Table of Contents

Preface

Part 1: Azure Security Features

1

Securing Azure AD Identities

Introduction to Azure Identity Services

What is AD?

Technical requirements

Reviewing Azure AD Identity Secure Score

Getting ready

How to do it…

How it works…

See also

Implementing Azure AD tenant Identity and Access Management

Getting ready

How to do it…

How it works…

There’s more…

See also

Implementing Azure AD Password Protection

Getting ready

How to do it…

How it works…

See also

Implementing a Self-Service Password Reset

Getting ready

How to do it…

How it works…

See also

Implementing Azure AD security defaults

Getting ready

How to do it….

How it works…

See also

Implementing Azure AD multi-factor authentication

Getting ready

How to do it…

How it works…

See also

Implementing Conditional Access policies

Getting ready

How to do it…

How it works…

See also

Implementing the Azure AD Identity Protection service

Getting ready

How to do it…

How it works…

See also

Implementing Azure AD Privileged Identity Management

Getting ready

How to do it…

How it works…

See also

2

Securing Azure Networks

Technical requirements

Implementing network security groups

Getting ready

How to do it…

How it works…

See also

Implementing Azure Firewall

Getting ready

How to do it…

How it works…

See also

Implementing Azure Web Application Firewall

Getting ready

How to do it…

How it works…

There’s more…

See also

Implementing Azure DDoS

Getting ready

How to do it…

How it works…

There’s more…

See also

3

Securing Remote Access

Technical requirements

Implementing Azure Network Adapter

Getting ready

How to do it…

How it works…

There’s more…

See also

Implementing the Azure Bastion service

Getting ready

How to do it…

How it works…

There’s more…

See also

Implementing JIT VM access

Getting ready

How to do it…

How it works…

There’s more…

See also

4

Securing Virtual Machines

Technical requirements

Implementing VM Update Management

Getting ready

How to do it…

How it works…

There’s more…

See also

Implementing VM Microsoft Antimalware

Getting ready

How to do it…

How it works…

See also

Implementing VM Azure Disk Encryption

Getting ready

How to do it…

How it works…

There’s more…

See also

5

Securing Azure SQL Databases

Technical requirements

Implementing a service-level IP firewall

Getting ready

How to do it…

How it works…

See also

Implementing a private endpoint

Getting ready

How to do it…

How it works….

There’s more…

See also

Implementing Azure AD authentication and authorization

Getting ready

How to do it…

How it works…

See also

6

Securing Azure Storage

Technical requirements

Implementing security settings on storage accounts

Getting ready

How to do it…

How it works…

See also

Implementing network security

How to do it…

How it works…

There’s more…

See also

Implementing encryption

Getting ready

How to do it…

How it works…

See also

Part 2: Azure Security Tools

7

Using Advisor

Technical requirements

Reviewing the security recommendations

Getting ready

How to do it…

How it works…

See also

Implementing the security recommendations

Getting ready

How to do it…

How it works…

See also

8

Using Microsoft Defender for Cloud

Technical requirements

Terminology reference

Review Defender for Cloud components

Getting ready

How to do it…

How it works…

See also

Enable enhanced security features of Defender for Cloud

Getting ready

How to do it…

How it works…

See also

Add a standard to the Regulatory compliance dashboard

Getting ready

How to do it…

How it works…

Assess your regulatory compliance

Getting ready

How to do it…

How it works…

See also

9

Using Microsoft Sentinel

Technical requirements

Terminology reference

Enabling Microsoft Sentinel

Getting ready

How to do it…

How it works…

See also

Reviewing Microsoft Sentinel components

Getting ready

How to do it…

How it works…

See also

Creating automation

Getting ready

How to do it…

How it works…

See also

Set up data connectors

Getting ready

How to do it…

How it works…

See also

10

Using Traffic Analytics

Technical requirements

Terminology reference

Implementing traffic analytics

Getting ready

How to do it…

How it works…

See also

Index

Other Books You May Enjoy

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset