Microsoft Azure Security Center

Nonfiction, Computers, Operating Systems, NT, Database Management, Client-Server Computing, Networking & Communications
Cover of the book Microsoft Azure Security Center by Yuri Diogenes, Tom Shinder, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Yuri Diogenes, Tom Shinder ISBN: 9781509307067
Publisher: Pearson Education Publication: June 4, 2018
Imprint: Microsoft Press Language: English
Author: Yuri Diogenes, Tom Shinder
ISBN: 9781509307067
Publisher: Pearson Education
Publication: June 4, 2018
Imprint: Microsoft Press
Language: English

Discover high-value Azure security insights, tips, and operational optimizations

This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you’ll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible.

 

Two of Microsoft’s leading cloud security experts show how to:

• Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management

• Master a new security paradigm for a world without traditional perimeters

• Gain visibility and control to secure compute, network, storage, and application workloads

• Incorporate Azure Security Center into your security operations center

• Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions

• Adapt Azure Security Center’s built-in policies and definitions for your organization

• Perform security assessments and implement Azure Security Center recommendations

• Use incident response features to detect, investigate, and address threats

• Create high-fidelity fusion alerts to focus attention on your most urgent security issues

• Implement application whitelisting and just-in-time VM access

• Monitor user behavior and access, and investigate compromised or misused credentials

• Customize and perform operating system security baseline assessments

• Leverage integrated threat intelligence to identify known bad actors 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Discover high-value Azure security insights, tips, and operational optimizations

This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you’ll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible.

 

Two of Microsoft’s leading cloud security experts show how to:

• Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management

• Master a new security paradigm for a world without traditional perimeters

• Gain visibility and control to secure compute, network, storage, and application workloads

• Incorporate Azure Security Center into your security operations center

• Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions

• Adapt Azure Security Center’s built-in policies and definitions for your organization

• Perform security assessments and implement Azure Security Center recommendations

• Use incident response features to detect, investigate, and address threats

• Create high-fidelity fusion alerts to focus attention on your most urgent security issues

• Implement application whitelisting and just-in-time VM access

• Monitor user behavior and access, and investigate compromised or misused credentials

• Customize and perform operating system security baseline assessments

• Leverage integrated threat intelligence to identify known bad actors 

More books from Pearson Education

Cover of the book MCSA 70-687 Cert Guide by Yuri Diogenes, Tom Shinder
Cover of the book Microsoft SQL Server 2008 Analysis Services Step by Step by Yuri Diogenes, Tom Shinder
Cover of the book Next Generation Business Strategies for the Base of the Pyramid by Yuri Diogenes, Tom Shinder
Cover of the book How to Make Money with Email Marketing by Yuri Diogenes, Tom Shinder
Cover of the book Business Express: Nurturing Business innovation by Yuri Diogenes, Tom Shinder
Cover of the book CompTIA Network+ N10-007 Cert Guide by Yuri Diogenes, Tom Shinder
Cover of the book Getting Investment Leverage in the Markets by Yuri Diogenes, Tom Shinder
Cover of the book Photographing Rivers, Lakes, and Falling Water by Yuri Diogenes, Tom Shinder
Cover of the book Level 2: The Importance of Being Earnest by Yuri Diogenes, Tom Shinder
Cover of the book The Network Challenge (Chapter 20) by Yuri Diogenes, Tom Shinder
Cover of the book Business Networking for Veterans by Yuri Diogenes, Tom Shinder
Cover of the book Food Photography & Lighting by Yuri Diogenes, Tom Shinder
Cover of the book Adobe Analytics with SiteCatalyst Classroom in a Book by Yuri Diogenes, Tom Shinder
Cover of the book Writing Covered Calls: Earn Investment Income Using ETFs and Stock Options by Yuri Diogenes, Tom Shinder
Cover of the book Expert C Programming by Yuri Diogenes, Tom Shinder
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy