Introduction |
|
xi | |
Organization of this book |
|
xii | |
Preparing for the exam |
|
xii | |
Microsoft certifications |
|
xii | |
Quick access to online references |
|
xiii | |
Errata, updates & book support |
|
xiii | |
Stay in touch |
|
xiii | |
|
Chapter 1 Manage identity and access |
|
|
1 | (90) |
|
Skill 1.1 Manage Azure Active Directory identities |
|
|
1 | (1) |
|
Create and manage a managed identity for Azure resources |
|
|
2 | (4) |
|
|
6 | (6) |
|
|
12 | (2) |
|
Manage external identities by using Azure AD |
|
|
14 | (7) |
|
Manage administrative units |
|
|
21 | (2) |
|
Skill 1.2 Manage secure access by using Azure AD |
|
|
23 | (1) |
|
Configure Azure AD Privileged Identity Management (PIM) |
|
|
23 | (3) |
|
Implement conditional access policies, including multifactor authentication |
|
|
26 | (14) |
|
Implement Azure AD Identity Protection |
|
|
40 | (3) |
|
Implement passwordless authentication |
|
|
43 | (2) |
|
|
45 | (4) |
|
Skill 1.3 Manage application access |
|
|
49 | (1) |
|
Integrate single sign-on (SSO) and identity providers for authentication |
|
|
50 | (18) |
|
Create an app registration |
|
|
68 | (5) |
|
Configure app registration permission scopes |
|
|
73 | (1) |
|
Manage app registration permission consent |
|
|
74 | (2) |
|
Manage API permissions to Azure subscriptions and resources |
|
|
76 | (1) |
|
Configure an authentication method for a service principal |
|
|
76 | (1) |
|
Skill 1.4 Manage access control |
|
|
77 | (1) |
|
Configure Azure role permissions for management groups, subscriptions, resource groups, and resources |
|
|
77 | (4) |
|
Interpret role and resource permissions |
|
|
81 | (2) |
|
Assign built-in Azure AD roles |
|
|
83 | (3) |
|
Create and assign custom roles, including Azure roles and Azure AD roles |
|
|
86 | (3) |
|
|
89 | (1) |
|
Identity and access at Tailwind Traders |
|
|
89 | (1) |
|
Thought experiment answers |
|
|
90 | (1) |
|
|
90 | (1) |
|
Chapter 2 Implement platform protection |
|
|
91 | (90) |
|
Skill 2.1 Implement advanced network security |
|
|
91 | (1) |
|
Overview of Azure network components |
|
|
91 | (15) |
|
Secure the connectivity of hybrid networks |
|
|
106 | (5) |
|
Secure connectivity of virtual networks |
|
|
111 | (9) |
|
Create and configure Azure Firewall |
|
|
120 | (9) |
|
Create and configure Azure Firewall Manager |
|
|
129 | (2) |
|
Create and configure Azure Front Door |
|
|
131 | (8) |
|
Create and configure Web Application Firewall (WAF) |
|
|
139 | (1) |
|
Configure resource firewall |
|
|
140 | (7) |
|
Implement Azure service endpoints |
|
|
147 | (3) |
|
Azure private endpoints and Private Links |
|
|
150 | (1) |
|
Implement Azure DDoS protection |
|
|
151 | (4) |
|
Skill 2.2 Configure advanced security for compute |
|
|
155 | (1) |
|
Configure Azure endpoint protection for virtual machines (VMs) |
|
|
155 | (5) |
|
Implement and manage security updates for VMs |
|
|
160 | (3) |
|
Configure security for containers services |
|
|
163 | (1) |
|
Manage access to Azure Container Registry |
|
|
164 | (2) |
|
Configure security for serverless compute |
|
|
166 | (3) |
|
Configure security for Azure App Service |
|
|
169 | (5) |
|
Configure encryption at rest |
|
|
174 | (1) |
|
Configure encryption in transit |
|
|
175 | (2) |
|
|
177 | (1) |
|
Advanced security for compute at Tailwind Traders |
|
|
177 | (1) |
|
Thought experiment answers |
|
|
178 | (1) |
|
|
178 | (3) |
|
Chapter 3 Manage security operations |
|
|
181 | (52) |
|
Skill 3.1 Configure centralized policy management |
|
|
181 | (1) |
|
Configure a custom security policy |
|
|
181 | (1) |
|
Create a policy initiative |
|
|
182 | (3) |
|
Configure security settings and auditing by using Azure Policy |
|
|
185 | (5) |
|
Skill 3.2 Configure and manage threat protection |
|
|
190 | (1) |
|
Microsoft Defender for servers |
|
|
190 | (5) |
|
Evaluate vulnerability scan from Microsoft Defender for servers |
|
|
195 | (5) |
|
Configure Microsoft Defender for SQL |
|
|
200 | (1) |
|
Skill 3.3 Configure and manage security monitoring solutions |
|
|
201 | (1) |
|
Introduction to Azure Monitor |
|
|
201 | (4) |
|
Create and customize alert rules in Azure Monitor |
|
|
205 | (6) |
|
Configure diagnostic logging and log retention by using Azure Monitor |
|
|
211 | (4) |
|
Introduction to Microsoft Sentinel's architecture |
|
|
215 | (6) |
|
Create and customize alerts |
|
|
221 | (7) |
|
Evaluate alerts and incidents in Microsoft Sentinel |
|
|
228 | (3) |
|
|
231 | (1) |
|
Monitoring Security at Tailwind Traders |
|
|
231 | (1) |
|
Thought experiment answers |
|
|
232 | (1) |
|
|
232 | (1) |
|
Chapter 4 Secure data and applications |
|
|
233 | (70) |
|
Skill 4.1 Configure security for storage |
|
|
233 | (1) |
|
Configure access control for storage accounts |
|
|
234 | (9) |
|
Configure storage account access keys |
|
|
243 | (4) |
|
Configure Azure AD authentication for Azure Storage and Azure Files |
|
|
247 | (6) |
|
Configure delegated access |
|
|
253 | (5) |
|
Skill 4.2 Configure security for databases |
|
|
258 | (1) |
|
Enable database authentication by using Azure AD |
|
|
258 | (1) |
|
|
259 | (3) |
|
Configure dynamic masking on SQL workloads |
|
|
262 | (2) |
|
Implement database encryption for Azure SQL Database |
|
|
264 | (5) |
|
Implement network isolation for data solutions, including |
|
|
|
Azure Synapse Analytics and Azure Cosmos DB |
|
|
269 | (2) |
|
Configure Microsoft Defender for SQL |
|
|
271 | (3) |
|
Skill 4.3 Configure and manage Key Vault |
|
|
274 | (1) |
|
Create and configure Key Vault |
|
|
274 | (1) |
|
Configure access to Key Vault |
|
|
275 | (6) |
|
Manage certificates, secrets, and keys |
|
|
281 | (13) |
|
|
294 | (2) |
|
Configure backup and recovery of certificates, secrets, and keys |
|
|
296 | (3) |
|
|
299 | (1) |
|
Securing data at Tailwind Traders |
|
|
300 | (1) |
|
Thought experiment answers |
|
|
300 | (1) |
|
|
300 | (3) |
Index |
|
303 | |