Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft 365 Security Administration: MS-500 Exam Guide

You're reading from   Microsoft 365 Security Administration: MS-500 Exam Guide Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Arrow left icon
Product type Paperback
Published in Jun 2020
Publisher Packt
ISBN-13 9781838983123
Length 672 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Peter Rising Peter Rising
Author Profile Icon Peter Rising
Peter Rising
Arrow right icon
View More author details
Toc

Table of Contents (29) Chapters Close

Preface 1. Section 1: Configuring and Administering Identity and Access in Microsoft 365
2. Chapter 1: Planning for Hybrid Identity FREE CHAPTER 3. Chapter 2: Authentication and Security 4. Chapter 3: Implementing Conditional Access Policies 5. Chapter 4: Role Assignment and Privileged Identities in Microsoft 365 6. Chapter 5: Azure AD Identity Protection 7. Section 2: Implementing and Managing Threat Protection
8. Chapter 6: Configuring an Advanced Threat Protection Solution 9. Chapter 7: Configuring Microsoft Defender ATP to Protect Devices 10. Chapter 8: Message Protection in Office 365 11. Chapter 9: Threat Intelligence and Tracking 12. Chapter 10: Using Azure Sentinel to Monitor Microsoft 365 Security 13. Section 3: Information Protection in Microsoft 365
14. Chapter 11: Controlling Secure Access to Information Stored in Office 365 15. Chapter 12: Azure Information Protection 16. Chapter 13: Data Loss Prevention 17. Chapter 14: Cloud App Discovery and Security 18. Section 4: Data Governance and Compliance in Microsoft 365
19. Chapter 15: Security Analytics and Auditing Capabilities 20. Chapter 16: Personal Data Protection in Microsoft 365 21. Chapter 17: Data Governance and Retention 22. Chapter 18: Search and Investigation 23. Chapter 19: Data Privacy Compliance 24. Section 5: Mock Exam and Assessment
25. Chapter 20: Mock Exam 26. Chapter 21: Mock Exam Answers 27. Chapter 22: Assessments 28. Other Books You May Enjoy

Chapter 11: Controlling Secure Access to Information Stored in Office 365

In the previous chapters, we have discussed the importance of securing and protecting a Microsoft 365 environment and shown you the various methods of protection that are available to you as an administrator. These include Multi-Factor Authentication, Conditional Access, Role-based access control, Azure AD Identity Protection, and Privileged Identity Management (PIM).

In this chapter, we will examine some additional features that you can use to protect user and device access within Office 365. We will show you how Privileged Access Management (PAM) enables the principle of just enough access (JEA) and grants permissions to users for functions at the task level, as opposed to a collection of tasks that are combined to make up a role (such as in PIM).

You will also learn the principles of the Customer Lockbox and how to turn Customer Lockbox requests on or off. Additionally, we will explain how to configure...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image