Publisher: Packt Publishing
Kent Nordstrom, Kent Nordstr?É?íÂ!?m
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems.The Microsoft Forefront Identity Manager 2010 R2 Handbook is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting.Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for strong administrative accounts within Active Directory. You will learn to implement all the features of FIM 2010 R2. You will see how to install a complete FIM 2010 R2 infrastructure including both test and production environment. You will be introduced to Self-Service management of both users and groups. FIM Reports to audit the identity management lifecycle are also discussed in detail.With the Microsoft Forefront Identity Manager 2010 R2 Handbook you will be able implement and manage FIM 2010 R2 almost effortlessly.
Erez Ben-Ari, Ran Dolev, Erez Y Ben
Microsoft Forefront Unified Access Gateway (UAG) is the latest in a line of Application Publishing (Reverse Proxy) and Remote Access (VPN) Server products. The broad set of features and technologies integrated into UAG makes for a steep learning curve. Understanding all the features and abilities of UAG is a complex task that can be daunting even to experienced networking and security engineers. This book is the first to be dedicated solely to Microsoft Forefront UAG. It guides you step-by-step throughout all the stages of deployment, from design to troubleshooting. Written by the absolute experts who have taken part of the product’s development, official training and support, this book covers all the primary features of UAG in a friendly style and a manner that is easy to follow. It takes you from the initial planning and design stage, through deployment and configuration, up to maintenance and troubleshooting. The book starts by introducing UAG's features and and abilities, and how your organization can benefit from them. It then goes on to guide you through planning and designing the integration of the product into your own unique environment. Further, the book guides you through the process of publishing the various applications, servers and resources - from simple web applications to complex client/server based applications. It also details the various VPN technologies that UAG provides and how to take full advantage of them. The later chapters of the book educate you with common routine “upkeep” tasks like monitoring, backup and troubleshooting of common issues. Finally, the book includes an introduction to ASP, which some of the product's features are based on, and can help the advanced administrator with enhancing and customizing the product.
Microsoft HoloLens By Example. Create immersive Augmented Reality experiences
Joshua Newnham
Are you a developer who is fascinated with Microsoft HoloLens and its capabilities? Do you want to learn the intricacies of working with the HoloLens SDK and create your own apps? If so, this is the book for you.This book introduces and demystifies the HoloLens platform and introduces new ways you can interact with computers (Mixed Reality). It will teach you the important concepts, get you excited about the possibilities, and give you the tools to continue exploring and experimenting. You will go through the journey of creating four independent examples throughout the book, two using DirectX and two using Unity. You will learn to implement spatial mapping and gesture control, incorporate spatial sound, and work with different types of input and gaze. You will also learn to use the Unity 5 SDK for HoloLens and create apps with it. Collectively, the apps explore the major concepts of HoloLens, but each app is independent, giving you the flexibility to choose where to start (and end).
Microsoft HoloLens Developer's Guide. A Complete Guide to HoloLens Application Development
Dennis Vroegop
HoloLens, Microsoft’s innovative augmented reality headset, overlaps holograms into a user’s vision of their environment. Your ideas are closer to becoming real when you can create and work with holograms in relation to the world around you. If you are dreaming beyond virtual worlds, beyond screens, beyond pixels, and want to take a big leap in the world of augmented reality, then this is the book you want. Starting off with brainstorming and the design process, you will take your first steps in creating your application for HoloLens. You will learn to add gestures and write an app that responds to verbal commands before gradually moving on creating sounds in the app and placing them in a 3D space. You will then communicate between devices in the boundaries of the UWP model.
Dwayne Natwick, Shannon Kuehn
Cloud technologies have made identity and access the new control plane for securing data. Without proper planning and discipline in deploying, monitoring, and managing identity and access for users, administrators, and guests, you may be compromising your infrastructure and data. This book is a preparation guide that covers all the objectives of the SC-300 exam, while teaching you about the identity and access services that are available from Microsoft and preparing you for real-world challenges.The book starts with an overview of the SC-300 exam and helps you understand identity and access management. As you progress to the implementation of IAM solutions, you’ll learn to deploy secure identity and access within Microsoft 365 and Azure Active Directory. The book will take you from legacy on-premises identity solutions to modern and password-less authentication solutions that provide high-level security for identity and access. You’ll focus on implementing access and authentication for cloud-only and hybrid infrastructures as well as understand how to protect them using the principles of zero trust. The book also features mock tests toward the end to help you prepare effectively for the exam.By the end of this book, you’ll have learned how to plan, deploy, and manage identity and access solutions for Microsoft and hybrid infrastructures.
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation.You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks.By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
David Steadman, Jeff Ingalls
Microsoft Identity Manager 2016 is Microsoft’s solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement. The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.
Microsoft IIS 10.0 Cookbook. Task-oriented recipes to manage your web server with ease
Ashraf Khan
This book will start with customizing your IIS 10 to various platforms/OS and tune it according to your business requirements. Moving on, we will focus on the functionalities of core fundamentals and perform practical scenarios in order to maximize the use of a reliable web server. Going further we will be covering topics like IIS 10 architecture, IIS modules,hosting web server platforms, virtual directories along with web site deployment, ports, enhanced security. We will also cover new features of IIS 10 like integration with Windows Server 2016 and Nano Server, HTTP/2, PowerShell 5 cmdlets etc . Towards the end, we will cover troubleshooting & diagnostic techniques of IIS 10.By the end of this book you will be well versed with maximizing the reliability of your webserver and will have immense knowledge in using IIS 10 effectively
Shabaz Darr, Viktor Hedberg, Simon Binder
Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance.Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam.By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.
Andrew Taylor
Microsoft Intune is a powerful cloud-managed mobile device management (MDM) tool that empowers you to manage your end-user device estate across various platforms. While it is an excellent platform, the initial setup and configuration can be a daunting process, and mistakes made early on can be more challenging to resolve later. This book addresses these issues by guiding you through the end-to-end configuration of an Intune environment, incorporating best practices and utilizing the latest functionalities.In addition to setting up your environment, you’ll delve into the Microsoft Graph platform to understand the underlying mechanisms behind the web GUI. This knowledge will enable you to automate a significant portion of your daily tasks using PowerShell.By the end of this book, you’ll have established an Intune environment that supports Windows, Apple iOS, Apple macOS, and Android devices. You’ll possess the expertise to add new configurations, policies, and applications, tailoring an environment to your specific requirements. Additionally, you’ll have the ability to troubleshoot any issues that may arise and package and deploy your company applications. Overall, this book is an excellent resource for anyone who wants to learn how to use Microsoft Intune to manage their organization's end-user devices.
Andrew Taylor, Lior Bela, Lavanya Lakshman
Microsoft Intune Cookbook, Second Edition is a hands-on guide for IT administrators managing and supporting modern endpoints, built around the latest Intune capabilities and endpoint security enhancements. Written by Andrew Taylor, an experienced Intune practitioner and active community contributor, it focuses on everyday admin tasks and turns them into clear, repeatable recipes. You’ll start by preparing an Intune tenant and setting up key Entra ID foundations, then work through managing Windows, macOS, iOS, Android, and Linux using practical, proven workflows. Along the way, you’ll configure policies, enroll devices, deploy apps, and strengthen security with compliance, Defender integration, encryption, and conditional access. You’ll also go beyond the portal by using PowerShell and Microsoft Graph to automate routine work, reduce manual effort, and make changes at scale. Monitoring and reporting are covered so you can track device health, security posture, and deployment outcomes with confidence.Advanced scenarios include secure remote support, privilege elevation, cloud-based certificate management, real-time queries, and AI-assisted guidance to speed up troubleshooting and decision-making. By the end, you’ll have practical techniques you can apply immediately to run a modern, cloud-first Intune environment.
Jose Luis Latorre, Jose Luis Latorre Millas
With about ten years since its first release, Microsoft's .NET Framework 4.5 is one of the most solid development technologies to create casual, business, or enterprise applications. It has evolved into a very stable framework and solid framework for developing applications, with a solid core, called the CLR (Common Language Runtime) Microsoft .NET Framework 4.5 includes massive changes and enables modern application and UI development.Microsoft .Net Framework 4.5 Quickstart Cookbook aims to give you a run through the most exciting features of the latest version. You will experience all the flavors of .NET 4.5 hands on. The “How-to” recipes mix the right ingredients for a final taste of the most appetizing features and characteristics. The book is written in a way that enables you to dip in and out of the chapters.The book is full of practical code examples that are designed to clearly exemplify the different features and their applications in real-world development. All the chapters and recipes are progressive and based on the fresh features on .NET Framework 4.5.The book will begin by teaching you to build a modern UI application and improve it to make it Windows 8 Modern UI apps lifecycle model-compliant. You will create a portable library and throttle data source updating delays. Towards the end of the book, you will create you first Web API.
David Greve, Loryan Strant, David Greve, Ian...
Organizations are migrating to the cloud to save money, become more efficient, and empower their users with the latest technology. Office 365 delivers all of this in a reliable, fast, and ever-expanding way, keeping you ahead of the competition. As the IT administrator of your network, you need to make the transition as painless as possible for your users. Learn everything you need to know and exactly what to do to ensure your Office 365 Exchange online migration is a success!This guide gives you everything you need to develop a successful migration plan to move from Exchange, Google, POP3, and IMAP systems to Office 365 with ease. We start by providing an overview of the Office 365 plans available and how to make a decision on what plan fits your organization. We then dive into topics such as the Office 365 Admin Portal, integration options for professionals and small businesses, integration options for enterprises, preparing for a simple migration, performing a simple migration, and preparing for a hybrid deployment. Later in the book, we look at migration options for Skype for Business and SharePoint to further help you leverage the latest collaborative working technologies within your organization.