Publisher: 16
Dwayne Natwick, Shannon Kuehn
Cloud technologies have made identity and access the new control plane for securing data. Without proper planning and discipline in deploying, monitoring, and managing identity and access for users, administrators, and guests, you may be compromising your infrastructure and data. This book is a preparation guide that covers all the objectives of the SC-300 exam, while teaching you about the identity and access services that are available from Microsoft and preparing you for real-world challenges.The book starts with an overview of the SC-300 exam and helps you understand identity and access management. As you progress to the implementation of IAM solutions, you’ll learn to deploy secure identity and access within Microsoft 365 and Azure Active Directory. The book will take you from legacy on-premises identity solutions to modern and password-less authentication solutions that provide high-level security for identity and access. You’ll focus on implementing access and authentication for cloud-only and hybrid infrastructures as well as understand how to protect them using the principles of zero trust. The book also features mock tests toward the end to help you prepare effectively for the exam.By the end of this book, you’ll have learned how to plan, deploy, and manage identity and access solutions for Microsoft and hybrid infrastructures.
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation.You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks.By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
David Steadman, Jeff Ingalls
Microsoft Identity Manager 2016 is Microsoft’s solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement. The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.
Microsoft IIS 10.0 Cookbook. Task-oriented recipes to manage your web server with ease
Ashraf Khan
This book will start with customizing your IIS 10 to various platforms/OS and tune it according to your business requirements. Moving on, we will focus on the functionalities of core fundamentals and perform practical scenarios in order to maximize the use of a reliable web server. Going further we will be covering topics like IIS 10 architecture, IIS modules,hosting web server platforms, virtual directories along with web site deployment, ports, enhanced security. We will also cover new features of IIS 10 like integration with Windows Server 2016 and Nano Server, HTTP/2, PowerShell 5 cmdlets etc . Towards the end, we will cover troubleshooting & diagnostic techniques of IIS 10.By the end of this book you will be well versed with maximizing the reliability of your webserver and will have immense knowledge in using IIS 10 effectively
Shabaz Darr, Viktor Hedberg, Simon Binder
Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance.Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam.By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.
Microsoft Internet Information Services (IIS) 7.0 Resource Kit
Mike Volodarsky, Olga Londer, Brett Hill, Bernard...
Rozstrzygające źródło wiedzy o wdrażaniu i obsłudze usług IIS 7.0 wprost od ekspertów. Niniejsza książka to pogłębiony i wyczerpujący zasób informacji niezbędnych podczas planowania, wdrażania i zarządzania platformą serwera IIS 7.0. Czytelnik znajdzie tu wskazówki techniczne pochodzące od osób, które najlepiej znają tę technologię czołowych ekspertów i członków zespołu Microsoft IIS, a ponadto wiele skryptów i innych ważnych zasobów zamieszczonych na dysku CD. Dowiedz się, jak: Planować instalację i rozwiązywać związane z nią problemy Wdrożyć modularne serwery sieci Web Konfigurować funkcje usług IIS i ASP.NET przy użyciu konsoli IIS Manager i narzędzi wiersza polecenia Tworzyć i zarządzać witrynami, katalogami wirtualnymi, aplikacjami i pulami aplikacji Korzystać z konfiguracji opartych na języku XML Konfigurować delegowanie uprawnień i zdalne zarządzanie Stosować zabezpieczenia sprawdzone w praktyce Zarządzać rozszerzeniami serwera sieci Web Utrzymywać różne platformy aplikacji dynamicznych Stosować wbudowane narzędzia diagnostyczne i najważniejsze metody rozwiązywania problemów Dostrajać działanie i korzystać z rozwiązań równoważenia obciążeń Na dysku CD (Dla czytelników eBook'a obraz dysku CD towarzyszącego książce jest dostępny na stronie wydawcy - dokładny link podano we wstępie eBook'a): * przykładowe skrypty Windows PowerShell odsyłacze do narzędzi, informacji technicznych, szczegółowych poradników i innych materiałów; * fragmenty pokrewnych książek wydawnictwa Microsoft Press; * w pełni przeszukiwalna wersja książki w formacie eBook (w języku angielskim).
Andrew Taylor
Microsoft Intune is a powerful cloud-managed mobile device management (MDM) tool that empowers you to manage your end-user device estate across various platforms. While it is an excellent platform, the initial setup and configuration can be a daunting process, and mistakes made early on can be more challenging to resolve later. This book addresses these issues by guiding you through the end-to-end configuration of an Intune environment, incorporating best practices and utilizing the latest functionalities.In addition to setting up your environment, you’ll delve into the Microsoft Graph platform to understand the underlying mechanisms behind the web GUI. This knowledge will enable you to automate a significant portion of your daily tasks using PowerShell.By the end of this book, you’ll have established an Intune environment that supports Windows, Apple iOS, Apple macOS, and Android devices. You’ll possess the expertise to add new configurations, policies, and applications, tailoring an environment to your specific requirements. Additionally, you’ll have the ability to troubleshoot any issues that may arise and package and deploy your company applications. Overall, this book is an excellent resource for anyone who wants to learn how to use Microsoft Intune to manage their organization's end-user devices.
Andrew Taylor, Lior Bela, Lavanya Lakshman
Microsoft Intune Cookbook, Second Edition is a hands-on guide for IT administrators managing and supporting modern endpoints, built around the latest Intune capabilities and endpoint security enhancements. Written by Andrew Taylor, an experienced Intune practitioner and active community contributor, it focuses on everyday admin tasks and turns them into clear, repeatable recipes. You’ll start by preparing an Intune tenant and setting up key Entra ID foundations, then work through managing Windows, macOS, iOS, Android, and Linux using practical, proven workflows. Along the way, you’ll configure policies, enroll devices, deploy apps, and strengthen security with compliance, Defender integration, encryption, and conditional access. You’ll also go beyond the portal by using PowerShell and Microsoft Graph to automate routine work, reduce manual effort, and make changes at scale. Monitoring and reporting are covered so you can track device health, security posture, and deployment outcomes with confidence.Advanced scenarios include secure remote support, privilege elevation, cloud-based certificate management, real-time queries, and AI-assisted guidance to speed up troubleshooting and decision-making. By the end, you’ll have practical techniques you can apply immediately to run a modern, cloud-first Intune environment.