Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Azure Architecture Explained
  • Table Of Contents Toc
Azure Architecture Explained

Azure Architecture Explained

By : David Rendón, Brett Hargreaves
4 (6)
close
close
Azure Architecture Explained

Azure Architecture Explained

4 (6)
By: David Rendón, Brett Hargreaves

Overview of this book

Azure is a sophisticated technology that requires a detailed understanding to reap its full potential and employ its advanced features. This book provides you with a clear path to designing optimal cloud-based solutions in Azure, by delving into the platform's intricacies. You’ll begin by understanding the effective and efficient security management and operation techniques in Azure to implement the appropriate configurations in Microsoft Entra ID. Next, you’ll explore how to modernize your applications for the cloud, examining the different computation and storage options, as well as using Azure data solutions to help migrate and monitor workloads. You’ll also find out how to build your solutions, including containers, networking components, security principles, governance, and advanced observability. With practical examples and step-by-step instructions, you’ll be empowered to work on infrastructure-as-code to effectively deploy and manage resources in your environment. By the end of this book, you’ll be well-equipped to navigate the world of cloud computing confidently.
Table of Contents (20 chapters)
close
close
1
Part 1 – Effective and Efficient Security Management and Operations in Azure
5
Part 2 – Architecting Compute and Network Solutions
12
Part 3 – Making the Most of Infrastructure-as-Code for Azure

Using Microsoft Sentinel to Mitigate Lateral Movement Paths

This chapter explains Microsoft Sentinel’s capabilities to detect and investigate advanced security threats, compromised identities, and potentially malicious actions in our organization.

Lateral movement is a technique used by cyber attackers to move across a network once they have gained access to one device. Microsoft Sentinel is a tool that helps to detect and respond to cyber threats.

In this chapter, we will review how organizations can identify suspicious activity and prevent lateral movement by setting up alerts and automated responses to potential threats using Microsoft Sentinel, helping to protect a network from cyberattacks and keep sensitive information safe.

By using Microsoft Sentinel to mitigate lateral movement paths, you can detect and prevent attackers from moving from one device to another within a network. This is important because once an attacker gains access to one device, they can use...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Azure Architecture Explained
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon