Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft 365 Security and Compliance for Administrators
  • Table Of Contents Toc
  • Feedback & Rating feedback
Microsoft 365 Security and Compliance for Administrators

Microsoft 365 Security and Compliance for Administrators

By : Sasha Kranjac, Omar Kudović
5 (8)
close
close
Microsoft 365 Security and Compliance for Administrators

Microsoft 365 Security and Compliance for Administrators

5 (8)
By: Sasha Kranjac, Omar Kudović

Overview of this book

In today's hostile cyber landscape, securing data and complying with regulations is paramount for individuals, businesses, and organizations alike. Learn how Microsoft 365 Security and Compliance offers powerful tools to protect sensitive data and defend against evolving cyber threats with this comprehensive guide for administrators. Starting with an introduction to Microsoft 365 plans and essential compliance and security features, this book delves into the role of Azure Active Directory in Microsoft 365, laying the groundwork for a robust security framework. You’ll then advance to exploring the complete range of Microsoft 365 Defender security products, their coverage, and unique protection services to combat evolving threats. From threat mitigation strategies to governance and compliance best practices, you’ll gain invaluable insights into classifying and protecting data while mastering crucial data lifecycle capabilities in Microsoft 365. By the end of this book, you’ll be able to elevate the security and compliance posture of your organization significantly.
Table of Contents (17 chapters)
close
close
1
Part 1:Introduction to Microsoft 365
In Progress | 0 / 1 sections completed | 0%
4
Part 2: Microsoft 365 Security
In Progress | 0 / 1 sections completed | 0%
11
Part 3: Microsoft 365 Governance and Compliance
In Progress | 0 / 1 sections completed | 0%
13
Chapter 10: Microsoft Purview Information Protection
In Progress | 0 / 4 sections completed | 0%
15
Index
In Progress | 0 / 2 sections completed | 0%

Microsoft Purview Insider Risk Management

In a conversation about computer security, cloud security, cyber threats, cyber-attacks, attacks on computer systems, the ways companies and individuals become victims of attacks and lose their data, and how the data is stolen, people usually immediately think about hackers and how external attacks are the reason for data breaches and data loss.

Undoubtedly, hackers and external attacks still pose a threat to company data but as companies and their computer and cloud infrastructure get progressively better protection, attackers increasingly turn to the ones with direct contact with valuable company data.

People with direct contact with the data – employees – are becoming the major threat and concern among businesses of all sizes. Insider threat statistics are scary, and the numbers have been rising constantly. According to various statistics, around 65% of data breaches are caused by insider threats, while more than 70%...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY