New Release Books by Yuri Diogenes

Yuri Diogenes is the author of Exam Ref Sc-900 Microsoft Security, Compliance, and Identity Fundamentals (2021), Exam Ref Sc-200 Microsoft Security Operations Analyst (2021), Exam Ref Az-500 Microsoft Azure Security Technologies (2020), Microsoft Azure Sentinel (2020) and other 15 books.

For more book recommendations, please check out New York Times® Best Sellers, Children's Book Recommendations or the complete list of Featured Book Lists and Award Winners

19 results found

Exam Ref Sc-900 Microsoft Security, Compliance, and Identity Fundamentals

release date: Sep 28, 2021
Exam Ref Sc-900 Microsoft Security, Compliance, and Identity Fundamentals
Direct from Microsoft, this Exam Ref is the official study guide for the new Microsoft SC-900 Microsoft Security Fundamentals certification exam. Exam Ref SC-900 Microsoft Security Fundamentals offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on the specific areas of expertise modern IT professionals need to demonstrate real-world mastery of how Microsoft Azure and Microsoft 365 security, compliance, and identity solutions can provide holistic, end-to-end solutions. You'll learn how to describe: Concepts of security, compliance, and identity Capabilities of Microsoft identity and access management solutions Capabilities of Microsoft security solutions Capabilities of Microsoft compliance solutions Microsoft Exam Ref publications stand apart from third-party study guides because they: Provide guidance from Microsoft, the creator of Microsoft certification exams Target professional-level exam candidates with content focused on their needs, not "one-size-fits-all" content Streamline study by organizing material according to the exam objective domain (OD), covering one functional group and its objectives in each chapter Feature Thought Experiments to guide candidates through a set of what if? scenarios, and prepare them more effectively for Pro-level style exam questions Include "Need more review?" aids pointing you to more study materials if you need them Explore big picture thinking around the professional's job role For more information on Exam SC-900 and the Microsoft Certified: Security, Compliance, and Identity Fundamentals credential, visit https: //docs.microsoft.com/en-us/learn/certifications/security-compliance-and-identity-fundamentals/.

Exam Ref Sc-200 Microsoft Security Operations Analyst

release date: Sep 28, 2021
Exam Ref Sc-200 Microsoft Security Operations Analyst
Direct from Microsoft, this Exam Ref is the official study guide for the new Microsoft SC-200 Microsoft Security Operations Analyst certification exam. Exam Ref SC-200 Microsoft Security Operations Analyst offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on the specific areas of expertise modern IT professionals need to demonstrate real-world mastery of threat mitigation with Microsoft 365 and Azure tools. Coverage includes mitigating threats using: Microsoft 365 Defender: Detect, investigate, respond, and remediate threats to the productivity environment, endpoints, and identity; manage cross-domain investigations Azure Defender: Design and configure Azure Defender implementations; plan and implement the use of data connectors to ingest data sources; manage alert rules; configure automation and remediation; investigate alerts and incidents Azure Sentinel: Design and configure a workspace; ingest data sources; manage analytics rules; configure SOAR; manage incidents; use workbooks to analyze and interpret data; hunt for threats Microsoft Exam Ref publications stand apart from third-party study guides because they: Provide guidance from Microsoft, the creator of Microsoft certification exams Target professional-level exam candidates with content focused on their needs, not "one-size-fits-all" content Streamline study by organizing material according to the exam objective domain (OD), covering one functional group and its objectives in each chapter Feature Thought Experiments to guide candidates through a set of "what if?" scenarios, and prepare them more effectively for Pro-level style exam questions Include "Need more review?" aids pointing you to more study materials if you need them Explore big picture thinking around the professional's job role For more information on Exam SC-200 and the Microsoft Certified: Security Operations Analyst Associate credential, visit https: //docs.microsoft.com/en-us/learn/certifications/security-operations-analyst/.

Exam Ref Az-500 Microsoft Azure Security Technologies

release date: Sep 25, 2020
Exam Ref Az-500 Microsoft Azure Security Technologies
Direct from Microsoft, this Exam Ref is the official study guide for the new Microsoft AZ-500 Microsoft Azure Security Technologies certification exam. Exam Ref AZ-500 Microsoft Azure Security Technologies offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on specific areas of expertise modern IT professionals need to demonstrate real-world mastery of Azure security. Coverage includes: Managing identity and access Implementing platform protection Managing security operations Securing data and applications Microsoft Exam Ref publications stand apart from third-party study guides because they: Provide guidance from Microsoft, the creator of Microsoft certification exams Target IT professional-level exam candidates with content focused on their needs, not "one-size-fits-all" content Streamline study by organizing material according to the exam's objective domain (OD), covering one functional group and its objectives in each chapter Feature Thought Experiments to guide candidates through a set of "what if?" scenarios, and prepare them more effectively for Pro-level style exam questions Explore big picture thinking around the planning and design aspects of the IT pro's job role For more information on Exam AZ-500 and the Microsoft Certified: Azure Security Engineer Associate credential, visit https: //docs.microsoft.com/en-us/learn/certifications/azure-security-engineer.

Microsoft Azure Sentinel

release date: Feb 25, 2020
Microsoft Azure Sentinel
Microsoft Azure Sentinel Plan, deploy, and operate Azure Sentinel, Microsoft’s advanced cloud-based SIEM Microsoft’s cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response – without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft’s leading experts review all it can do, and guide you step by step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration to data ingestion, rule development to incident management… even proactive threat hunting to disrupt attacks before you’re exploited. Three of Microsoft’s leading security operations experts show how to: • Use Azure Sentinel to respond to today’s fast-evolving cybersecurity environment, and leverage the benefits of its cloud-native architecture • Review threat intelligence essentials: attacker motivations, potential targets, and tactics, techniques, and procedures • Explore Azure Sentinel components, architecture, design considerations, and initial configuration • Ingest alert log data from services and endpoints you need to monitor • Build and validate rules to analyze ingested data and create cases for investigation • Prevent alert fatigue by projecting how many incidents each rule will generate • Help Security Operation Centers (SOCs) seamlessly manage each incident’s lifecycle • Move towards proactive threat hunting: identify sophisticated threat behaviors and disrupt cyber kill chains before you’re exploited • Do more with data: use programmable Jupyter notebooks and their libraries for machine learning, visualization, and data analysis • Use Playbooks to perform Security Orchestration, Automation and Response (SOAR) • Save resources by automating responses to low-level events • Create visualizations to spot trends, identify or clarify relationships, and speed decisions • Integrate with partners and other third-parties, including Fortinet, AWS, and Palo Alto

Cybersecurity – Attack and Defense Strategies

release date: Dec 31, 2019
Cybersecurity – Attack and Defense Strategies
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book Description Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization’s cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is for For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

Microsoft Azure Security Center

release date: Sep 05, 2019
Microsoft Azure Security Center
NOW FULLY UPDATED: high-value Azure Security Center insights, tips, and operational solutions Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center’s robust protection, detection, and response capabilities in key operational scenarios. You’ll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident response and risk management. Brand-new coverage includes single-click remediation, IoT, improved container security, Azure Sentinel, and more. Whatever your security role, you’ll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible. Two of Microsoft’s leading cloud security experts show how to: Implement a comprehensive new security paradigm designed specifically for cloud and hybrid environments Gain visibility and control to secure all key workloads Incorporate Azure Security Center into your security operations center, and integrate Azure AD Identity Protection Center and third-party solutions Adapt Azure Security Center’s built-in policies and definitions for your organization Perform security assessments, and implement Azure Security Center recommendations fast with single-click remediation Use incident response features to detect, investigate, and address threats Create high-fidelity fusion alerts to focus attention on your most urgent security issues Implement application whitelisting and just-in-time VM access Assess IoT device security with the Azure IoT Hub managed service Monitor user behavior and access, and investigate compromised or misused credentials Integrate Microsoft’s new Azure Sentinel Security Information and Event Management (SIEM) platform Customize and perform operating system security baseline assessments About This Book For cloud architects, designers, implementers, operations professionals, and security specialists working in Microsoft Azure cloud or hybrid environments For all IT professionals and decision-makers concerned with the security of Azure environments

Cybersecurity ??? Attack and Defense Strategies

release date: Jan 30, 2018
Cybersecurity ??? Attack and Defense Strategies
Enhance your organization’s secure posture by improving your attack and defense strategies Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics. Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies. A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system. Book Description The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis. By the end of this book, you will be well-versed with Red Team and Blue Team techniques and will have learned the techniques used nowadays to attack and defend systems. What you will learn Learn the importance of having a solid foundation for your security posture Understand the attack strategy using cyber security kill chain Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Learn how to perform an incident investigation Get an in-depth understanding of the recovery process Understand continuous security monitoring and how to implement a vulnerability management strategy Learn how to perform log analysis to identify suspicious activities Who this book is for This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.

Microsoft Azure Security Infrastructure

release date: Aug 19, 2016
Microsoft Azure Security Infrastructure
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure ,1/e three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You’ll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement–so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: • Understand cloud security boundaries and responsibilities • Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection • Explore Azure’s defense-in-depth security architecture • Use Azure network security patterns and best practices • Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security • Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines • Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information • Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite • Effectively model threats and plan protection for IoT systems • Use Azure security tools for operations, incident response, and forensic investigation

Enterprise Mobility with App Management, Office 365, and Threat Mitigation

release date: Jan 13, 2016
Enterprise Mobility with App Management, Office 365, and Threat Mitigation
Enable employees to be productive and access data from any location or device Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA). Plan, deploy, and deliver complete enterprise mobility while improving security Choose the right Microsoft enterprise mobility solution for your organization Protect apps and data with Microsoft Intune Mobile Application Management (MAM) Identify suspicious user or device activity in hybrid cloud/on-premises environments Prepare for and successfully implement Microsoft ATA Flexibly manage diverse mobile devices with MDM for Office 365 Configure access, define policies, enroll mobile devices, and manage compliance

Ready, Set, Achieve!

release date: Jul 07, 2015
Ready, Set, Achieve!
An organized guide to turning a dream into a reality without sacrificing achievements in other areas of life. Studies have shown that personal health directly affects professional well-being and vice versa. As one decreases, the other suffers. Conversely, as one increases, the other rises as well. By learning how to effectively and evenly pull the strings of both aspects of life—avoiding a collision of priorities—all goals can be reached with less stress and better health. Ready, Set, Achieve! digs into the psyche of setting a goal, creating a plan of action, carrying out those action steps, finding support systems, and cycling back around to do it all over again for a new and higher goal. Personal anecdotes from authors Yuri Diogenes and Jodi Miller punctuate each chapter and give an inside view into overcoming their own struggles and turning them into tangible success stories. Both authors rely on real-life experience to shed light on how to transform one’s mind and body and still create balance. Diogenes shares the tale of his amazing 100-pound weight loss and subsequent appearance on a national-qualifying bodybuilding stage in one of the biggest states in the country, while rising to the top ranks in his IT career. And Miller describes her feat of lifting almost three times her bodyweight at national- and world-level lifting championships, while remaining well rounded in both her athletic and career worlds. Ready, Set, Achieve! shows the road to just that: being your overall best.

Enterprise Mobility Suite Managing BYOD and Company-Owned Devices

release date: Mar 13, 2015
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management experts at Microsoft show you how to systematically help protect employee privacy and corporate assets without compromising productivity. You’ll find best practices, step-by-step guidance, and real-world scenarios for every stage of planning, design, deployment, and administration. Empower your mobile users while improving security and controlling costs Master proven best practices for centrally managing smartphones and tablets Plan mobile strategies that encompass users, devices, apps, and data Overcome BYOD’s unique challenges, constraints, and compliance issues Provide common “hybrid” user identities and a seamless experience across all resources: on-premises, datacenter, and cloud Simplify and improve device enrollment, monitoring, and troubleshooting Help safeguard both corporate and personal information

Cybersecurity - Attack and Defense Strategies

release date: Dec 31, 2019
Cybersecurity - Attack and Defense Strategies
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book Description Cybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is for For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

Windows Server 2012 Security from End to Edge and Beyond

release date: Apr 18, 2013
Windows Server 2012 Security from End to Edge and Beyond
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system Written by two Microsoft employees who provide an inside look at the security features of Windows 8 Test Lab Guides enable you to test everything before deploying live to your system

Deploying Microsoft Forefront Threat Management Gateway 2010

release date: Nov 18, 2010
Deploying Microsoft Forefront Threat Management Gateway 2010
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and intrusion prevention. Led by two members of the Microsoft Forefront team, you'll get pragmatic, inside insights into system components and capabilities; identify software, hardware, and business requirements; and step through essential planning and design considerations, including network topology, remote access, publishing rules, performance, administration, and more.

Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion

release date: Feb 10, 2010
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion
Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion prevention, proxy, caching, filtering Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies Implement remote access and site-to-site VPNs Select and configure clients Monitor and troubleshoot protected systems with Network Monitor 3 and other tools Use scripting to configure systems and automate administration Plus, get a fully searchable eBook on the companion CD For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Microsoft® ForefrontTM Threat Management Gateway (TMG) Administrator's Companion

release date: Feb 05, 2010
Microsoft® ForefrontTM Threat Management Gateway (TMG) Administrator's Companion
Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion prevention, proxy, caching, filtering Configure security for the Web, Microsoft® Exchange Server, and SharePoint® Products and Technologies Implement remote access and site-to-site VPNs Select and configure clients Monitor and troubleshoot protected systems with Network Monitor 3 and other tools Use scripting to configure systems and automate administration Plus, get a fully searchable eBook on the companion CD A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Deploying Microsoft® Forefront® Threat Management Gateway 2010

release date: Oct 21, 2010
Deploying Microsoft® Forefront® Threat Management Gateway 2010
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and intrusion prevention. Led by two members of the Microsoft Forefront team, you'll get pragmatic, inside insights into system components and capabilities; identify software, hardware, and business requirements; and step through essential planning and design considerations, including network topology, remote access, publishing rules, performance, administration, and more.

Microsoft Azure Security Center, First Edition

release date: Jan 01, 2018
Microsoft Azure Security Center, First Edition
Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management; Master a new security paradigm for a world without traditional perimeters; Gain visibility and control to secure compute, network, storage, and application workloads; Incorporate Azure Security Center into your security operations center; Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions; Adapt Azure Security Center's built-in policies and definitions for your organization; Perform security assessments and implement Azure Security Center recommendations; Use incident response features to detect, investigate, and address threats; Create high-fidelity fusion alerts to focus attention on your most urgent security issues; Implement application whitelisting and just-in-time VM access; Monitor user behavior and access, and investigate compromised or misused credentials; Customize and perform operating system security baseline assessments; Leverage integrated threat intelligence to identify known bad actors.

Microsoft Azure Security Center, 2nd Edition

release date: Jan 01, 2019
Microsoft Azure Security Center, 2nd Edition
NOW FULLY UPDATED: high-value Azure Security Center insights, tips, and operational solutions Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key operational scenarios. You'll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident response and risk management. Brand-new coverage includes single-click remediation, IoT, improved container security, Azure Sentinel, and more. Whatever your security role, you'll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Implement a comprehensive new security paradigm designed specifically for cloud and hybrid environments Gain visibility and control to secure all key workloads Incorporate Azure Security Center into your security operations center, and integrate Azure AD Identity Protection Center and third-party solutions Adapt Azure Security Center's built-in policies and definitions for your organization Perform security assessments, and implement Azure Security Center recommendations fast with single-click remediation Use incident response features to detect, investigate, and address threats Create high-fidelity fusion alerts to focus attention on your most urgent security issues Implement application whitelisting and just-in-time VM access Assess IoT device security with the Azure IoT Hub managed service Monitor user behavior and access, and investigate compromised or misused credentials Integrate Microsoft's new Azure Sentinel Security Information and Event Management (SIEM) platform Customize and perform operating system security baseline assessments About This Book For cloud architects, designers, implementers, operations professionals, and security specialists working in Microsoft Azure cloud or hybrid environments For all IT professionals and decision-makers concerned with the security of Azure environments.
19 results found


  • Aboutread.com makes it one-click away to discover great books from local library by linking books/movies to your library catalog search.

  • Copyright © 2022 Aboutread.com