Practical PowerShell Security and Compliance Center. (2020)
- Record Type:
- Book
- Title:
- Practical PowerShell Security and Compliance Center. (2020)
- Main Title:
- Practical PowerShell Security and Compliance Center
- Other Titles:
- Security and Compliance Center
- Further Information:
- Note: Damian Scoles.
- Authors:
- Scoles, Damian
- Contents:
- Intro -- Preface -- Chapter Layout and Conventions -- Chapter Layout -- Conventions -- Author's Notes and Findings -- Introduction -- The Security and Compliance Center (SCC) and PowerShell -- Why PowerShell and Not the Security and Compliance Center -- Security and Compliance Center PowerShell -- Command Structure -- Cmdlet Examples -- Piping -- Protecting Yourself and What If -- Command Discovery Techniques -- PowerShell Modules -- Getting Help!?! -- Cloud-Only vs Synced Environments -- Non-Synced Accounts (Cloud-Only) -- Synced Accounts -- PowerShell Basics Security and Compliance Center PowerShell: Where to Begin -- Variables -- Arrays -- Hash Tables -- CSV Files -- Operators -- Loops -- Foreach-Object -- Do { } While () -- Export-CSV -- How to Use these Cmdlets -- Functions -- PowerShell Tools -- PowerShell ISE -- PowerShell Repositories -- Alternatives to ISE -- ISE Plug-ins and More -- PSharp Plug-in for PowerShell -- Beyond the Basics -- Formatting -- Capitalization -- Commenting -- Mind Your Brackets! -- Command Output -- Cmdlet Output Formatting -- Filtering -- Splitting -- Scripting in Color -- Color Coding Examples -- Miscellaneous Quotes -- Code Signing -- Connecting With PowerShell -- Introduction -- Connecting to the Security and Compliance Center -- Security and Compliance Center PowerShell Cmdlets -- Multi-Factor Authentication (MFA) -- Closing and Removing Connections -- Revealing PowerShell Sessions -- Identity Management -- Introduction -- DirectoryIntro -- Preface -- Chapter Layout and Conventions -- Chapter Layout -- Conventions -- Author's Notes and Findings -- Introduction -- The Security and Compliance Center (SCC) and PowerShell -- Why PowerShell and Not the Security and Compliance Center -- Security and Compliance Center PowerShell -- Command Structure -- Cmdlet Examples -- Piping -- Protecting Yourself and What If -- Command Discovery Techniques -- PowerShell Modules -- Getting Help!?! -- Cloud-Only vs Synced Environments -- Non-Synced Accounts (Cloud-Only) -- Synced Accounts -- PowerShell Basics Security and Compliance Center PowerShell: Where to Begin -- Variables -- Arrays -- Hash Tables -- CSV Files -- Operators -- Loops -- Foreach-Object -- Do { } While () -- Export-CSV -- How to Use these Cmdlets -- Functions -- PowerShell Tools -- PowerShell ISE -- PowerShell Repositories -- Alternatives to ISE -- ISE Plug-ins and More -- PSharp Plug-in for PowerShell -- Beyond the Basics -- Formatting -- Capitalization -- Commenting -- Mind Your Brackets! -- Command Output -- Cmdlet Output Formatting -- Filtering -- Splitting -- Scripting in Color -- Color Coding Examples -- Miscellaneous Quotes -- Code Signing -- Connecting With PowerShell -- Introduction -- Connecting to the Security and Compliance Center -- Security and Compliance Center PowerShell Cmdlets -- Multi-Factor Authentication (MFA) -- Closing and Removing Connections -- Revealing PowerShell Sessions -- Identity Management -- Introduction -- Directory Synchronization (DirSync) -- History -- Preparing Your AD -- IdFix -- Option 1 -- Express Installation -- Option 2 -- Customize -- PowerShell and Directory Synchronization -- What Needs to be Performed Where? -- Active Directory -- Azure Active Directory Connect Azure AD Connect -- Connectors -- Licensing -- Azure AD Recycle Bin -- Security -- Layered Security -- Role Groups -- PowerShell -- Management Roles per Role Groups -- Assigning Role Group Membership -- Mail Flow Administrator Role -- Reviewer Role -- Records Management -- Security Administrator -- Organization Management -- Supervisory Review -- Compliance Administrator -- Security Reader -- eDiscovery Manager/Administrator -- Service Assurance User -- Security Operator -- Data Investigator -- Global Reader -- Insider Risk Roles -- IRM Contributors Content Explorer List Viewer and Content Explorer Content Viewer -- Removing User(s) From Role Groups -- Management Roles -- Audit in Security and Compliance Center -- Searching the Admin Audit Log -- Data Loss Prevention -- Introduction -- Sensitive Information Types -- Custom Sensitive Information Types -- Fingerprints -- Keyword Dictionaries -- Exact Data Match (EDM) -- Requirements -- PowerShell -- DLP Compliance -- Other DLP Cmdlets -- Compliance -- Introduction -- Compliance Cases -- Compliance Searches -- What is a Compliance Search? -- PowerShell -- Set-ComplianceSearch … (more)
- Publisher Details:
- Birmingham : Packt Publishing
- Publication Date:
- 2020
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.133
Windows PowerShell (Computer program language)
Systems programming (Computer science)
Computer security
Computer security
Systems programming (Computer science)
Windows PowerShell (Computer program language)
COMPUTERS -- General
COMPUTERS -- Bioinformatics
COMPUTERS -- Buyer's Guides
Electronic books - Languages:
- English
- ISBNs:
- 9781800562769
1800562764 - Related ISBNs:
- 9781734088908
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.554352
- Ingest File:
- 04_031.xml