Microsoft 365 security and compliance for administrators: a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing, Limited
2024
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | DE-573 DE-2070s DE-91 DE-706 Volltext |
Beschreibung: | 1 Online-Ressource (432 Seiten) |
ISBN: | 9781837638864 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049874996 | ||
003 | DE-604 | ||
005 | 20250203 | ||
007 | cr|uuu---uuuuu | ||
008 | 240919s2024 xx o|||| 00||| eng d | ||
020 | |a 9781837638864 |9 978-1-83763-886-4 | ||
035 | |a (ZDB-30-PQE)EBC31214226 | ||
035 | |a (ZDB-30-PAD)EBC31214226 | ||
035 | |a (ZDB-89-EBL)EBL31214226 | ||
035 | |a (ZDB-221-PCR)9781837638864 | ||
035 | |a (OCoLC)1427665119 | ||
035 | |a (DE-599)BVBBV049874996 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s |a DE-706 |a DE-91 |a DE-573 | ||
082 | 0 | |a 658.478 | |
100 | 1 | |a Kranjac, Sasha |e Verfasser |0 (DE-588)122483495X |4 aut | |
245 | 1 | 0 | |a Microsoft 365 security and compliance for administrators |b a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
250 | |a 1st ed | ||
264 | 1 | |a Birmingham |b Packt Publishing, Limited |c 2024 | |
264 | 4 | |c © 2024 | |
300 | |a 1 Online-Ressource (432 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer security-Management | |
700 | 1 | |a Kudović, Omar |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Kranjac, Sasha |t Microsoft 365 Security and Compliance for Administrators |d Birmingham : Packt Publishing, Limited,c2024 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/PACKT0007112.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE | ||
912 | |a ZDB-221-PCR | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035214454 | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0007112.html |l DE-573 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31214226 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0007112.html |l DE-91 |p ZDB-221-PCR |q TUM_Paketkauf_2025 |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0007112.html |l DE-706 |p ZDB-221-PCR |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1823041316006658048 |
---|---|
adam_text | |
any_adam_object | |
author | Kranjac, Sasha |
author_GND | (DE-588)122483495X |
author_facet | Kranjac, Sasha |
author_role | aut |
author_sort | Kranjac, Sasha |
author_variant | s k sk |
building | Verbundindex |
bvnumber | BV049874996 |
collection | ZDB-30-PQE ZDB-221-PCR |
contents | Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Microsoft 365 -- Chapter 1: Getting Started with Microsoft 365 Security and Compliance -- Technical requirements -- Introduction to Microsoft 365 offers, plans, and licenses -- Microsoft 365 plans and components -- Microsoft 365 licensing -- Introduction to Microsoft 365 security -- Introduction to Microsoft 365 compliance -- Summary -- Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security -- Technical requirements -- Microsoft Entra ID plans and features -- Microsoft Entra ID roles and groups -- Azure roles, or Azure RBAC roles -- Microsoft Entra ID roles -- Classic roles -- Microsoft 365 roles in Microsoft Entra ID -- Best practices for roles -- Microsoft 365 groups -- Microsoft Entra ID Protection -- Summary -- Part 2: Microsoft 365 Security -- Chapter 3: Microsoft Defender for Office 365 -- Technical requirements -- Getting started with Microsoft Defender for Office 365 -- Protecting assets with Microsoft Defender for Office 365 -- Quarantine policy -- Anti-phishing -- Anti-spam -- Anti-malware -- Safe Attachment -- Safe Links -- Rules -- Attack simulation training -- Responding to alerts and mitigating threats -- Summary -- Chapter 4: Microsoft Defender for Endpoint -- Introducing Microsoft Defender for Endpoint -- Technical and license requirements -- Configuring Microsoft Defender for Endpoint -- Microsoft Defender Vulnerability Management dashboard -- Microsoft Defender for Endpoint Device inventory -- Windows devices -- Configuring advanced features in Microsoft Defender for Endpoint -- Security recommendations -- The Microsoft Defender for Endpoint configuration management dashboard -- Microsoft Defender for Endpoint Tutorials & -- simulations Microsoft Defender for Endpoint Co-management Authority -- Configuring a compliance policy for Windows devices -- Configuring a configuration profile for Windows devices -- Windows 365 -- Enrollment device platform restrictions -- Enrollment device limit restrictions -- Configuring quality updates for Windows 10 and later in Intune -- How to create a profile for update policies for iOS/iPadOS in Intune -- How to create a profile for update policies for macOS in the Intune portal -- How to create app protection policies in the Microsoft Intune admin portal -- How to create app configuration policies -- How to create policies for Office apps in the Intune admin portal -- Endpoint Security -- Creating a profile for a security baseline for Windows 10 and later -- Creating a Microsoft Defender for Endpoint baseline -- Creating a Microsoft Edge baseline -- Creating a Windows 365 security baseline -- Managing and creating different policies under Endpoint Security -- Configuring an antivirus policy in the Intune portal -- Configuring disk encryption -- Configuring a firewall policy -- Setting up endpoint detection and response -- Configuring attack surface reduction -- Configuring account protection -- Configuring device compliance -- Configuring Conditional Access policies -- Summary -- Chapter 5: Getting Started with Microsoft Purview -- About Microsoft Purview -- How it works... -- Benefits -- Technical and license requirements -- Configuring Microsoft Purview -- Compliance Score -- Classifiers in Microsoft 365 Purview -- Configuring sensitive info types -- Configuring content explorer -- Content search -- Streamlining data discovery -- Enhancing data governance and compliance -- Independence and objectivity -- Regulatory oversight and accountability -- Risk mitigation and control -- A comprehensive compliance oversight Collaboration and cross-functional alignment -- Data loss prevention -- Endpoint DLP settings -- Summary -- Chapter 6: Microsoft Defender for Cloud Apps -- Introducing Microsoft Defender for Cloud Apps -- Discovering shadow IT with Microsoft Defender for Cloud Apps -- Discovering and managing shadow IT in Microsoft Defender for Cloud Apps -- Technical and license requirements -- Configuring Microsoft Defender for Cloud Apps -- Managing OAuth applications with Microsoft Defender for Cloud Apps -- Managing files in Microsoft Defender for Cloud Apps -- Managing the activity log in Microsoft Defender for Cloud Apps -- Governance log -- Microsoft Defender for Cloud Apps policies -- Summary -- Chapter 7: Microsoft Defender Vulnerability Management -- Getting started with Microsoft Defender Vulnerability Management -- Microsoft Defender Vulnerability Management licensing and technical requirements -- Key features and capabilities -- Benefits of using the Vulnerability Management dashboard -- Permissions -- Recommendations and remediation -- Security recommendations -- Remediation tasks in Microsoft Intune -- Remediation -- Inventories and weaknesses -- Inventories -- Weaknesses -- Summary -- Chapter 8: Microsoft Defender for Identity -- Introducing Microsoft Defender for Identity -- Technical and license requirements -- Configuring Microsoft Defender for Identity -- Configuring sensors for Microsoft Defender for Identity -- Entity tags -- Working with detection rules -- Configuring Microsoft Defender for Identity and Microsoft Sentinel -- Summary -- Part 3: Microsoft 365 Governance and Compliance -- Chapter 9: Microsoft Purview Insider Risk Management -- Technical requirements -- Insider Risk Management -- Initial setup -- Resolving insider risk cases -- Information barriers and access management -- Microsoft Purview IB requirements Communication Compliance -- Summary -- Further readings -- Chapter 10: Microsoft Purview Information Protection -- About Microsoft Purview Information Protection -- Data classification -- Configuring Information Protection -- Information Protection -- Publishing label policies -- Information Protection scanner -- Installing the Microsoft Purview Information Protection scanner -- Summary -- Chapter 11: Understanding the Lifecycle of Auditing and Records -- Getting started with the lifecycle of auditing and records -- The lifecycle of audits and records in Microsoft 365 -- Microsoft Purview Records Management -- Microsoft data lifecycle management -- Creating retention policies -- Creating and publishing labels -- Records management -- eDiscovery and data holds -- Configuring eDiscovery Standard and Premium -- Creating and configuring eDiscovery premium cases -- Auditing and alerts -- Summary -- Index -- Other Books You May Enjoy |
ctrlnum | (ZDB-30-PQE)EBC31214226 (ZDB-30-PAD)EBC31214226 (ZDB-89-EBL)EBL31214226 (ZDB-221-PCR)9781837638864 (OCoLC)1427665119 (DE-599)BVBBV049874996 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049874996</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250203</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240919s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837638864</subfield><subfield code="9">978-1-83763-886-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC31214226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC31214226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL31214226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCR)9781837638864</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1427665119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049874996</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kranjac, Sasha</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122483495X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft 365 security and compliance for administrators</subfield><subfield code="b">a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (432 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security-Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kudović, Omar</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Kranjac, Sasha</subfield><subfield code="t">Microsoft 365 Security and Compliance for Administrators</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2024</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007112.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCR</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035214454</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007112.html</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31214226</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007112.html</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="q">TUM_Paketkauf_2025</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007112.html</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049874996 |
illustrated | Not Illustrated |
indexdate | 2025-02-03T13:01:20Z |
institution | BVB |
isbn | 9781837638864 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035214454 |
oclc_num | 1427665119 |
open_access_boolean | |
owner | DE-2070s DE-706 DE-91 DE-BY-TUM DE-573 |
owner_facet | DE-2070s DE-706 DE-91 DE-BY-TUM DE-573 |
physical | 1 Online-Ressource (432 Seiten) |
psigel | ZDB-30-PQE ZDB-221-PCR ZDB-30-PQE HWR_PDA_PQE ZDB-221-PCR TUM_Paketkauf_2025 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing, Limited |
record_format | marc |
spelling | Kranjac, Sasha Verfasser (DE-588)122483495X aut Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture 1st ed Birmingham Packt Publishing, Limited 2024 © 2024 1 Online-Ressource (432 Seiten) txt rdacontent c rdamedia cr rdacarrier Computer security-Management Kudović, Omar Sonstige oth Erscheint auch als Druck-Ausgabe Kranjac, Sasha Microsoft 365 Security and Compliance for Administrators Birmingham : Packt Publishing, Limited,c2024 https://portal.igpublish.com/iglibrary/search/PACKT0007112.html Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Kranjac, Sasha Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Microsoft 365 -- Chapter 1: Getting Started with Microsoft 365 Security and Compliance -- Technical requirements -- Introduction to Microsoft 365 offers, plans, and licenses -- Microsoft 365 plans and components -- Microsoft 365 licensing -- Introduction to Microsoft 365 security -- Introduction to Microsoft 365 compliance -- Summary -- Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security -- Technical requirements -- Microsoft Entra ID plans and features -- Microsoft Entra ID roles and groups -- Azure roles, or Azure RBAC roles -- Microsoft Entra ID roles -- Classic roles -- Microsoft 365 roles in Microsoft Entra ID -- Best practices for roles -- Microsoft 365 groups -- Microsoft Entra ID Protection -- Summary -- Part 2: Microsoft 365 Security -- Chapter 3: Microsoft Defender for Office 365 -- Technical requirements -- Getting started with Microsoft Defender for Office 365 -- Protecting assets with Microsoft Defender for Office 365 -- Quarantine policy -- Anti-phishing -- Anti-spam -- Anti-malware -- Safe Attachment -- Safe Links -- Rules -- Attack simulation training -- Responding to alerts and mitigating threats -- Summary -- Chapter 4: Microsoft Defender for Endpoint -- Introducing Microsoft Defender for Endpoint -- Technical and license requirements -- Configuring Microsoft Defender for Endpoint -- Microsoft Defender Vulnerability Management dashboard -- Microsoft Defender for Endpoint Device inventory -- Windows devices -- Configuring advanced features in Microsoft Defender for Endpoint -- Security recommendations -- The Microsoft Defender for Endpoint configuration management dashboard -- Microsoft Defender for Endpoint Tutorials & -- simulations Microsoft Defender for Endpoint Co-management Authority -- Configuring a compliance policy for Windows devices -- Configuring a configuration profile for Windows devices -- Windows 365 -- Enrollment device platform restrictions -- Enrollment device limit restrictions -- Configuring quality updates for Windows 10 and later in Intune -- How to create a profile for update policies for iOS/iPadOS in Intune -- How to create a profile for update policies for macOS in the Intune portal -- How to create app protection policies in the Microsoft Intune admin portal -- How to create app configuration policies -- How to create policies for Office apps in the Intune admin portal -- Endpoint Security -- Creating a profile for a security baseline for Windows 10 and later -- Creating a Microsoft Defender for Endpoint baseline -- Creating a Microsoft Edge baseline -- Creating a Windows 365 security baseline -- Managing and creating different policies under Endpoint Security -- Configuring an antivirus policy in the Intune portal -- Configuring disk encryption -- Configuring a firewall policy -- Setting up endpoint detection and response -- Configuring attack surface reduction -- Configuring account protection -- Configuring device compliance -- Configuring Conditional Access policies -- Summary -- Chapter 5: Getting Started with Microsoft Purview -- About Microsoft Purview -- How it works... -- Benefits -- Technical and license requirements -- Configuring Microsoft Purview -- Compliance Score -- Classifiers in Microsoft 365 Purview -- Configuring sensitive info types -- Configuring content explorer -- Content search -- Streamlining data discovery -- Enhancing data governance and compliance -- Independence and objectivity -- Regulatory oversight and accountability -- Risk mitigation and control -- A comprehensive compliance oversight Collaboration and cross-functional alignment -- Data loss prevention -- Endpoint DLP settings -- Summary -- Chapter 6: Microsoft Defender for Cloud Apps -- Introducing Microsoft Defender for Cloud Apps -- Discovering shadow IT with Microsoft Defender for Cloud Apps -- Discovering and managing shadow IT in Microsoft Defender for Cloud Apps -- Technical and license requirements -- Configuring Microsoft Defender for Cloud Apps -- Managing OAuth applications with Microsoft Defender for Cloud Apps -- Managing files in Microsoft Defender for Cloud Apps -- Managing the activity log in Microsoft Defender for Cloud Apps -- Governance log -- Microsoft Defender for Cloud Apps policies -- Summary -- Chapter 7: Microsoft Defender Vulnerability Management -- Getting started with Microsoft Defender Vulnerability Management -- Microsoft Defender Vulnerability Management licensing and technical requirements -- Key features and capabilities -- Benefits of using the Vulnerability Management dashboard -- Permissions -- Recommendations and remediation -- Security recommendations -- Remediation tasks in Microsoft Intune -- Remediation -- Inventories and weaknesses -- Inventories -- Weaknesses -- Summary -- Chapter 8: Microsoft Defender for Identity -- Introducing Microsoft Defender for Identity -- Technical and license requirements -- Configuring Microsoft Defender for Identity -- Configuring sensors for Microsoft Defender for Identity -- Entity tags -- Working with detection rules -- Configuring Microsoft Defender for Identity and Microsoft Sentinel -- Summary -- Part 3: Microsoft 365 Governance and Compliance -- Chapter 9: Microsoft Purview Insider Risk Management -- Technical requirements -- Insider Risk Management -- Initial setup -- Resolving insider risk cases -- Information barriers and access management -- Microsoft Purview IB requirements Communication Compliance -- Summary -- Further readings -- Chapter 10: Microsoft Purview Information Protection -- About Microsoft Purview Information Protection -- Data classification -- Configuring Information Protection -- Information Protection -- Publishing label policies -- Information Protection scanner -- Installing the Microsoft Purview Information Protection scanner -- Summary -- Chapter 11: Understanding the Lifecycle of Auditing and Records -- Getting started with the lifecycle of auditing and records -- The lifecycle of audits and records in Microsoft 365 -- Microsoft Purview Records Management -- Microsoft data lifecycle management -- Creating retention policies -- Creating and publishing labels -- Records management -- eDiscovery and data holds -- Configuring eDiscovery Standard and Premium -- Creating and configuring eDiscovery premium cases -- Auditing and alerts -- Summary -- Index -- Other Books You May Enjoy Computer security-Management |
title | Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
title_auth | Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
title_exact_search | Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
title_full | Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
title_fullStr | Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
title_full_unstemmed | Microsoft 365 security and compliance for administrators a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
title_short | Microsoft 365 security and compliance for administrators |
title_sort | microsoft 365 security and compliance for administrators a definitive guide to planning implementing and maintaining microsoft 365 security posture |
title_sub | a definitive guide to planning, implementing, and maintaining Microsoft 365 security posture |
topic | Computer security-Management |
topic_facet | Computer security-Management |
url | https://portal.igpublish.com/iglibrary/search/PACKT0007112.html |
work_keys_str_mv | AT kranjacsasha microsoft365securityandcomplianceforadministratorsadefinitiveguidetoplanningimplementingandmaintainingmicrosoft365securityposture AT kudovicomar microsoft365securityandcomplianceforadministratorsadefinitiveguidetoplanningimplementingandmaintainingmicrosoft365securityposture |