Home Page Icon
Home Page
Table of Contents for
Azure Security Cookbook
Close
Azure Security Cookbook
by Steve Miles
Azure Security Cookbook
Azure Security Cookbook
Contributors
About the author
About the reviewer
Preface
Part 1: Azure Security Features
Chapter 1: Securing Azure AD Identities
Chapter 2: Securing Azure Networks
Chapter 3: Securing Remote Access
Chapter 4: Securing Virtual Machines
Chapter 5: Securing Azure SQL Databases
Chapter 6: Securing Azure Storage
Part 2: Azure Security Tools
Chapter 7: Using Advisor
Chapter 8: Using Microsoft Defender for Cloud
Chapter 9: Using Microsoft Sentinel
Chapter 10: Using Traffic Analytics
Index
Other Books You May Enjoy
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Azure Security Cookbook
Next
Next Chapter
Preface
Table of Contents
Preface
Part 1: Azure Security Features
1
Securing Azure AD Identities
Introduction to Azure Identity Services
What is AD?
Technical requirements
Reviewing Azure AD Identity Secure Score
Getting ready
How to do it…
How it works…
See also
Implementing Azure AD tenant Identity and Access Management
Getting ready
How to do it…
How it works…
There’s more…
See also
Implementing Azure AD Password Protection
Getting ready
How to do it…
How it works…
See also
Implementing a Self-Service Password Reset
Getting ready
How to do it…
How it works…
See also
Implementing Azure AD security defaults
Getting ready
How to do it….
How it works…
See also
Implementing Azure AD multi-factor authentication
Getting ready
How to do it…
How it works…
See also
Implementing Conditional Access policies
Getting ready
How to do it…
How it works…
See also
Implementing the Azure AD Identity Protection service
Getting ready
How to do it…
How it works…
See also
Implementing Azure AD Privileged Identity Management
Getting ready
How to do it…
How it works…
See also
2
Securing Azure Networks
Technical requirements
Implementing network security groups
Getting ready
How to do it…
How it works…
See also
Implementing Azure Firewall
Getting ready
How to do it…
How it works…
See also
Implementing Azure Web Application Firewall
Getting ready
How to do it…
How it works…
There’s more…
See also
Implementing Azure DDoS
Getting ready
How to do it…
How it works…
There’s more…
See also
3
Securing Remote Access
Technical requirements
Implementing Azure Network Adapter
Getting ready
How to do it…
How it works…
There’s more…
See also
Implementing the Azure Bastion service
Getting ready
How to do it…
How it works…
There’s more…
See also
Implementing JIT VM access
Getting ready
How to do it…
How it works…
There’s more…
See also
4
Securing Virtual Machines
Technical requirements
Implementing VM Update Management
Getting ready
How to do it…
How it works…
There’s more…
See also
Implementing VM Microsoft Antimalware
Getting ready
How to do it…
How it works…
See also
Implementing VM Azure Disk Encryption
Getting ready
How to do it…
How it works…
There’s more…
See also
5
Securing Azure SQL Databases
Technical requirements
Implementing a service-level IP firewall
Getting ready
How to do it…
How it works…
See also
Implementing a private endpoint
Getting ready
How to do it…
How it works….
There’s more…
See also
Implementing Azure AD authentication and authorization
Getting ready
How to do it…
How it works…
See also
6
Securing Azure Storage
Technical requirements
Implementing security settings on storage accounts
Getting ready
How to do it…
How it works…
See also
Implementing network security
How to do it…
How it works…
There’s more…
See also
Implementing encryption
Getting ready
How to do it…
How it works…
See also
Part 2: Azure Security Tools
7
Using Advisor
Technical requirements
Reviewing the security recommendations
Getting ready
How to do it…
How it works…
See also
Implementing the security recommendations
Getting ready
How to do it…
How it works…
See also
8
Using Microsoft Defender for Cloud
Technical requirements
Terminology reference
Review Defender for Cloud components
Getting ready
How to do it…
How it works…
See also
Enable enhanced security features of Defender for Cloud
Getting ready
How to do it…
How it works…
See also
Add a standard to the Regulatory compliance dashboard
Getting ready
How to do it…
How it works…
Assess your regulatory compliance
Getting ready
How to do it…
How it works…
See also
9
Using Microsoft Sentinel
Technical requirements
Terminology reference
Enabling Microsoft Sentinel
Getting ready
How to do it…
How it works…
See also
Reviewing Microsoft Sentinel components
Getting ready
How to do it…
How it works…
See also
Creating automation
Getting ready
How to do it…
How it works…
See also
Set up data connectors
Getting ready
How to do it…
How it works…
See also
10
Using Traffic Analytics
Technical requirements
Terminology reference
Implementing traffic analytics
Getting ready
How to do it…
How it works…
See also
Index
Other Books You May Enjoy
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset