Introduction |
|
xv | |
Organization of this book |
|
xv | |
Preparing for the exam |
|
xv | |
Microsoft certification |
|
xvi | |
Errata, updates & book support |
|
xvi | |
Stay in touch |
|
xvii | |
|
Chapter 1 Describe the concepts of security, compliance, and identity |
|
|
1 | (24) |
|
Skill 1-1 Security and compliance concepts and methodologies |
|
|
1 | (11) |
|
|
1 | (4) |
|
Shared responsibility model |
|
|
5 | (2) |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
Skill 1-2 Identity concepts |
|
|
12 | (13) |
|
Identity as the primary security perimeter |
|
|
13 | (1) |
|
|
13 | (2) |
|
|
15 | (2) |
|
What is Active Directory? |
|
|
17 | (1) |
|
What are federation services and identity providers? |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
21 | (1) |
|
Thought experiment answers |
|
|
22 | (1) |
|
|
22 | (3) |
|
Chapter 2 Microsoft Identity and Access Management Solutions |
|
|
25 | (118) |
|
Skill 2-1 Define the basic identity services and identity types of Azure AD |
|
|
25 | (16) |
|
Describe what Azure Active Directory is |
|
|
25 | (3) |
|
Describe what hybrid identity is |
|
|
28 | (5) |
|
Describe Azure AD identities (users, devices, groups, and service principals/applications) |
|
|
33 | (6) |
|
Describe the different external identity types (guest users) |
|
|
39 | (2) |
|
Skill 2-2 Describe the authentication capabilities of Azure AD |
|
|
41 | (13) |
|
Describe the different authentication methods |
|
|
41 | (1) |
|
Describe password protection and management capabilities |
|
|
42 | (2) |
|
Describe self-service password reset |
|
|
44 | (4) |
|
Describe multifactor authentication |
|
|
48 | (2) |
|
Describe Windows Hello for Business and passwordless credentials |
|
|
50 | (4) |
|
Skill 2-3 Describe the access management capabilities of Azure AD |
|
|
54 | (9) |
|
Describe what conditional access is |
|
|
54 | (1) |
|
Describe uses and benefits of conditional access |
|
|
55 | (3) |
|
Describe the benefits of Azure AD roles |
|
|
58 | (5) |
|
Skill 2-4 Describe the identity protection and governance capabilities of Azure AD |
|
|
63 | (10) |
|
Describe what identity governance is |
|
|
63 | (1) |
|
Describe what entitlement management and access reviews are |
|
|
64 | (3) |
|
Describe the capabilities of PIM |
|
|
67 | (1) |
|
Describe Azure AD Identity Protection |
|
|
68 | (2) |
|
|
70 | (1) |
|
Thought experiment answers |
|
|
71 | (1) |
|
|
71 | (2) |
|
Chapter 3 Capabilities of Microsoft security solutions |
|
|
73 | (1) |
|
Skill 3-1 Basic security capabilities in Azure |
|
|
73 | (11) |
|
Azure network security groups |
|
|
74 | (3) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (2) |
|
|
83 | (1) |
|
Skill 3-2 Security Management capabilities in Azure |
|
|
84 | (10) |
|
|
85 | (2) |
|
|
87 | (1) |
|
Cloud workload protection with Azure Defender |
|
|
88 | (3) |
|
Cloud security posture management capabilities |
|
|
91 | (2) |
|
Security baselines for Azure |
|
|
93 | (1) |
|
Skill 3-3 Security capabilities in Azure Sentinel |
|
|
94 | (271) |
|
What is Security Information and Event Management (SIEM)? |
|
|
95 | (3) |
|
What is security orchestration, automation, and response (SOAR)? |
|
|
98 | (1) |
|
What is extended detection and response (XDR)? |
|
|
99 | (1) |
|
|
99 | (266) |
|
Skill 3-4 Threat protection with Microsoft |
|
|
365 | |
|
|
115 | (250) |
|
|
365 | |
|
|
115 | (1) |
|
Describe Microsoft Defender for Identity |
|
|
116 | (1) |
|
Describe Microsoft Defender for Office 365 |
|
|
117 | (2) |
|
Describe Microsoft Defender for Endpoint |
|
|
119 | (4) |
|
Describe Microsoft Cloud App Security |
|
|
123 | (1) |
|
Skill 3-5 Security management capabilities of Microsoft 365 |
|
|
124 | (10) |
|
|
365 | |
|
|
125 | (1) |
|
Describe how to use Microsoft Secure Score |
|
|
126 | (2) |
|
Explore security reports and dashboards |
|
|
128 | (1) |
|
Describe incidents and incident management capabilities |
|
|
129 | (5) |
|
Skill 3-6 Endpoint security with Microsoft Intune |
|
|
134 | (9) |
|
|
134 | (2) |
|
Endpoint security with Intune and Microsoft Endpoint Manager admin center |
|
|
136 | (2) |
|
|
138 | (1) |
|
Thought experiment answers |
|
|
139 | (1) |
|
|
140 | (3) |
|
Chapter 4 Describe the capabilities of Microsoft compliance solutions |
|
|
143 | (41) |
|
Skill 4-1 Common compliance needs |
|
|
143 | (10) |
|
Microsoft Compliance Center |
|
|
144 | (4) |
|
Microsoft Compliance Manager |
|
|
148 | (3) |
|
|
151 | (2) |
|
Skill 4-2 Information protection and governance |
|
|
153 | (9) |
|
Data classification capabilities |
|
|
153 | (2) |
|
Content Explorer and Activity Explorer |
|
|
155 | (1) |
|
|
156 | (2) |
|
Retention policies and labels |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (2) |
|
|
162 | (6) |
|
|
163 | (1) |
|
|
164 | (2) |
|
|
166 | (1) |
|
Privileged access management |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (6) |
|
|
365 | |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (3) |
|
Advanced eDiscovery workflow |
|
|
173 | (1) |
|
|
174 | (3) |
|
Microsoft 365 audit capabilities |
|
|
174 | (2) |
|
|
176 | (1) |
|
Skill 4-6 Resource governance |
|
|
177 | (7) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (3) |
|
|
183 | (1) |
|
Thought experiment answers |
|
|
184 | (1) |
Chapter summary |
|
184 | (3) |
Index |
|
187 | |