Atjaunināt sīkdatņu piekrišanu

E-grāmata: Exam Ref SC-300 Microsoft Identity and Access Administrator

  • Formāts: 384 pages
  • Sērija : Exam Ref
  • Izdošanas datums: 30-Dec-2022
  • Izdevniecība: Addison Wesley
  • Valoda: eng
  • ISBN-13: 9780137886609
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 33,80 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 384 pages
  • Sērija : Exam Ref
  • Izdošanas datums: 30-Dec-2022
  • Izdevniecība: Addison Wesley
  • Valoda: eng
  • ISBN-13: 9780137886609
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Prepare for Microsoft Exam SC-300 and demonstrate your real-world ability to design, implement, and operate identity and access management systems with Microsoft Azure Active Directory (AD). Designed for professionals involved in secure authentication, access, or identity management, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Identity and Access Administrator Associate level.

Focus on the expertise measured by these objectives:





Implement identities in Azure AD Implement authentication and access management Implement access management for applications Plan and implement identity governance in Azure AD

This Microsoft Exam Ref:





Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes that you are an administrator, security engineer, or other IT professional who provides, or plans to provide, secure identity and access services for an enterprise

About the Exam

Exam SC-300 focuses on the knowledge  needed to configure and manage Azure  AD tenants; create, configure, and manage  Azure AD identities; implement and manage  external identities and hybrid identity; plan,  implement, and manage Azure Multifactor  Authentication (MFA), self-service password reset, Azure AD user authentication, and  Azure AD conditional access; manage Azure AD Identity Protection; implement access management for Azure resources; manage and monitor app access with Microsoft Defender for Cloud Apps; plan, implement, and monitor enterprise app integration; enable app registration; plan and implement entitlement management and privileged access; plan, implement, and manage access reviews; and monitor Azure AD.

About Microsoft Certification

Passing this exam fulfills your requirements for the Microsoft Certified: Identity and Access Administrator Associate certification, demonstrating your abilities to design, implement, and operate identity and access management systems with Azure AD; configure and manage identity authentication and authorization for users, devices, resources, and applications; provide seamless experiences and self-service; verify identities for Zero Trust; automate Azure AD management; troubleshoot and monitor identity and access environments; and collaborate to drive strategic identity projects, modernize identity solutions, and implement hybrid identity and/or identity governance.

See full details at: microsoft.com/learn
Introduction xiii
Organization of this book xiii
Preparing for the exam xiv
Microsoft certifications xiv
Quick access to online references xiv
Errata, updates & book support xv
Stay in touch xv
Chapter 1 Implement identities in Azure AD
1(104)
Skill 1.1 Configure and manage an Azure AD tenant
3(19)
Configure and manage Azure AD roles
3(8)
Configure delegation by using administrative units
11(3)
Analyze Azure AD role permissions
14(2)
Configure and manage custom domains
16(4)
Configure tenant-wide settings
20(2)
Skill 1.2 Create, configure, and manage Azure AD identities
22(18)
Create, configure, and manage users
23(3)
Create, configure, and manage groups
26(7)
Configure and manage device joins and registrations, including writeback
33(4)
Assign, modify, and report on licenses
37(3)
Skill 1.3 Implement and manage external identities
40(16)
Manage external collaboration settings in Azure AD
41(4)
Invite external users, individually or in bulk (collectively)
45(6)
Manage external user accounts in Azure AD
51(3)
Configure identity providers, including SAML and WS-Fed
54(2)
Skill 1.4 Implement and manage hybrid identity
56(46)
Implement and manage Azure Active Directory Connect
57(9)
Implement and manage Azure AD Connect cloud sync
66(8)
Implement and manage Password Hash Synchronization (PHS)
74(3)
Implement and manage Pass-Through Authentication (PTA)
77(4)
Implement and manage Seamless Single Sign-On (Seamless SSO)
81(1)
Implement and manage Federation, excluding manual ADFS deployment
82(9)
Implement and manage Azure AD Connect Health
91(8)
Troubleshoot synchronization errors
99(3)
Chapter Summary
102(1)
Thought Experiment
103(1)
Thought Experiment answers
104(1)
Chapter 2 Implement an authentication and access management solution
105(96)
Skill 2.1 Plan, implement, and manage Azure Multifactor Authentication (MFA) and self-service password reset
106(17)
Plan Azure MFA deployment, excluding MFA Server
106(2)
Configure and deploy self-service password reset
108(7)
Implement and manage Azure MFA settings
115(4)
Manage MFA settings for users
119(3)
Extend Azure AD MFA to third-party and on-premises devices
122(1)
Monitor Azure AD MFA activity
123(1)
Skill 2.2 Plan, implement, and manage Azure AD user authentication
123(24)
Plan for authentication
124(1)
Implement and manage authentication methods
125(7)
Implement and manage Windows Hello for Business
132(3)
Implement and manage password protection and smart lockout
135(9)
Implement certificate-based authentication in Azure AD
144(2)
Configure Azure AD user authentication for Windows and Linux virtual machines on Azure
146(1)
Skill 2.3 Plan, implement, and manage Azure AD conditional access
147(21)
Plan conditional access policies
147(5)
Implement conditional access policy assignments
152(7)
Implement conditional access policy controls
159(2)
Test and troubleshoot conditional access policies
161(4)
Implement session management
165(1)
Implement device-enforcement restrictions
165(2)
Implement continuous access evaluation
167(1)
Create a conditional access policy from a template
167(1)
Skill 2.4 Manage Azure AD Identity Protection
168(22)
Implement and manage a user risk policy
168(4)
Implement and manage sign-in risk policy
172(3)
Implement and manage MFA registration policy
175(1)
Monitor, investigate, and remediate elevated risky users
176(11)
Implement security for workload identities
187(3)
Skill 2.5 Implement access management for Azure resources
190(8)
Assign Azure roles
190(1)
Configure custom Azure roles
191(2)
Create and configure managed identities
193(1)
Use managed identities to access Azure resources
194(1)
Analyze Azure role permissions
195(1)
Configure Azure Key Vault RBAC and policies
196(2)
Chapter Summary
198(1)
Thought Experiment
199(1)
Thought Experiment answers
200(1)
Chapter 3 Implement Access Management for Apps
201(82)
Skill 3.1 Plan, implement, and monitor the integration of Enterprise apps for SSO
202(38)
Discover apps by using Microsoft Defender for Cloud Apps or an ADFS application activity report
202(6)
Design and implement app management roles
208(4)
Understand and plan various built-in roles for application management
212(4)
Configure pre-integrated gallery SaaS apps for SSO and implement access management
216(4)
Integrate custom SaaS apps for SSO
220(5)
Implement Application User Provisioning
225(4)
Integrate on-premises apps by using the Azure AD Application Proxy
229(5)
Monitor and audit access/sign-ons to an Azure AD integrated Enterprise application
234(4)
Implement and configure consent settings
238(2)
Skill 3.2 Implement app registrations
240(21)
Plan your line-of-business application registration strategy
240(4)
Implement application registrations
244(6)
Configure application permissions and implement application authorization
250(11)
Skill 3.3 Manage and monitor application access by using Microsoft Defender for Cloud Apps
261(17)
Implement application-enforced restrictions
261(3)
Configure connectors to apps
264(2)
Deploy Conditional Access App Control for apps using Azure Active Directory
266(4)
Create access and session policies in Microsoft Defender for Cloud Apps
270(5)
Implement and manage policies for OAuth apps
275(3)
Chapter Summary
278(2)
Thought Experiment
280(1)
Thought Experiment answers
281(2)
Chapter 4 Plan and implement an Identity Governance strategy
283(78)
Skill 4.1 Plan and implement entitlement management
284(17)
Plan entitlements
284(2)
Create and configure catalogs
286(2)
Create and configure access packages
288(5)
Manage access requests
293(2)
Implement and manage Terms of Use
295(2)
Manage the lifecycle of external users in Azure AD Identity Governance settings
297(1)
Configure and manage connected organizations
298(1)
Review per-user entitlement by using Azure AD entitlement management
299(1)
Configure separation of duties checks for an access package
300(1)
Skill 4.2 Plan, implement, and manage access reviews
301(19)
Plan for access reviews
302(4)
Create and configure access reviews for groups and apps
306(5)
Create and configure access reviews for access packages
311(2)
Create and configure access reviews for Azure AD and Azure resource roles
313(1)
Create and configure access review programs
314(1)
Monitor access review activity
315(3)
Manage licenses for access reviews
318(1)
Respond to access review activity, including automated and manual responses
319(1)
Skill 4.3 Plan and implement privileged access
320(15)
Plan and manage Azure roles in Privileged Identity Management (PIM), including settings and assignments
320(8)
Plan and manage Azure resources in PIM, including settings and assignments
328(1)
Plan and configure privileged access groups
329(1)
Analyze PIM audit history and reports
330(4)
Create and manage break-glass accounts
334(1)
Skill 4.4 Monitor Azure AD
335(23)
Design a strategy for monitoring Azure AD
336(1)
Review and analyze sign-in, audit, and provisioning logs by using the Azure AD admin center
336(9)
Configure diagnostic settings, including Log Analytics, storage accounts, and Event Hub
345(2)
Export sign-in and audit logs to a third-party SIEM
347(1)
Monitor Azure AD by using Log Analytics, including KQL queries
348(4)
Analyze Azure AD by using workbooks and reporting in the Azure Active Directory admin center
352(4)
Configure notifications
356(1)
Monitor and improve the security posture by using the Identity Secure Score
357(1)
Chapter Summary
358(1)
Thought Experiment
359(1)
Thought Experiment answers
360(1)
Index 361
RAZI RAIS has over two decades of experience designing and developing highly scalable and secure enterprise software and cloud services. He has been working at Microsoft for over ten years, serving in various roles such as software engineer, architect, and product manager. His current focus at Microsoft is on helping businesses strengthen their cybersecurity posture by protecting workloads at scale against the most sophisticated cyberattacks. Razi is also the lead author of several books, including Zero Trust Networks, 2nd Edition by O'Reilly Media and Programming Microsoft's Clouds: Windows Azure and Office 365 by Wrox Press. He is also a member of the IEEE Computer Society, ACM, SANS advisory board, as well as a frequent speaker at international conferences and an instructor who provides security-related training all over the world. You can get in touch with him via LinkedIn at linkedin.com/in/razirais or through his website, razibinrais.com. His GitHub profile is github.com/razi-rais.

ILYA LUSHNIKOV is a Senior Product Manager in the Identity and Network Access division at Microsoft, where he works on new Azure AD features. Ilya has been working for Microsoft since 2010 in various positions, including six years as a Premier Field Engineer. He delivered Identity workshops, deployment projects, risk assessments, and health checks for customers in 10 countries and 25 U.S. states. Before joining Microsoft, he was a systems administrator for various companies.

JEEVAN BISHT has a Master of Science degree in computer science and is Principal PM Manager in the Microsoft Identity and Network Access division, where he leads a team of deep technical experts around the world to help enterprise customers plan and deploy their hybrid cloud identity strategies. Jeevan has been working for Microsoft since 2005 in different positions including being a senior support escalation engineer in CSS, Microsoft Consulting, helping design and implement some of the largest implementations on Identity and Management solutions across industry verticals. He has been a Microsoft Certified Professional since 1999 among other industry certifications from Cisco, Sun, and others, and has delivered training on various platforms. He has also been featured in conferences like Microsoft Ready, TechMentor, Identiverse, and many others. He is open to helping professionals grow: linkedin.com/in/ jeevan-bisht-a2a2634b/.

PADMA CHILAKAPATI is a Senior Product Manager in the Microsoft Identity and Network Access division. She acts as a trusted advisor to Fortune 500 enterprises in the Identity and Security space. She held multiple positions as an engineer and later program manager. She delivered Identity workshops and has spoken about Azure AD features and security recommendations at various conferences.

VINAYAK SHENOY is a Senior Product Manager focused on Microsoft Identity Security. As an engineer and later as product manager, he has more than a decade of experience across Identity/ Access Management, wired/wireless networking, security, SDN, and datacenter/cloud provisioning.