Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

$19.99

Download Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments written by Peter Rising in PDF format. This book is under the category Computers and bearing the isbn/isbn13 number 1838983120/9781838983123. You may reffer the table below for additional details of the book.

SKU: 74306eef5860 Category: Tag:

Specifications

book-author

Peter Rising

publisher

Packt Publishing

file-type

PDF

pages

642 pages

language

English

isbn10

1838983120

isbn13

9781838983123


Book Description

Get up to speed with expert tips and techniques to help you train effectively for the MS-500 Exam

Key Features

  • Examine a wide variety of strategies for security and compliance
  • Gain knowledge that can be implemented in real-world situations
  • Get the right guidance and find techniques to improve the effectiveness of your studying and prepare for the exam

eBook Description

The Microsoft 365 Security Administration (MS-500) Exam Guide; (PDF) is designed to gauge your ability to perform technical tasks such as managing; monitoring; implementing and security and compliance solutions for Microsoft 365 environments.

This ebook starts by showing you how to configure and administer identity and access in Microsoft 365. You will learn about authentication methods; hybrid identity; and conditional access policies with Microsoft Intune. Next; the ebook shows you how RBAC and Azure AD Identity Protection can be used to help you identify risks and secure information in your organization. You will also examine concepts; such as Advanced Threat Protection; Threat Intelligence; and Windows Defender ATP. As you advance; you will learn about additional tools and techniques to configure and manage Microsoft 365; including Azure Data Loss Prevention; Information Protection; and Cloud App Discovery and Security. The ebook also makes sure you are well prepared to take the exam by giving you the chance to work through a mock paper; illustrations; topic summaries that briefly revise key points; and real-world scenarios.

By the end of Microsoft 365 book; you will be able to use your skills in the real world; while also being prepared to get Microsoft certification.

What you will learn

  • Implement and handle information protection
  • Understand how to use and manage threat protection
  • Examine best practices for effective configuration and deployment
  • Get up to speed with implementing and managing identity and access
  • Get to grips with handling governance and compliance features in Microsoft 365
  • Prepare to pass the Microsoft exam and attain certification with the help of self-assessment questions and a mock exam

Who this ebook is for

This Microsoft certification ebook is designed to help IT administrators; professionals; or someone looking to pursue a profession in security administration by becoming certified with Microsoft’s role-based qualification. Those trying to prove their skills and improve their competitive advantage with Microsoft 365 Security Administration will also find this ebook to be a useful resource.

  1. Planning for Hybrid Identity
  2. Authentication and Security
  3. Azure AD Identity Protection
  4. Data Loss Prevention
  5. Cloud App Discovery and Security
  6. Threat Intelligence and Tracking
  7. Azure Information Protection
  8. Message Protection in Office 365
  9. Implementing Conditional Access Policies
  10. Personal Data Protection in Microsoft 365
  11. Search and Investigation
  12. Data Governance and Retention
  13. Configuring an Advanced Threat Protection Solution
  14. Security Analytics and Auditing Capabilities
  15. Configuring Microsoft Defender ATP to Protect Devices
  16. Controlling Secure Access to Information Stored in Office 365
  17. Role Assignment and Privileged Identities in Microsoft 365
  18. Data Privacy Compliance
  19. Mock Exam
  20. Mock Exam Answers
  21. Assessments

NOTE: The product includes the ebook; Microsoft 365 Security Administration (MS-500) Exam Guide in PDF. No access codes are included.

Additional information

book-author

Peter Rising

publisher

Packt Publishing

file-type

PDF

pages

642 pages

language

English

isbn10

1838983120

isbn13

9781838983123

Table of contents


Table of contents :
Cover
Title Page
Copyright and Credits
About Packt
Contributors
Table of Contents
Preface
Section 1: Configuring and Administering Identity and Access in Microsoft 365
Chapter 1: Planning for Hybrid Identity
Planning your hybrid environment
Synchronization methods with Azure AD Connect
Password hash synchronization
Pass-through authentication
Federation
Azure AD Seamless Single Sign-On
Additional authentication security
Multi-factor authentication
Self-service password reset
Conditional Access
Event monitoring and troubleshooting in Azure AD Connect
Summary
Questions
References
Chapter 2: Authentication and Security
Implementing Azure AD dynamic group membership
Creating a dynamic group in Azure AD using the Azure portal
Creating dynamic groups with Azure AD PowerShell
Using group-based licensing in Azure AD
Implementing Azure AD self-service password reset (SSPR)
Setting up SSPR
Registering for SSPR
Using SSPR to reset passwords
Combined registration for SSPR and MFA
Implementing and managing Multi-Factor Authentication (MFA)
Enabling MFA
Service settings
Configuring the secondary authentication method
Managing Azure AD access reviews
Performing an access review
Summary
Questions
References
Chapter 3: Implementing Conditional Access Policies
Explaining Conditional Access
Creating a simple Conditional Access policy
Enhancing Conditional Access with Intune
Device-based Conditional Access
Creating a device-based Conditional Access policy
App-based Conditional Access
Creating an app-based Conditional Access policy
Monitoring Conditional Access events
Summary
Questions
References
Chapter 4: Role Assignment and Privileged Identities in Microsoft 365
Planning, configuring, and monitoring RBAC
Planning RBAC
Configuring RBAC
Monitoring RBAC
Planning, configuring, and monitoring PIM
Planning PIM
Configuring PIM
Monitoring PIM
Summary
Questions
References
Chapter 5: Azure AD Identity Protection
Understanding Identity Protection
Configuring MFA registration policies
Configuring alert options
Users at risk detected alerts
Weekly digest
Managing and resolving risk events
Examining users at risk
Examining risky sign-ins
Examining risk detections
Summary
Questions
References
Section 2: Implementing and Managing Threat Protection
Chapter 6: Configuring an Advanced Threat Protection Solution
Identifying the organizational needs for Azure ATP
Understanding suspicious activity
Exploring advanced attacks and malicious activities
Understanding the Azure ATP architecture
Setting up an Azure ATP instance
Additional configuration options
Managing Azure ATP activities
The security alerts timeline in the Azure ATP portal
Azure ATP reports
The Azure ATP workspace health center
Summary
Questions
References
Chapter 7: Configuring Microsoft Defender ATP to Protect Devices
Technical requirements
Licensing requirements
Supported operating systems
Implementing Microsoft Defender ATP
Configuring Microsoft Defender ATP
Managing and monitoring Microsoft Defender ATP
Attack surface reduction capabilities
The Secure score dashboard
Integrating with Azure ATP
The Microsoft Defender Security Center settings
Implementing additional Microsoft Defender features
Configuring Microsoft Defender Application Guard
Configuring Microsoft Defender Application Control
Configuring Microsoft Defender Exploit Guard
Using WIP to configure WIP policies and protect data
Managing device encryption for your Windows 10 devices
Introduction to BitLocker
Summary
Questions
References
Chapter 8: Message Protection in Office 365
Protecting users and domains with ATP anti-phishing protection and policies
Setting up an ATP anti-phishing policy
Configuring Office 365 anti-spam protection
Default spam filter policy
Connection filter policy
Outbound spam filter policy
Exploring Office 365 ATP Safe Attachments options and policies
Creating a Safe Attachments policy from the Security and Compliance Center
Creating a Safe Attachments policy using Windows PowerShell
Exploring Office 365 ATP Safe Links options, blocked URLs, and policies
Viewing or modifying the default Safe Links policy from the Security and Compliance Center
Creating a new Safe Links policy from the Security and Compliance Center
Creating a Safe Links policy using Windows PowerShell
Summary
Questions
References
Chapter 9: Threat Intelligence and Tracking
Understanding the Office 365 threat management security dashboard
Threat protection status
Insights
Threat Intelligence
Trends
Using Office 365 Threat Explorer and threat trackers
Using Threat Explorer
Using threat trackers
Managing quarantined messages and files
Performing controlled simulated attacks
Launching an attack
Summary
Questions
References
Section 3: Information Protection in Microsoft 365
Chapter 10: Controlling Secure Access to Information Stored in Office 365
Understanding privileged access management
Enabling PAM
Submitting and approving PAM requests
Understanding Customer Lockbox
Enabling Customer Lockbox
Responding to Customer Lockbox requests
Protecting access to the collaboration components of Office 365
Allowing external user access with B2B sharing
Summary
Questions
References
Chapter 11: Azure Information Protection
Planning and implementing an AIP deployment for your organization
Checking AIP activation status using the Office 365 Admin Center
Checking AIP activation status using the Azure portal
Checking AIP activation status using the Azure AIPService PowerShell
Configuring AIP superusers
Setting up AIP labels and policies
Setting up labels
Setting up label policies
Enabling Unified labeling
User experience
Using the AIP Scanner to detect and protect on-premises content
Installing the AIP Scanner
Tracking and revoking protected documents
Summary
Questions
References
Chapter 12: Data Loss Prevention
Planning and implementing DLP
Creating DLP policies and assigning them to Office 365 locations
Testing your DLP policy
Editing your DLP policy
Managing sensitive information types
DLP reporting and alerting capabilities
Summary
Questions
References
Chapter 13: Cloud App Discovery and Security
Understanding Cloud App Security
Cloud Discovery
Sanctioning or unsanctioning cloud apps
Using app connectors to gain visibility and control of third-party apps
Using Azure AD Conditional Access App Control in conjunction with Cloud App Security
Using built-in policies or creating custom policies to control SaaS app usage
Configuring Cloud App Security
Using the Cloud App Security dashboard, reports, and logs
Summary
Questions
References
Section 4: Data Governance and Compliance in Microsoft 365
Chapter 14: Security Analytics and Auditing Capabilities
Understanding Desktop Analytics, Windows diagnostics, and Office Telemetry
Desktop Analytics
Windows diagnostics
Office Telemetry
Configuring Office 365 auditing
Turning on the audit log
Performing an audit log search
Configuring an audit alert policy
Summary
Questions
References
Chapter 15: Personal Data Protection in Microsoft 365
Conducting searches for personal data
Using retention labels to protect personal data
Accessing logs and reports to search for and monitor personal data leaks
Data loss prevention reports
Alert policies
Microsoft Cloud App Security
Summary
Questions
References
Chapter 16: Data Governance and Retention
Understanding data governance and the retention requirements for your organization
The content is modified or deleted during the retention period
The content is unchanged during the retention period
Mailbox and public folder content
Navigating data governance reports and dashboards
Configuring retention tags, retention policies, and supervision policies
Creating a retention policy using the Exchange admin center
Creating a retention policy using the Security & Compliance Center
Creating a supervision policy
Configuring litigation holds to preserve Office 365 data
Litigation Hold
Importing data into Office 365 from the Security & Compliance Center
Configuring archiving
Summary
Questions
References
Chapter 17: Search and Investigation
Understanding eDiscovery and content search in Microsoft 365
eDiscovery cases
Content search
Advanced eDiscovery
eDiscovery delegated role groups
Creating eDiscovery cases, placing locations on hold, and performing content searches
Creating an eDiscovery case and placing locations on hold
Performing a content search
Exporting content search results
Summary
Questions
References
Chapter 18: Data Privacy Compliance
Planning for regulatory compliance in Microsoft 365
Phase 1 – the first 30 days
Phase 2 – after 90 days
Phase 3 – ongoing
Accessing the GDPR dashboards and reports
Service Trust Portal
Microsoft Compliance Score
The GDPR dashboard and the GDPR toolbox
Completing DSRs
Summary
Questions
References
Section 5: Mock Exam and Assessment
Chapter 19: Mock Exam
Case Study
Overview
Chapter 20: Mock Exam Answers
Answers and explanations
Chapter 21: Assessments
Chapter 1 – Planning for Hybrid Identity
Chapter 2 – Authentication and Security
Chapter 3 – Implementing Conditional Access Policies
Chapter 4 – Role Assignment and Privileged Identities in Microsoft 365
Chapter 5 – Azure AD Identity Protection
Chapter 6 – Configuring an Advanced Threat Protection Solution
Chapter 7 – Configuring Microsoft Defender ATP to Protect Devices
Chapter 8 – Message Protection in Office 365
Chapter 9 – Threat Intelligence and Tracking
Chapter 10 – Controlling Secure Access to Information Stored in Office 365
Chapter 11 – Azure Information Protection
Chapter 12 – Data Loss Prevention
Chapter 13 – Cloud App Discovery and Security
Chapter 14 – Security Analytics and Auditing Capabilities
Chapter 15 – Personal Data Protection in Microsoft 365
Chapter 16 – Data Governance and Retention
Chapter 17 – Search and Investigation
Chapter 18 – Data Privacy Compliance
Other Books You May Enjoy
Leave a review – let other readers know what you think
Index

Recent Posts

5 tips for a good business blog

Follow my blog with BloglovinAre you also looking for a good structure for your business blogs? That you finally have a serious and good structure for all your texts that are online? On your website but also on social media. In this review you will find 5 tips from Susanna Florie from her…

Study tips from a budding engineer

“Why engineering?” is a question I get often. The answer for me is simple: I like to solve problems. Engineering is a popular field for many reasons. Perhaps this is because almost everything around us is created by engineers in one way or another, and there are always new, emerging and exciting technologies impacting…

How do I study mathematics and pass my exam?

Not sure how best to study math ? Are you perhaps someone who starts studying the day before the exam? Then you know yourself that your situation is not the most ideal. Unfortunately, there is no magic bullet to make you a maths crack or pass your exam in no time . It is important to know that mathematics always builds on…

(0)
×