Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft Identity and Access Administrator SC-300 Exam Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
Microsoft Identity and Access Administrator SC-300 Exam Guide

Microsoft Identity and Access Administrator SC-300 Exam Guide

By : Aaron Guilmette, James Hardiman, Doug Haven, Dwayne Natwick
close
close
Microsoft Identity and Access Administrator SC-300 Exam Guide

Microsoft Identity and Access Administrator SC-300 Exam Guide

By: Aaron Guilmette, James Hardiman, Doug Haven, Dwayne Natwick

Overview of this book

In today’s cloud-driven environment, achieving SC-300 certification is essential for professionals looking to tackle real-world identity and access management (IAM) scenarios. SC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives. This updated edition gives you access to online exam prep resources such as chapter-wise practice questions, mock exams, interactive flashcards, and expert exam tips, providing you with all the tools you need for thorough exam preparation. You’ll get to grips with the creation, configuration, and management of Microsoft Entra identities, as well as understand the planning, implementation, and management of Microsoft Entra user authentication processes. You’ll learn to deploy and use new Global Secure Access features, design cloud application strategies, and manage application access and policies by using Microsoft Cloud App Security. You’ll also gain experience in configuring Privileged Identity Management for users and guests, working with the Permissions Creep Index, and mitigating associated risks. By the end of this book, you’ll have mastered the skills essential for securing Microsoft environments and be able to pass the SC-300 exam on your first attempt.
Table of Contents (21 chapters)
close
close

What Is GSA?

Before we get into configuring GSA, let’s take a look at what it is and how it works. As mentioned in the introduction, GSA is Microsoft’s SSE platform. It wraps several familiar concepts (such as application proxies and split-tunnel virtual private networking) into a new product designed to deliver zero-trust networking for remote users.

Figure 9.1 depicts the interaction of components in the GSA solution:

Figure 9.1: Microsoft Global Secure Access

Figure 9.1: Microsoft Global Secure Access

A GSA deployment utilizes several components:

  • Client: Software installed on endpoints such as laptops and mobile phones to connect to the Microsoft Security service
  • Traffic forwarding profiles: Policy configuration objects used to send network traffic to the GSA service
  • Connectors: Agents deployed to data centers and other on-premises networks that allow remote proxy connections into corporate applications

When a device is onboarded with the GSA client...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY