Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft 365 Security and Compliance for Administrators
  • Table Of Contents Toc
  • Feedback & Rating feedback
Microsoft 365 Security and Compliance for Administrators

Microsoft 365 Security and Compliance for Administrators

By : Sasha Kranjac, Omar Kudović
5 (8)
close
close
Microsoft 365 Security and Compliance for Administrators

Microsoft 365 Security and Compliance for Administrators

5 (8)
By: Sasha Kranjac, Omar Kudović

Overview of this book

In today's hostile cyber landscape, securing data and complying with regulations is paramount for individuals, businesses, and organizations alike. Learn how Microsoft 365 Security and Compliance offers powerful tools to protect sensitive data and defend against evolving cyber threats with this comprehensive guide for administrators. Starting with an introduction to Microsoft 365 plans and essential compliance and security features, this book delves into the role of Azure Active Directory in Microsoft 365, laying the groundwork for a robust security framework. You’ll then advance to exploring the complete range of Microsoft 365 Defender security products, their coverage, and unique protection services to combat evolving threats. From threat mitigation strategies to governance and compliance best practices, you’ll gain invaluable insights into classifying and protecting data while mastering crucial data lifecycle capabilities in Microsoft 365. By the end of this book, you’ll be able to elevate the security and compliance posture of your organization significantly.
Table of Contents (17 chapters)
close
close
1
Part 1:Introduction to Microsoft 365
In Progress | 0 / 1 sections completed | 0%
4
Part 2: Microsoft 365 Security
In Progress | 0 / 1 sections completed | 0%
11
Part 3: Microsoft 365 Governance and Compliance
In Progress | 0 / 1 sections completed | 0%
13
Chapter 10: Microsoft Purview Information Protection
In Progress | 0 / 4 sections completed | 0%
15
Index
In Progress | 0 / 2 sections completed | 0%

Configuring Microsoft Defender for Endpoint

The Device Overview portal in Microsoft Intune provides a comprehensive view of the security status of devices connected to an organization’s network. The following are some of the key information and insights that you can see in the Device Overview portal:

  • Device count: The Device Overview portal provides an overview of the number of devices that are connected to the network, including the number of devices that are protected by Microsoft Defender for Endpoint
  • Threats detected: The portal displays the number of threats that have been detected and remediated on the network, including malware, ransomware, and other types of cyber threats:
  • Vulnerabilities: The portal provides insight into the vulnerabilities on the network, including missing security updates, unpatched software, and other security weaknesses
  • Device health: The portal displays the health of devices, including the operating system version, the status...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY