Skip to main content

2019 | Buch

Beginning Security with Microsoft Technologies

Protecting Office 365, Devices, and Data

insite
SUCHEN

Über dieses Buch

Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more.

Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you’ll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you’ll see that there are a variety of ways in which you can protect your information.

After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions.

What You Will Learn

Keep corporate data and user identities safe and secure

Identify various levels and stages of attacks

Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location

Use advanced threat analytics, Azure Security Center, and Azure ATP

Who This Book Is For

Administrators who want to build secure infrastructure at multiple levels such as email security, device security, cloud infrastructure security, and more.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Current State of Security
Abstract
In today’s world, it would be hard to find an organization that hasn’t been in the radius of a hacker or a user account that was never in the range of an attack. We have all seen reports of high-profile attacks and substantial financial losses for companies that were attacked. Bots have taken significant control of Internet since their advent. These tireless bits of code can sift through the trillions of available Internet addresses, mark targets and execute penetration attempts and remote codes and exploits, and compromise systems and add them to the bot fleets used to launch major denial-of-service attacks on high-profile targets.
Vasantha Lakshmi
Chapter 2. Securing Emails and Office 365
Abstract
The most common form attack usually starts with an e-mail. Receiving an e-mail with abusive attachments and URLs can be part of the first round of reconnaissance or be precise preexploitation reconnaissance, which, if successful, will continue to execute backdoors and make way for the attacker to enter the corporate device and network until reaching domain dominance. Our goal is to ensure that we have security products in place to help mitigate threats coming any organization’s way.
Vasantha Lakshmi
Chapter 3. Device-Level Security
Abstract
In the life cycle of an attack, there are different stages an attacker goes through. We have already discussed in detail the first stage of an attack in our review of e-mail security in Chapter 2. If an attacker manages to get into a user’s system as a result of things like human error or a successful social engineering attempt, we need to have the device’s defenses up and running to stop the intruder from getting further into the network.
Vasantha Lakshmi
Chapter 4. Identity Protection
Abstract
When attackers have managed to compromise a device through a phishing e-mail and user interaction or any other attack vector, they will then start to look for a privileged account. If they manage to elevate their user privileges, they will be at liberty to traverse an organization’s network and further execute remote scripts and compromise systems and servers. They will continue to laterally move until they finally reach the domain controllers and achieve domain dominance. Our goal here is to thwart these attacks by providing identity protection.
Vasantha Lakshmi
Chapter 5. Data Protection
Abstract
Collaboration and data sharing by employees are necessities in today’s world, as they increase productivity among users. With these tools, data protection in the mobile-first, cloud-first world is a little more challenging and requires a slight shift in mindset. No longer is the data just stored on the premises; the data can be on both corporate and BYOD devices such as desktops, laptops, Androids, and iOS mobiles. The data can also be stored in SharePoint, Exchange and other Office 365 apps, third-party SaaS-based apps, and thumb drives, and can be sent to multiple organizations’ email addresses.
Vasantha Lakshmi
Backmatter
Metadaten
Titel
Beginning Security with Microsoft Technologies
verfasst von
Vasantha Lakshmi
Copyright-Jahr
2019
Verlag
Apress
Electronic ISBN
978-1-4842-4853-9
Print ISBN
978-1-4842-4852-2
DOI
https://doi.org/10.1007/978-1-4842-4853-9

Premium Partner