In this section, we'll explore the Azure Security Center's capabilities for monitoring our identity and access-management infrastructure. With the Azure Security Center, you're able to understand the security state across your on-premises environments and cloud workloads. New Azure resources will be automatically discovered and on-boarded and you can apply security policies across your complete hybrid environment to ensure compliance with actual security standards. The service also provides the collection, search, and analysis of several sources, including third-party solutions and firewalls. Furthermore, we can find threats with advanced analysis mechanisms and are able to respond and recover from incidents because of the provided real-time security alerts. The export of your security events into an SIEM solution...

Mastering Identity and Access Management with Microsoft Azure
By :

Mastering Identity and Access Management with Microsoft Azure
By:
Overview of this book
Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.
You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (21 chapters)
Preface
Section 1: Identity Management and Synchronization
Building and Managing Azure Active Directory
Understanding Identity Synchronization
Exploring Advanced Synchronization Concepts
Monitoring Your Identity Bridge
Configuring and Managing Identity Protection
Section 2: Authentication and Application Publishing
Managing Authentication Protocols
Deploying Solutions on Azure AD and ADFS
Using the Azure AD App Proxy and the Web Application Proxy
Deploying Additional Applications on Azure AD
Exploring Azure AD Identity Services
Creating Identity Life Cycle Management in Azure
Section 3: Data Classification and Information Protection
Creating a Security Culture
Identifying and Detecting Sensitive Data
Understanding Encryption Key Management Strategies
Configuring Azure Information Protection Solutions
Azure Information Protection Development
Other Books You May Enjoy
How would like to rate this book
Customer Reviews