Beginning security with Microsoft technologies : protecting Office 365, devices, and data /: protecting Office 365, devices, and data. (2019)
- Record Type:
- Book
- Title:
- Beginning security with Microsoft technologies : protecting Office 365, devices, and data /: protecting Office 365, devices, and data. (2019)
- Main Title:
- Beginning security with Microsoft technologies : protecting Office 365, devices, and data
- Further Information:
- Note: Vasantha Lakshmi.
- Other Names:
- Lakshmi, Vasantha
- Contents:
- Chapter 1: Current Security Outline Chapter Goal: To introduce all the products that will be explained in detail as we go into further chapters and how these products are solving the current security challenges No of pages 20 -25 pages. Sub -Topics 1. Explain about spams & phishing attacks and how Office ATP helps fight these attacks 2. Explain about the importance of device level security and how various products such as device guard, Intune, Windows Defender, credential guard, secure boot etc. helps an organization with Pre-breach scenarios. Also explain how WDATP helps with post breach scenario 3. Then comes the lateral movement of an attacker into an organization's infrastructure and trying to gain domain dominance by attacks such as pass the hash and pass the ticket. It could be hosted on-premises or on Azure. Advanced threat analytics, Azure Security Center & Azure ATP can help in these scenarios. 4. Explain information protection and how data loss prevention is an important criterion for every organization. How products such as Azure Information Protection, MCAS, Windows Information Protection can help everyone safe guard their information regardless of where the document lies including cloud-apps. Chapter 2: Securing Emails & O365 Chapter Goal: Explain how O365 fights phishing & spams. No of pages:50-70 Pages Sub - Topics 1. Threat management strategy for O365 2. Exchange Online Protection 3. Advanced Threat Protection 4. O365 Trust Center & Service Trust PortalChapter 1: Current Security Outline Chapter Goal: To introduce all the products that will be explained in detail as we go into further chapters and how these products are solving the current security challenges No of pages 20 -25 pages. Sub -Topics 1. Explain about spams & phishing attacks and how Office ATP helps fight these attacks 2. Explain about the importance of device level security and how various products such as device guard, Intune, Windows Defender, credential guard, secure boot etc. helps an organization with Pre-breach scenarios. Also explain how WDATP helps with post breach scenario 3. Then comes the lateral movement of an attacker into an organization's infrastructure and trying to gain domain dominance by attacks such as pass the hash and pass the ticket. It could be hosted on-premises or on Azure. Advanced threat analytics, Azure Security Center & Azure ATP can help in these scenarios. 4. Explain information protection and how data loss prevention is an important criterion for every organization. How products such as Azure Information Protection, MCAS, Windows Information Protection can help everyone safe guard their information regardless of where the document lies including cloud-apps. Chapter 2: Securing Emails & O365 Chapter Goal: Explain how O365 fights phishing & spams. No of pages:50-70 Pages Sub - Topics 1. Threat management strategy for O365 2. Exchange Online Protection 3. Advanced Threat Protection 4. O365 Trust Center & Service Trust Portal Chapter 3: Device Level Security Chapter Goal: Understanding Pre-breach & Post breach protection for Windows devices No of pages: 60-80 Sub - Topics: 1. Pre-breach options in windows such as windows defender, credential guard, device guard etc. 2. Secure Boot, Device Health Attestation 3. Windows 10 Exploit Guard 4. Post breach solution – WDATP in Endpoint Detection & Response Chapter 4: Enterprise Level Protection Chapter Goal: Explain how ATA aids in Enterprise Level Protection No of pages: 60-80 pages Sub - Topics: 1. Advanced Threat Analytics 2. Azure Advanced Threat Protection 3. Azure Security Center 3. Operation Management Suite with ASC 4. Network, Storage Protection on Azure 5. Identity Protection on Azure Chapter 5: Information Protection Chapter Goal: Explain various types of information protection possible with Microsoft Products No of pages: 60-80 pages Sub - Topics: 1. Azure Information Protection 2. Windows Information Protection 3. Microsoft Cloud App Security. … (more)
- Publisher Details:
- Berkeley, CA : Apress
- Publication Date:
- 2019
- Extent:
- 1 online resource (244 pages)
- Subjects:
- 005.8
Computer security
Computer security
Security systems
Electronic books - Languages:
- English
- ISBNs:
- 9781484248539
1484248538 - Related ISBNs:
- 148424852X
9781484248522 - Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.453975
- Ingest File:
- 02_590.xml