Book Image

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

By : Dwayne Natwick
Book Image

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

By: Dwayne Natwick

Overview of this book

Cloud technologies have made building a defense-in-depth security strategy of paramount importance. Without proper planning and discipline in deploying the security posture across Microsoft 365 and Azure, you are compromising your infrastructure and data. Microsoft Security, Compliance, and Identity Fundamentals is a comprehensive guide that covers all of the exam objectives for the SC-900 exam while walking you through the core security services available for Microsoft 365 and Azure. This book starts by simplifying the concepts of security, compliance, and identity before helping you get to grips with Azure Active Directory, covering the capabilities of Microsoft’s identity and access management (IAM) solutions. You'll then advance to compliance center, information protection, and governance in Microsoft 365. You'll find out all you need to know about the services available within Azure and Microsoft 365 for building a defense-in-depth security posture, and finally become familiar with Microsoft's compliance monitoring capabilities. By the end of the book, you'll have gained the knowledge you need to take the SC-900 certification exam and implement solutions in real-life scenarios.
Table of Contents (24 chapters)
1
Section 1: Exam Overview
3
Section 2: The Key Concepts of Security, Compliance, and Identity
7
Section 3: The Microsoft Identity Management Solutions
11
Section 4: The Microsoft Security Solutions for Microsoft 365 and Azure
17
Section 5: The Microsoft Compliance Monitoring Capabilities within Microsoft 365 and Azure

The Core eDiscovery workflow

In the first section of this chapter, you learned about insider risk management and the workflow of an insider risk case. Similar to an insider risk case, where we want to triage and investigate activity that may create a legal issue for your company, eDiscovery is used to gather evidence that will possibly be used in a legal case against a user or users within your company. When an eDiscovery case is created, the activity of that user across Microsoft 365 services is suspended and documented so that it can be held for legal investigations. Note that when an eDiscovery case is created, the documents have a 24-hour delay in terms of being legally held. Therefore, you should not make the user or users aware that they are under any type of investigation to avoid loss of evidence. As a company, you should already have tools in place, such as insider risk management, to monitor and detect this malicious activity.

For an additional overview of eDiscovery...