Table of Contents
Preface
Part 1 – Introduction and Basic Configuration
1
The Security Wild West
The cyber threat landscape – how do others get attacked?
Cyber threats and their evolution
The role of emerging technologies
The human factor
Common attack vectors related to Office 365
Email-based attacks
Credential theft
Third-party integrations
Cloud-based attacks
Malicious insiders
Office productivity tool deployments – how do others deploy?
Components of Microsoft 365
Microsoft 365 cloud architecture
Microsoft Defender – a primer
Overview of the Microsoft Defender ecosystem
Holistic approach to security and Zero Trust
Protecting your productivity tools
EOP components
Licensing for EOP
Defender for Office 365 – why not just stay with EOP?
Understanding ...
Get Mastering Microsoft Defender for Office 365 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.