Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Azure Security Center for monitoring and analytics


In this section, we'll explore the Azure Security Center's capabilities for monitoring our identity and access-management infrastructure. With the Azure Security Center, you're able to understand the security state across your on-premises environments and cloud workloads. New Azure resources will be automatically discovered and on-boarded and you can apply security policies across your complete hybrid environment to ensure compliance with actual security standards. The service also provides the collection, search, and analysis of several sources, including third-party solutions and firewalls. Furthermore, we can find threats with advanced analysis mechanisms and are able to respond and recover from incidents because of the provided real-time security alerts. The export of your security events into an SIEM solution for further analysis is possible. The service integrates many new threat-detection parts, such as behavioral profiling, machine...