Sale!

Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

$24.99

Download Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments written by Peter Rising in PDF format. This book is under the category Computers and bearing the isbn/isbn13 number 1838983120/9781838983123. You may reffer the table below for additional details of the book. We do NOT provide access codes, we provide eBooks ONLY. Instant access will be granted as soon as you complete the payment.

SKU: dfbd282c1830 Category: Tag:

Specifications

book-author

Peter Rising

publisher

Packt Publishing

file-type

PDF

pages

642 pages

language

English

isbn10

1838983120

isbn13

9781838983123


Book Description

Gain a better understanding of proven strategies and recommendations from industry professionals to improve the quality of your preparation for the MS-500 exam.

Principal Attributes

 

 

 

Investigate a wide range of approaches to safeguarding and regulatory conformity.

 

Acquire knowledge that is applicable to events that occur in the actual world.

 

To enhance the efficiency of your studying and to get yourself ready for the test, seek out the appropriate direction and investigate various methods.

 

 

 

eBook Description

Your ability to perform technical duties such as administering, monitoring, and implementing security and compliance solutions for Microsoft 365 environments will be evaluated using the Microsoft 365 Security Administration (MS-500) Exam Guide; (PDF).

This ebook will begin by walking you through the steps necessary to create and administer identity and access in Microsoft 365. Through the use of Microsoft Intune, you will acquire knowledge regarding authentication techniques, hybrid identities, and conditional access controls. Next, the ebook will demonstrate to you how RBAC and Azure AD Identity Protection may be utilized to assist you in determining potential threats to your organization's information and to better safeguard that information. In addition to this, you will investigate several ideas, such as Windows Defender ATP, Advanced Threat Protection, and Threat Intelligence. As you progress through the training, you will get familiar with additional tools and methods for configuring and managing Microsoft 365. Some of these tools and methods include Azure Data Loss Prevention, Information Protection, and Cloud App Discovery and Security. You will also be given the opportunity to practice for the exam by working through a sample paper, viewing pictures, reading topic summaries that provide a concise review of essential ideas, and going through hypothetical situations, all of which are included in the ebook.

When you have completed the Microsoft 365 book, not only will you be able to use your knowledge in the real world, but you will also be ready to take the Microsoft certification exam.

What it is that you will pick up

  • Protection of information should be implemented and managed.
  • Have a working knowledge of how to apply and administer threat protection.
  • Investigate the best methods currently available for efficient configuration and deployment.
  • Become familiar with the processes of implementing and managing identification and access.
  • Learn how to handle the governance and compliance capabilities in Microsoft 365 by reading this guide.
  • Self-evaluation questions and a practice test can be used to help candidates get ready to take the Microsoft certification exam and improve their chances of success.

 

 

 

Who should read this ebook:

This Microsoft certification booklet is intended to be of assistance to IT administrators, security administration professionals, and anybody else interested in pursuing a career in security administration by becoming certified with Microsoft's role-based qualification. This booklet is a helpful resource for people who are trying to demonstrate their knowledge of Microsoft 365 Security Administration and improve their advantage over the competition using that software.

  • Making preparations towards a hybrid identity
  • Authentication as well as Safety and Protection
  • Protecting identities with Azure Active Directory
  • Data Loss Prevention
  • Cloud Application Exploration and Safety Measures
  • Tracking and Intelligence on Potential Dangers
  • Protection of Azure-Stored Information
  • Protection of Communications in Office 365
  • Putting into effect policies for conditional access
  • Protection of Individual Information in Microsoft 365
  • Conducting Searches and Inquiries
  • Governance of Data and Data Retention
  • Setting up a Solution for Advanced Threat Protection
  • Capabilities in Security Auditing and Analytical Monitoring
  • How to Set Up and Configure Microsoft Defender ATP to Protect Devices
  • Office 365 Information Storage and the Management of Controlled and Secure Access
  • Microsoft 365's System for Assigning Roles and Managing Users' Privileges
  • Compliance with Data Privacy Regulations
  • Mock Exam
  • Mock Exam Answers
  • Assessments

 

PLEASE TAKE NOTE That the Microsoft 365 Security Administration (MS-500) Exam Guide in PDF format is included with the purchase of this product. There are no access codes contained within.

book-author

Peter Rising

publisher

Packt Publishing

file-type

PDF

pages

642 pages

language

English

isbn10

1838983120

isbn13

9781838983123

Table of contents


Table of contents :
Cover
Title Page
Copyright and Credits
About Packt
Contributors
Table of Contents
Preface
Section 1: Configuring and Administering Identity and Access in Microsoft 365
Chapter 1: Planning for Hybrid Identity
Planning your hybrid environment
Synchronization methods with Azure AD Connect
Password hash synchronization
Pass-through authentication
Federation
Azure AD Seamless Single Sign-On
Additional authentication security
Multi-factor authentication
Self-service password reset
Conditional Access
Event monitoring and troubleshooting in Azure AD Connect
Summary
Questions
References
Chapter 2: Authentication and Security
Implementing Azure AD dynamic group membership
Creating a dynamic group in Azure AD using the Azure portal
Creating dynamic groups with Azure AD PowerShell
Using group-based licensing in Azure AD
Implementing Azure AD self-service password reset (SSPR)
Setting up SSPR
Registering for SSPR
Using SSPR to reset passwords
Combined registration for SSPR and MFA
Implementing and managing Multi-Factor Authentication (MFA)
Enabling MFA
Service settings
Configuring the secondary authentication method
Managing Azure AD access reviews
Performing an access review
Summary
Questions
References
Chapter 3: Implementing Conditional Access Policies
Explaining Conditional Access
Creating a simple Conditional Access policy
Enhancing Conditional Access with Intune
Device-based Conditional Access
Creating a device-based Conditional Access policy
App-based Conditional Access
Creating an app-based Conditional Access policy
Monitoring Conditional Access events
Summary
Questions
References
Chapter 4: Role Assignment and Privileged Identities in Microsoft 365
Planning, configuring, and monitoring RBAC
Planning RBAC
Configuring RBAC
Monitoring RBAC
Planning, configuring, and monitoring PIM
Planning PIM
Configuring PIM
Monitoring PIM
Summary
Questions
References
Chapter 5: Azure AD Identity Protection
Understanding Identity Protection
Configuring MFA registration policies
Configuring alert options
Users at risk detected alerts
Weekly digest
Managing and resolving risk events
Examining users at risk
Examining risky sign-ins
Examining risk detections
Summary
Questions
References
Section 2: Implementing and Managing Threat Protection
Chapter 6: Configuring an Advanced Threat Protection Solution
Identifying the organizational needs for Azure ATP
Understanding suspicious activity
Exploring advanced attacks and malicious activities
Understanding the Azure ATP architecture
Setting up an Azure ATP instance
Additional configuration options
Managing Azure ATP activities
The security alerts timeline in the Azure ATP portal
Azure ATP reports
The Azure ATP workspace health center
Summary
Questions
References
Chapter 7: Configuring Microsoft Defender ATP to Protect Devices
Technical requirements
Licensing requirements
Supported operating systems
Implementing Microsoft Defender ATP
Configuring Microsoft Defender ATP
Managing and monitoring Microsoft Defender ATP
Attack surface reduction capabilities
The Secure score dashboard
Integrating with Azure ATP
The Microsoft Defender Security Center settings
Implementing additional Microsoft Defender features
Configuring Microsoft Defender Application Guard
Configuring Microsoft Defender Application Control
Configuring Microsoft Defender Exploit Guard
Using WIP to configure WIP policies and protect data
Managing device encryption for your Windows 10 devices
Introduction to BitLocker
Summary
Questions
References
Chapter 8: Message Protection in Office 365
Protecting users and domains with ATP anti-phishing protection and policies
Setting up an ATP anti-phishing policy
Configuring Office 365 anti-spam protection
Default spam filter policy
Connection filter policy
Outbound spam filter policy
Exploring Office 365 ATP Safe Attachments options and policies
Creating a Safe Attachments policy from the Security and Compliance Center
Creating a Safe Attachments policy using Windows PowerShell
Exploring Office 365 ATP Safe Links options, blocked URLs, and policies
Viewing or modifying the default Safe Links policy from the Security and Compliance Center
Creating a new Safe Links policy from the Security and Compliance Center
Creating a Safe Links policy using Windows PowerShell
Summary
Questions
References
Chapter 9: Threat Intelligence and Tracking
Understanding the Office 365 threat management security dashboard
Threat protection status
Insights
Threat Intelligence
Trends
Using Office 365 Threat Explorer and threat trackers
Using Threat Explorer
Using threat trackers
Managing quarantined messages and files
Performing controlled simulated attacks
Launching an attack
Summary
Questions
References
Section 3: Information Protection in Microsoft 365
Chapter 10: Controlling Secure Access to Information Stored in Office 365
Understanding privileged access management
Enabling PAM
Submitting and approving PAM requests
Understanding Customer Lockbox
Enabling Customer Lockbox
Responding to Customer Lockbox requests
Protecting access to the collaboration components of Office 365
Allowing external user access with B2B sharing
Summary
Questions
References
Chapter 11: Azure Information Protection
Planning and implementing an AIP deployment for your organization
Checking AIP activation status using the Office 365 Admin Center
Checking AIP activation status using the Azure portal
Checking AIP activation status using the Azure AIPService PowerShell
Configuring AIP superusers
Setting up AIP labels and policies
Setting up labels
Setting up label policies
Enabling Unified labeling
User experience
Using the AIP Scanner to detect and protect on-premises content
Installing the AIP Scanner
Tracking and revoking protected documents
Summary
Questions
References
Chapter 12: Data Loss Prevention
Planning and implementing DLP
Creating DLP policies and assigning them to Office 365 locations
Testing your DLP policy
Editing your DLP policy
Managing sensitive information types
DLP reporting and alerting capabilities
Summary
Questions
References
Chapter 13: Cloud App Discovery and Security
Understanding Cloud App Security
Cloud Discovery
Sanctioning or unsanctioning cloud apps
Using app connectors to gain visibility and control of third-party apps
Using Azure AD Conditional Access App Control in conjunction with Cloud App Security
Using built-in policies or creating custom policies to control SaaS app usage
Configuring Cloud App Security
Using the Cloud App Security dashboard, reports, and logs
Summary
Questions
References
Section 4: Data Governance and Compliance in Microsoft 365
Chapter 14: Security Analytics and Auditing Capabilities
Understanding Desktop Analytics, Windows diagnostics, and Office Telemetry
Desktop Analytics
Windows diagnostics
Office Telemetry
Configuring Office 365 auditing
Turning on the audit log
Performing an audit log search
Configuring an audit alert policy
Summary
Questions
References
Chapter 15: Personal Data Protection in Microsoft 365
Conducting searches for personal data
Using retention labels to protect personal data
Accessing logs and reports to search for and monitor personal data leaks
Data loss prevention reports
Alert policies
Microsoft Cloud App Security
Summary
Questions
References
Chapter 16: Data Governance and Retention
Understanding data governance and the retention requirements for your organization
The content is modified or deleted during the retention period
The content is unchanged during the retention period
Mailbox and public folder content
Navigating data governance reports and dashboards
Configuring retention tags, retention policies, and supervision policies
Creating a retention policy using the Exchange admin center
Creating a retention policy using the Security & Compliance Center
Creating a supervision policy
Configuring litigation holds to preserve Office 365 data
Litigation Hold
Importing data into Office 365 from the Security & Compliance Center
Configuring archiving
Summary
Questions
References
Chapter 17: Search and Investigation
Understanding eDiscovery and content search in Microsoft 365
eDiscovery cases
Content search
Advanced eDiscovery
eDiscovery delegated role groups
Creating eDiscovery cases, placing locations on hold, and performing content searches
Creating an eDiscovery case and placing locations on hold
Performing a content search
Exporting content search results
Summary
Questions
References
Chapter 18: Data Privacy Compliance
Planning for regulatory compliance in Microsoft 365
Phase 1 – the first 30 days
Phase 2 – after 90 days
Phase 3 – ongoing
Accessing the GDPR dashboards and reports
Service Trust Portal
Microsoft Compliance Score
The GDPR dashboard and the GDPR toolbox
Completing DSRs
Summary
Questions
References
Section 5: Mock Exam and Assessment
Chapter 19: Mock Exam
Case Study
Overview
Chapter 20: Mock Exam Answers
Answers and explanations
Chapter 21: Assessments
Chapter 1 – Planning for Hybrid Identity
Chapter 2 – Authentication and Security
Chapter 3 – Implementing Conditional Access Policies
Chapter 4 – Role Assignment and Privileged Identities in Microsoft 365
Chapter 5 – Azure AD Identity Protection
Chapter 6 – Configuring an Advanced Threat Protection Solution
Chapter 7 – Configuring Microsoft Defender ATP to Protect Devices
Chapter 8 – Message Protection in Office 365
Chapter 9 – Threat Intelligence and Tracking
Chapter 10 – Controlling Secure Access to Information Stored in Office 365
Chapter 11 – Azure Information Protection
Chapter 12 – Data Loss Prevention
Chapter 13 – Cloud App Discovery and Security
Chapter 14 – Security Analytics and Auditing Capabilities
Chapter 15 – Personal Data Protection in Microsoft 365
Chapter 16 – Data Governance and Retention
Chapter 17 – Search and Investigation
Chapter 18 – Data Privacy Compliance
Other Books You May Enjoy
Leave a review – let other readers know what you think
Index

Reviews

There are no reviews yet.

Be the first to review “Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments”