Inicio > > Seguridad informática > Ultimate Microsoft XDR for Full Spectrum Cyber Defence
Ultimate Microsoft XDR for Full Spectrum Cyber Defence

Ultimate Microsoft XDR for Full Spectrum Cyber Defence

Ian David Hanley

55,73 €
IVA incluido
Disponible
Editorial:
Orange Education Pvt Ltd
Año de edición:
2025
Materia
Seguridad informática
ISBN:
9789349888715
55,73 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Unify Your Cyber Defense, Hunt Smarter and Respond Faster with Microsoft XDR!Key Features● Learn every component of the Defender suite, Entra ID, and Microsoft Sentinel, from fundamentals to advanced automation.● Build real-world detections, hunt threats, and automate response with guided labs and step-by-step workflows.● Master KQL query design, cross-platform signal correlation, and threat-informed defense strategies.● Design, deploy, and manage a mature, unified XDR strategy for organizations of any size.Book DescriptionExtended Detection and Response (XDR) is essential for unifying security signals, accelerating investigations, and stopping attacks, before they spread. This book, Ultimate Microsoft XDR for Full Spectrum Cyber Defence shows you how to harness Microsoft’s powerful XDR stack to protect identities, endpoints, cloud workloads, and collaboration platforms.You will progress from mastering the core Defender products and Entra ID security features to unlocking Microsoft Sentinel’s SIEM and SOAR capabilities. Along the way, you will also build high-fidelity detections with KQL, automate responses with playbooks, and apply Zero Trust principles to secure modern, hybrid environments. Each chapter combines real-world scenarios with step-by-step guidance, so that you can confidently operationalize Microsoft XDR in your own organization.Hence, whether you are a security analyst, architect, SOC leader, or MSSP team, this guide equips you to design, deploy, and scale a unified detection and response strategy-reducing complexity, improving visibility, and neutralizing threats at machine speed.Thus, build a security operation that is proactive, resilient, and Microsoft-native.What you will learn● Design and deploy Microsoft XDR across cloud and hybrid environments.● Detects threats, using Defender tools and cross-platform signal correlation.● Write optimized KQL queries for threat hunting and cost control.● Automate incident response, using Sentinel SOAR playbooks and Logic Apps.● Secure identities, endpoints, and SaaS apps with Zero Trust principles.● Operationalize your SOC with real-world Microsoft security use cases.Table of Contents1. Understanding Microsoft XDR2. Defender for Endpoint3. Defender for Identity4. Defender for Cloud Apps5. Defender for Office 3656. Entra ID Security7. Introduction to Microsoft Sentinel8. Microsoft Sentinel SIEM Capabilities9. Microsoft Sentinel SOAR Capabilities10. Efficient KQL Query Design and Optimization11. Hands-On Lab Setup12. Building and Operating a Mature Unified XDR Strategy IndexAbout the AuthorsIan David Hanley is a seasoned Cybersecurity Architect, and the founder of Hanley Cloud Solutions. With a career dedicated to helping organizations - from ambitious startups to established Fortune 500 enterprises - secure their Microsoft cloud environments, Ian brings a pragmatic, results-driven approach to modern security challenges. His expertise spans Zero Trust architecture, SIEM/SOAR implementation, threat-informed defense, and enterprise-scale cloud security strategy. If it involves the Microsoft security stack, Ian has likely architected, automated, or optimized it.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    75,87 €

  • The GPT-4 Crypto Revolution
    Zane Wilder
    Discover the power of AI in the crypto world, from Bitcoin’s disruptive emergence to GPT-4’s cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your crypto journey. AI Insights: Unravel market trends using GPT-4’s accurate predictions.Strategy Development: Forge robust strategies...
    Disponible

    20,26 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    294,49 €