azure
5. Identity Protection on Azure
Chapter 5: Information Protection Chapter Goal: Explain various types of information protection possible with Microsoft Products
No of pages: 60-80 pages
Sub - Topics:
1. Azure Information Protection
2. Windows Information Protection
3. Microsoft Cloud App Security
「Nielsen BookData」 より