Microsoft 365 Security Administration:MS-500 Exam Guide
Peter Rising更新时间:2021-06-18 18:58:09
最新章节:Other Books You May Enjoy封面
版权信息
Why subscribe?
Contributors About the author
About the reviewers
Packt is searching for authors like you
Preface
Section 1: Configuring and Administering Identity and Access in Microsoft 365
Chapter 1: Planning for Hybrid Identity
Planning your hybrid environment
Synchronization methods with Azure AD Connect
Additional authentication security
Event monitoring and troubleshooting in Azure AD Connect
Summary
Questions
References
Chapter 2: Authentication and Security
Implementing Azure AD dynamic group membership
Implementing Azure AD self-service password reset (SSPR)
Implementing and managing Multi-Factor Authentication (MFA)
Managing Azure AD access reviews
Summary
Questions
References
Chapter 3: Implementing Conditional Access Policies
Explaining Conditional Access
Enhancing Conditional Access with Intune
Device-based Conditional Access
App-based Conditional Access
Monitoring Conditional Access events
Summary
Questions
References
Chapter 4: Role Assignment and Privileged Identities in Microsoft 365
Planning configuring and monitoring RBAC
Planning configuring and monitoring PIM
Summary
Questions
References
Chapter 5: Azure AD Identity Protection
Understanding Identity Protection
Configuring MFA registration policies
Configuring alert options
Managing and resolving risk events
Summary
Questions
References
Section 2: Implementing and Managing Threat Protection
Chapter 6: Configuring an Advanced Threat Protection Solution
Identifying the organizational needs for Azure ATP
Setting up an Azure ATP instance
Managing Azure ATP activities
Summary
Questions
References
Chapter 7: Configuring Microsoft Defender ATP to Protect Devices
Technical requirements
Implementing Microsoft Defender ATP
Managing and monitoring Microsoft Defender ATP
Implementing additional Microsoft Defender features
Managing device encryption for your Windows 10 devices
Summary
Questions
References
Chapter 8: Message Protection in Office 365
Protecting users and domains with ATP anti-phishing protection and policies
Configuring Office 365 anti-spam protection
Exploring Office 365 ATP Safe Attachments options and policies
Exploring Office 365 ATP Safe Links options blocked URLs and policies
Summary
Questions
References
Chapter 9: Threat Intelligence and Tracking
Understanding the Office 365 threat management security dashboard
Using Office 365 Threat Explorer and threat trackers
Managing quarantined messages and files
Performing controlled simulated attacks
Summary
Questions
References
Section 3: Information Protection in Microsoft 365
Chapter 10: Controlling Secure Access to Information Stored in Office 365
Understanding privileged access management
Understanding Customer Lockbox
Protecting access to the collaboration components of Office 365
Allowing external user access with B2B sharing
Summary
Questions
References
Chapter 11: Azure Information Protection
Planning and implementing an AIP deployment for your organization
Setting up AIP labels and policies
Using the AIP Scanner to detect and protect on-premises content
Tracking and revoking protected documents
Summary
Questions
References
Chapter 12: Data Loss Prevention
Planning and implementing DLP
Creating DLP policies and assigning them to Office 365 locations
Managing sensitive information types
DLP reporting and alerting capabilities
Summary
Questions
References
Chapter 13: Cloud App Discovery and Security
Understanding Cloud App Security
Configuring Cloud App Security
Using the Cloud App Security dashboard reports and logs
Summary
Questions
References
Section 4: Data Governance and Compliance in Microsoft 365
Chapter 14: Security Analytics and Auditing Capabilities
Understanding Desktop Analytics Windows diagnostics and Office Telemetry
Configuring Office 365 auditing
Performing an audit log search
Configuring an audit alert policy
Summary
Questions
References
Chapter 15: Personal Data Protection in Microsoft 365
Conducting searches for personal data
Using retention labels to protect personal data
Accessing logs and reports to search for and monitor personal data leaks
Summary
Questions
References
Chapter 16: Data Governance and Retention
Understanding data governance and the retention requirements for your organization
Navigating data governance reports and dashboards
Configuring retention tags retention policies and supervision policies
Configuring litigation holds to preserve Office 365 data
Importing data into Office 365 from the Security & Compliance Center
Configuring archiving
Summary
Questions
References
Chapter 17: Search and Investigation
Understanding eDiscovery and content search in Microsoft 365
eDiscovery delegated role groups
Creating eDiscovery cases placing locations on hold and performing content searches
Exporting content search results
Summary
Questions
References
Chapter 18: Data Privacy Compliance
Planning for regulatory compliance in Microsoft 365
Accessing the GDPR dashboards and reports
Completing DSRs
Summary
Questions
References
Section 5: Mock Exam and Assessment
Chapter 19: Mock Exam
Case Study
Chapter 20: Mock Exam Answers
Answers and explanations
Chapter 21: Assessments
Chapter 1 – Planning for Hybrid Identity
Chapter 2 – Authentication and Security
Chapter 3 – Implementing Conditional Access Policies
Chapter 4 – Role Assignment and Privileged Identities in Microsoft 365
Chapter 5 – Azure AD Identity Protection
Chapter 6 – Configuring an Advanced Threat Protection Solution
Chapter 7 – Configuring Microsoft Defender ATP to Protect Devices
Chapter 8 – Message Protection in Office 365
Chapter 9 – Threat Intelligence and Tracking
Chapter 10 – Controlling Secure Access to Information Stored in Office 365
Chapter 11 – Azure Information Protection
Chapter 12 – Data Loss Prevention
Chapter 13 – Cloud App Discovery and Security
Chapter 14 – Security Analytics and Auditing Capabilities
Chapter 15 – Personal Data Protection in Microsoft 365
Chapter 16 – Data Governance and Retention
Chapter 17 – Search and Investigation
Chapter 18 – Data Privacy Compliance
Other Books You May Enjoy
更新时间:2021-06-18 18:58:09