Cover art for Microsoft Azure Security Center
Published
Microsoft Press, July 2018
ISBN
9781509307036
Format
Softcover, 192 pages
Dimensions
23cm × 19cm × 1cm

Microsoft Azure Security Center

Not in stock
Fast $7.95 flat-rate shipping!
Only pay $7.95 per order within Australia, including end-to-end parcel tracking.
100% encrypted and secure
We adhere to industry best practice and never store credit card details.
Talk to real people
Contact us seven days a week – our staff are here to help.

This book presents comprehensive Azure Security Center etechniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Centre's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios.

You'll learn how to secure any Azure workload, and optimise virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible.

Two of Microsoft's leading cloud security experts show how to:

Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management

Master a new security paradigm for a world without traditional perimeters

Gain visibility and control to secure compute, network, storage, and application workloads

Incorporate Azure Security Centre into your security operations centre

Integrate Azure Security Centre with Azure AD Identity Protection Centre and third-party solutions

Adapt Azure Security Centre's built-in policies and definitions for your organisation

Perform security assessments and implement Azure Security Centre recommendations

Use incident response features to detect, investigate, and address threats

Create high-fidelity fusion alerts to focus attention on your most urgent security issues

Implement application whitelisting and just-in-time VM access

Monitor user behaviour and access, and investigate compromised or misused credentials

Customise and perform operating system security baseline assessments

Related books