Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft 365 Security and Compliance for Administrators
  • Table Of Contents Toc
  • Feedback & Rating feedback
Microsoft 365 Security and Compliance for Administrators

Microsoft 365 Security and Compliance for Administrators

By : Sasha Kranjac, Omar Kudović
5 (8)
close
close
Microsoft 365 Security and Compliance for Administrators

Microsoft 365 Security and Compliance for Administrators

5 (8)
By: Sasha Kranjac, Omar Kudović

Overview of this book

In today's hostile cyber landscape, securing data and complying with regulations is paramount for individuals, businesses, and organizations alike. Learn how Microsoft 365 Security and Compliance offers powerful tools to protect sensitive data and defend against evolving cyber threats with this comprehensive guide for administrators. Starting with an introduction to Microsoft 365 plans and essential compliance and security features, this book delves into the role of Azure Active Directory in Microsoft 365, laying the groundwork for a robust security framework. You’ll then advance to exploring the complete range of Microsoft 365 Defender security products, their coverage, and unique protection services to combat evolving threats. From threat mitigation strategies to governance and compliance best practices, you’ll gain invaluable insights into classifying and protecting data while mastering crucial data lifecycle capabilities in Microsoft 365. By the end of this book, you’ll be able to elevate the security and compliance posture of your organization significantly.
Table of Contents (17 chapters)
close
close
1
Part 1:Introduction to Microsoft 365
4
Part 2: Microsoft 365 Security
11
Part 3: Microsoft 365 Governance and Compliance

Technical and license requirements

Microsoft Defender for Endpoint requires the following minimum administrative roles for managing the solution:

  • Global administrator: To sign in and manage Microsoft Defender for Endpoint and related services
  • Security administrator: To manage security policies and responses to threats
  • Device administrator: To manage devices and device policies

It is important to note that these roles are the minimum required and the exact administrative roles required may vary depending on the specific needs and requirements of the organization.

Regarding supported browsers for Microsoft Defender for Endpoint, you can use either Microsoft Edge or Google Chrome. According to Microsoft’s information site about Microsoft Defender for Endpoint, other browsers can be used, but only those two are supported fully.

Microsoft Defender for Endpoint is included in Enterprise plans or can be added to the tenant as a standalone plan. There are...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY