Bezpieczeństwo systemów

289
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Identity and Access Administrator SC-300 Exam Guide. Pass the SC-300 exam with confidence by using exam-focused resources - Second Edition

Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...

SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation.You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks.By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.

290
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Identity Manager 2016 Handbook. A complete handbook on Microsoft Identity Manager 2016 – from design considerations to operational best practices

David Steadman, Jeff Ingalls

Microsoft Identity Manager 2016 is Microsoft’s solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement. The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.

291
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

Shabaz Darr, Viktor Hedberg, Simon Binder

Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance.Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam.By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.

292
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Dwayne Natwick, Sonia Cuff

Cloud technologies have made building a defense-in-depth security strategy of paramount importance. Without proper planning and discipline in deploying the security posture across Microsoft 365 and Azure, you are compromising your infrastructure and data. Microsoft Security, Compliance, and Identity Fundamentals is a comprehensive guide that covers all of the exam objectives for the SC-900 exam while walking you through the core security services available for Microsoft 365 and Azure.This book starts by simplifying the concepts of security, compliance, and identity before helping you get to grips with Azure Active Directory, covering the capabilities of Microsoft’s identity and access management (IAM) solutions. You'll then advance to compliance center, information protection, and governance in Microsoft 365. You'll find out all you need to know about the services available within Azure and Microsoft 365 for building a defense-in-depth security posture, and finally become familiar with Microsoft's compliance monitoring capabilities.By the end of the book, you'll have gained the knowledge you need to take the SC-900 certification exam and implement solutions in real-life scenarios.

293
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Security Copilot. Master strategies for AI-driven cyber defense

Bi Yue Xu, Rod Trent

Be at the forefront of cybersecurity innovation with Microsoft Security Copilot, where advanced AI tackles the intricate challenges of digital defense. This book unveils Security Copilot’s powerful features, from AI-powered analytics revolutionizing security operations to comprehensive orchestration tools streamlining incident response and threat management. Through real-world case studies and frontline stories, you’ll learn how to truly harness AI advancements and unlock the full potential of Security Copilot within the expansive Microsoft ecosystem.Designed for security professionals navigating increasingly sophisticated cyber threats, this book equips you with the skills to accelerate threat detection and investigation, refine your security processes, and optimize cyber defense strategies.By the end of this book, you’ll have become a Security Copilot ninja, confidently crafting effective prompts, designing promptbooks, creating custom plugins, and integrating logic apps for enhanced automation.

294
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

Trevor Stuart, Joe Anich

Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.

295
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition

Richard Diver, Gary Bushey, John Perkins

Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you integrate cloud security and artificial intelligence (AI). This book will teach you how to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic.The first part of this book will introduce you to Microsoft Sentinel and Log Analytics, then move on to understanding data collection and management, as well as how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. The next part will focus on useful features, such as entity behavior analytics and Microsoft Sentinel playbooks, along with exploring the new bi-directional connector for ServiceNow. In the next part, you’ll be learning how to develop solutions that automate responses needed to handle security incidents and find out more about the latest developments in security, techniques to enhance your cloud security architecture, and explore how you can contribute to the security community.By the end of this book, you’ll have learned how to implement Microsoft Sentinel to fit your needs and protect your environment from cyber threats and other security issues.

296
Завантаження...
EЛЕКТРОННА КНИГА

Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security

Światowiak Jacek

Zapewnij bezpieczeństwo Twoim systemom informatycznym! Jak w pełni wykorzystać serwer ISA 2006? Jak zautomatyzować proces aktualizacji, korzystając z WSUS? Czym jest infrastruktura klucza publicznego, jak ją zaprojektować i wdrożyć? Jak chronić specjalizowane serwery i stacje robocze przed szkodliwym oprogramowaniem oraz spamem? Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne przechowywanie oraz przesyłanie danych, ochronę przed szkodliwym oprogramowaniem i niechcianą pocztą. Teraz możesz dowiedzieć się, jak w praktyce wykorzystać te możliwości! W trakcie lektury zapoznasz się z architekturą systemu Forefront Security Suite oraz jego zaletami. Zdobędziesz wiedzę na temat infrastruktury klucza publicznego, usługi WSUS (skrót od ang. Windows System Update Service) oraz metod wdrażania jednostki certyfikacyjnej. Ponadto dowiesz się, jak zagwarantować najwyższy poziom wiarygodności w systemach z rodziny Windows Server 2003/2008 oraz wykorzystać wszystkie programy i narzędzia pakietu. Dodatkowo zgłębisz tajniki zabezpieczania stacji roboczych z użyciem Forefront Client Security. Książka ta adresowana jest do administratorów serwerów, administratorów sieci, specjalistów od zabezpieczeń oraz pasjonatów zagadnień związanych z bezpieczeństwem systemów informatycznych. Architektura Microsoft Forefront Automatyczna aktualizacja systemów oraz oprogramowania Wdrażanie infrastruktury klucza publicznego Wykorzystanie kreatora konfiguracji zabezpieczeń Instalacja i praca z ISA Server 2006 w wersji Standard oraz Enterprise Dostęp VPN z wykorzystaniem serwera ISA 2006 Ochrona antyspamowa w Exchange 2003 oraz 2007 Zabezpieczanie serwerów Exchange - Forefront Server Security for Exchange Ochrona serwerów SharePoint - Forefront Server Security for SharePoint Zabezpieczanie środowiska OCS 2007 - Forefront Server Security for Office Communications Server 2007 Zarządzanie bezpieczeństwem serwerów z wykorzystaniem Forefront Server Security Management Console Przyszłość technologii - Forefront Threat Management Gateway oraz technologia Stirling Kompletne źródło informacji na temat bezpieczeństwa w systemach Windows Server 2003/2008!