Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Microsoft Unified XDR and SIEM Solution Handbook
Microsoft Unified XDR and SIEM Solution Handbook

Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security

Arrow left icon
Profile Icon Raghu Boddu Profile Icon Lamppu
Arrow right icon
$19.99 per month
Full star icon Full star icon Full star icon Full star icon Half star icon 4.4 (9 Ratings)
Paperback Feb 2024 296 pages 1st Edition
eBook
$9.99 $39.99
Paperback
$49.99
Subscription
Free Trial
Renews at $19.99p/m
Arrow left icon
Profile Icon Raghu Boddu Profile Icon Lamppu
Arrow right icon
$19.99 per month
Full star icon Full star icon Full star icon Full star icon Half star icon 4.4 (9 Ratings)
Paperback Feb 2024 296 pages 1st Edition
eBook
$9.99 $39.99
Paperback
$49.99
Subscription
Free Trial
Renews at $19.99p/m
eBook
$9.99 $39.99
Paperback
$49.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Microsoft Unified XDR and SIEM Solution Handbook

Case Study – High Tech Rapid Solutions Corporation

In this book we will consider a scenario of driving digital transformation and security enhancement at High Tech Rapid Solutions Corp (a fictional company name we will use throughout this book).

Introduction

High Tech Rapid Solutions Corp, a global leader in manufacturing and distribution, has 60,000 employees spread across multiple office locations on three continents. The company management understands the need to modernize their security operations, leverage modern cloud-based technologies, and enhance current security measures. Before the COVID-19 pandemic, they had a more traditional approach and had been less attracted toward remote work. However, the COVID-19 pandemic forced the company to quickly adapt remote work practices, leading to major improvements needs in the company security practices and technologies. This new situation led to a reevaluation of High Tech Rapid Solutions Corp security measures, prompting the organization to consideration of a security monitoring strategy and architecture to address their security needs and tackle the challenges caused by their siloed architecture.

Alongside the security landscape changes, High Tech Rapid Solutions Corp faces challenges in driving its new technology initiatives. The adoption of modern cloud-based technologies requires careful planning, time, dedicated resources, and a workforce equipped with the necessary skills. The organization understands how important it is to find new and retaining existing professionals who can effectively implement and manage their planned transformation initiatives. The company does manage its Security Operations Center (SOC) by itself and does not leverage any service provider's managed services in this area, even though it has been under consideration.

Furthermore, the pandemic presented unique challenges to High Tech Rapid Solutions Corp, accelerating the need for a cloud-first strategy. The company appointed a new Chief Information Security Officer (CISO) to the management team in order to guarantee the secure adoption of modern cloud-based technologies. CISO, who provides extensive experience in the cloud security domain, plays a key role in supporting the company's strategy, security teams, and business to maintain security as the top priority.

The current environment

High Tech Rapid Solutions Corp operates in a dynamic environment, characterized by diverse technologies and platforms. The key aspects of its current environment are as follows.

A cloud environment

Currently the company is operating in a multi-cloud environment, leveraging both Azure and AWS for its cloud infrastructure and business needs. This strategic adoption allows the company to benefit from the unique security features and capabilities offered by each cloud provider, while ensuring strong data protection across its operations.

A hybrid cloud architecture

Currently the company maintains a hybrid cloud architecture, combining on-premises infrastructure with cloud resources. This approach enables this company to maximize security controls and compliance requirements, while capitalizing on the scalability, agility, and cost-effectiveness of the cloud.

User entities

They have a hybrid identity architecture in place that allows seamless authentication and authorization for employees, granting them secure access to resources and applications across the hybrid cloud environment.

Collaboration with partners

High Tech Rapid Solutions Corp collaborates with external partners to drive business growth and innovation. To establish secure collaboration, the company extends its identity management capabilities to partners by leveraging Entra ID External ID (former Azure Active Directory) B2B collaboration and cross-tenant capabilities, enabling partners to access specific resources and collaborate within designated workflows.

End user devices

High Tech Rapid Solutions Corp operates in a diverse device landscape that supports both Windows and macOS platforms. The following aspects outline the current device environment:

  • Windows devices: Windows devices form the majority of the organization’s device ecosystem. Approximately 80% of the devices within the organization run on Windows operating systems.
  • macOS devices: The company recognizes the need to take care user preferences and are having macOS devices in its device catalog as well These devices, comprising approximately 20% of the overall device inventory, are equipped with security features and management tools to maintain consistent security standards across platforms.
  • Mobile phones: The company operates on diverse platforms such as iOS and Android.

Server infrastructure

High Tech Rapid Solutions Corp maintains a diverse server infrastructure to support its operations. The server landscape includes a mix of Windows and Linux servers, with the majority being Windows-based.

An application landscape

High Tech Rapid Solutions Corp’s applications are distributed across both on-premises and cloud environments. While legacy applications may still reside on-premises, they prefer modern technologies and cloud-native architectures for new application development, incorporating strong security measures to protect sensitive data and protect against cyber threats.

An IoT/OT environment

In the company’s IoT/OT environment, Internet of Things (IoT) devices are integrated with traditional Operational Technology (OT) to optimize operations. Interconnected sensors and machines collect real-time data from production to supply chain, feeding into centralized analytics for quick decision-making. The main challenge with IoT/OT environment is that it is lacking proper security monitoring and visibility to the environment from monitoring point if view is limited.

Security challenges

High Tech Rapid Solutions Corp has identified the following security-related challenges for their multi-cloud environment:

  • Siloed security architecture: High Tech Rapid Solutions Corp’s existing security infrastructure consists of disparate products that operate in isolation, resulting in limited visibility, missing threat intelligence, and inefficient incident response capabilities.
  • Incomplete security insights: The lack of centralized security monitoring and analytics hinders the ability to correlate and analyze security events, making it difficult to identify security threats and vulnerabilities promptly.
  • Inefficient threat response: The absence of a unified security platform and standardized processes undermines the effectiveness and agility of High Tech Rapid Solutions Corp’s incident response, leading to delays in containing and mitigating security incidents. Currently, they use a legacy Security and Information Management System (SIEM) and is keen to modernize SIEM with a cloud-based solution.
  • Regulatory compliance: High Tech Rapid Solutions Corp must adhere to industry-specific regulations and compliance frameworks. Ensuring continuous compliance with standards presents challenges in terms of data protection, access controls, and security audits.

Management concerns

Management is especially concerned about the following specific areas and several possible attack scenarios, based on the history they have had with breaches:

  • Lack of visibility and control in an IoT/OT environment: High Tech Rapid Solutions Corp’s IoT/OT environment includes a wide range of devices and systems with varying security controls. This lack of standardized visibility and control makes the environment difficult to monitor and they are lacking of managing potential security vulnerabilities and incidents effectively.
  • Lack of visibility on internet-exposed digital assets: High Tech Rapid Solutions Corp doesn’t have a clear understanding of its digital assets that are reachable from the internet, as well as the possible weak configurations on them. Their digital assets includes domains, subdomains, web applications, cloud services, APIs, and IoT devices. The compliance and regulatory requirements that the organization must adhere to in different regions and industries mandate strict security standards and best practices, protecting customer data and intellectual property.
  • A Threat Intelligence (TI) data (feed) does not exist: High Tech Rapid Solutions Corp’s security teams don’t have TI data available, which can lead to a situation where they don’t have full visibility of potential attack vectors, and they are incapable of prioritizing the most critical threats and vulnerabilities. In addition, the company wasting valuable time and resources on false positives and irrelevant alerts, often missing key indicators of compromise and early warning signs of breaches. As it struggles to keep up with constantly developing security threats, High Tech Rapid Solutions Corp risks losing reputation, customer trust, and revenue due to data breaches and downtime.

Challenges emphasized by security teams

High Tech Rapid Solutions Corp’s security team raised some concerns and challenges that they faced during the last year:

  • The finance department noticed some suspicious activities in their mailboxes, the creation of suspicious mail rules, and a few confidential emails leaking outside their department.
  • The SOC team noticed many incidents, and they are confident that handling certain vulnerabilities would fix these incidents and reduce the number of incidents/alerts, but they struggling to gain visibility on the vulnerabilities.
  • The SOC team has limited resources, which leads to triage, investigation, and remediation challenges, and these delays cause escalations to senior management (i.e., lack of auto-remediation and mitigations).
  • The SOC team spends long hours fulfilling management ad hoc reporting needs.
  • Management is concerned about the SOC team’s inability to promptly address vulnerabilities and misconfigurations, which is attributed to the absence of a defined process and a dedicated vulnerability management team.
  • The HR department raised concerns to the security team about unauthorized users accessing their apps or servers.
  • Management initiated cost reduction strategies across the organization and allocated limited funds to the security team, asking them to reduce their cost, reduce the headcount, and submit Return on Investment (ROI) for any proposals, while simultaneously enhancing their security.
  • The existing security team is not ready to adopt new technologies and needs training and guidance for new initiatives.
  • The security team noticed too many users responding to spam messages and noticed URL clicks, and management asked the team to control these activities and train end users.
  • Management asked the security team to keep an extra eye on certain assets, as well as terminate employees and contractors/vendors.
  • The security team noticed too many false positives and spent a lot of time addressing these.
  • The SecOps team struggles to track apps in the organization and control them.
  • The SecOps team don’t have enough knowledge about the Entra ID application consent framework and on how new and existing application registrations and permissions should be evaluated.
  • The SOC team doesn’t have active security monitoring for on-premises identities.
  • The SecOps team doesn’t have active security posture management for their cloud or on-premises resources
  • High Tech Rapid Solutions Corp operations runs in three different continents, and some employees travel between office locations, factories, and so on. For the SOC team, it’s complicated to identify false/positive and true/positive logins with the current security monitoring solutions.
  • In a multi-cloud environment, High Tech Rapid Solutions Corp has been struggling to deploy agents on all servers.
  • High Tech Rapid Solutions Corp’s SecOps team has been failing to identify possible attack paths to cloud resources.

Concerns raised by CISO

The following are the concerns raised by the CISO:

  • Attacks on M365 collaboration workloads (BEC): As High Tech Rapid Solutions Corp extensively use various collaboration tools, such as Microsoft Teams and SharePoint Online, it needs to address potential data leaks, phishing attempts, and other security risks associated with cloud-based collaboration. Additionally, the organization is concerned about the growing threat of Business Email Compromise (BEC) attacks, where cybercriminals target employees through email communications to compromise sensitive data, initiate fraudulent financial transactions, or gain unauthorized access to company resources. Mitigating the risks posed by BEC attacks has become one of the top priorities for the company, as these attacks can lead to severe financial and reputational consequences.
  • Ransomware attacks: High Tech Rapid Solutions Corp is increasingly concerned about the rising threat of ransomware attacks. The potential impact of a successful ransomware attack on its critical data and operations is a major risk. The organization seeks robust security measures and proactive incident response capabilities to prevent, detect, and respond effectively to ransomware incidents. Ransomware attacks, combined with the potential threat of BEC attacks, have emphasized the need for a comprehensive and layered security approach. High Tech Rapid Solutions Corp aims to implement advanced threat detection and prevention solutions, conduct regular security awareness training for employees, and enforce strict access controls to minimize the risk of ransomware and BEC attacks.

A recent incident response case

The company faced a targeted BEC attack six months ago that had a financial impact on business, and they want to detect and prevent similar attacks from happening in the future.

The BEC attack on High Tech Rapid Solutions Corp contained the following phases:

  • Initial reconnaissance:

    The attacker gained information about the company and identified key personnel through company’s websites and LinkedIn.

  • A phishing email:

    The attacker needed credentials to get access to the environment, and one of the most common ways is to do so is by some form of phishing email. On this occasion, they used a spearphishing attachment (T1566.001 in MITRE ATT&CK https://packt.link/eOJcm) that included a malicious attachment. By clicking the link, the user believed that they were logging into a Microsoft sign-in page and entered their credentials.

  • Persistence and exfiltration:

    After gaining access to the target user’s mailbox, the attacker created a forwarding rule to the mailbox for data exfiltration.

  • Financial fraud:

    The actual victim of this attack was a procurement manager who believed that the email (marked as Important and Confidential) urging for immediate payment came from CFO.

  • Impact:

    As a result of the successful BEC attack, the following occurred:

    • The financial team transferred a significant sum of money to the attacker’s account, thinking it was a legitimate payment.
    • The real vendor who should have received this payment but did not receive it, contacted the company to inquire about the overdue invoice.
    • The financial team realized it had been scammed, but it was too late to recover the funds, as they had already been transferred to an overseas account.
    • The company suffered a financial loss, damage to its reputation, and potential legal consequences for failing to secure sensitive financial transactions.

To prevent such attacks in the future, the company is committed to strengthening its security environment security posture, focusing on implementing robust email security measures, employee training, and verification protocols for financial transactions.

Summary

This case study will be explored throughout the book in the different chapters, focusing on how High Tech Rapid Solutions Corp can benefit from leveraging Microsoft’s unified XDR and SIEM solution to address security challenges.

Left arrow icon Right arrow icon

Key benefits

  • Learn how to leverage Microsoft's XDR and SIEM for long-term resilience
  • Explore ways to elevate your security posture using Microsoft Defender tools such as MDI, MDE, MDO, MDA, and MDC
  • Discover strategies for proactive threat hunting and rapid incident response
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

Tired of dealing with fragmented security tools and navigating endless threat escalations? Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution. This comprehensive guide offers an actionable roadmap to implementing, managing, and leveraging the full potential of the powerful unified XDR + SIEM solution, starting with an overview of Zero Trust principles and the necessity of XDR + SIEM solutions in modern cybersecurity. From understanding concepts like EDR, MDR, and NDR and the benefits of the unified XDR + SIEM solution for SOC modernization to threat scenarios and response, you’ll gain real-world insights and strategies for addressing security vulnerabilities. Additionally, the book will show you how to enhance Secure Score, outline implementation strategies and best practices, and emphasize the value of managed XDR and SIEM solutions. That’s not all; you’ll also find resources for staying updated in the dynamic cybersecurity landscape. By the end of this insightful guide, you'll have a comprehensive understanding of XDR, SIEM, and Microsoft's unified solution to elevate your overall security posture and protect your organization more effectively.

Who is this book for?

This comprehensive guide is your key to unlocking the power of Microsoft's unified XDR and SIEM offering. Whether you're a cybersecurity pro, incident responder, SOC analyst, or simply curious about these technologies, this book has you covered. CISOs, IT leaders, and security professionals will gain actionable insights to evaluate and optimize their security architecture with Microsoft's integrated solution. This book will also assist modernization-minded organizations to maximize existing licenses for a more robust security posture.

What you will learn

  • Optimize your security posture by mastering Microsoft's robust and unified solution
  • Understand the synergy between Microsoft Defender's integrated tools and Sentinel SIEM and SOAR
  • Explore practical use cases and case studies to improve your security posture
  • See how Microsoft's XDR and SIEM proactively disrupt attacks, with examples
  • Implement XDR and SIEM, incorporating assessments and best practices
  • Discover the benefits of managed XDR and SOC services for enhanced protection

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Feb 29, 2024
Length: 296 pages
Edition : 1st
Language : English
ISBN-13 : 9781835086858
Vendor :
Microsoft
Category :
Concepts :

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Feb 29, 2024
Length: 296 pages
Edition : 1st
Language : English
ISBN-13 : 9781835086858
Vendor :
Microsoft
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 149.97
Mastering Microsoft Intune
$54.99
Microsoft Intune Cookbook
$44.99
Microsoft Unified XDR and SIEM Solution Handbook
$49.99
Total $ 149.97 Stars icon
Banner background image

Table of Contents

16 Chapters
Case Study – High Tech Rapid Solutions Corporation Chevron down icon Chevron up icon
Part 1 – Zero Trust, XDR, and SIEM Basics and Unlocking Microsoft’s XDR and SIEM Solution Chevron down icon Chevron up icon
Chapter 1: Introduction to Zero Trust Chevron down icon Chevron up icon
Chapter 2: Introduction to XDR and SIEM Chevron down icon Chevron up icon
Chapter 3: Microsoft’s Unified XDR and SIEM Solution Chevron down icon Chevron up icon
Part 2 – Microsoft’s Unified Approach to Threat Detection and Response Chevron down icon Chevron up icon
Chapter 4: Power of Investigation with Microsoft Unified XDR and SIEM Solution Chevron down icon Chevron up icon
Chapter 5: Defend Attacks with Microsoft XDR and SIEM Chevron down icon Chevron up icon
Chapter 6: Security Misconfigurations and Vulnerability Management Chevron down icon Chevron up icon
Chapter 7: Understanding Microsoft Secure Score Chevron down icon Chevron up icon
Part 3 – Mastering Microsoft’s Unified XDR and SIEM Solution – Strategies, Roadmap, and the Basics of Managed Solutions Chevron down icon Chevron up icon
Chapter 8: Microsoft XDR and SIEM Implementation Strategy, Approach, and Roadmap Chevron down icon Chevron up icon
Chapter 9: Managed XDR and SIEM Services Chevron down icon Chevron up icon
Chapter 10: Useful Resources Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.4
(9 Ratings)
5 star 77.8%
4 star 11.1%
3 star 0%
2 star 0%
1 star 11.1%
Filter icon Filter
Top Reviews

Filter reviews by




CARLOS LOPEZ Jul 11, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If you're looking to elevate your security architecture and gain a deep understanding of Microsoft’s unified XDR and SIEM solution, this book is an absolute must-read. It expertly demystifies the basics and importance of Zero Trust, XDR, and SIEM while diving deep into the powerful capabilities, holistic benefits, and real-world use cases of Microsoft’s integrated solution.The book is structured to guide you through the key concepts, including Microsoft Defender tools like MDI, MDO, MDE, MDA, MDC, and Microsoft Sentinel. By the end, you’ll be well-equipped to understand and utilize Microsoft’s unified approach, breaking down silos and strengthening your defenses effectively.One of the standout features of this book is its practical focus. With detailed explanations and case-study-based learning, you will grasp how these technologies auto-disrupt attacks and how to adopt them seamlessly into your organization. The book is perfect for CISOs, IT executives, cloud security architects, and anyone dealing with fragmented security solutions. It’s also invaluable for aspiring SOC analysts and Microsoft Security enthusiasts.In today's remote work world, where many organizations are struggling with a patchwork of security tools, this guide proves to be a treasure trove of insights. Whether you’re a major player or an early adopter, you'll find that this book helps you enhance your ROI and build a robust, unified security architecture with confidence.A must-have for anyone serious about improving their security posture with Microsoft's advanced solutions.
Amazon Verified review Amazon
Tommi Hovi Aug 20, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I really liked the approach of having a imaginary company with a certain goals and situation. It made the examples more vivid and made me also think about possible solutions beforehand. I've read a bunch of technical books and this one goes to the top tier. It cover surprisingly vast area for 250 pages and explains terminology and concepts really well. It's a must read handbook for any Microsoft security specialist using XDR, SIEM or watching over cloud or hybrid security!
Amazon Verified review Amazon
Arm Apr 22, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I have spend some time going through the book, the subjects, screenshot, and test cases covered in the book are amazing. The content is well thought and it has helped me in my career path as a Microsoft Defender Architect. Thank you for bringing this book to the community!
Amazon Verified review Amazon
Jessie May 30, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I’ve spent years in systems engineering and recently started exploring cybersecurity, especially with Microsoft products. “Microsoft Unified XDR and SIEM Solution Handbook” has been an eye-opener in this new journey.This book offers a practical roadmap for using Microsoft’s unified XDR and SIEM solution. It begins with essential concepts like Zero Trust and the importance of XDR and SIEM in today’s cybersecurity landscape. It covers everything from EDR, MDR, and NDR to how these tools can modernize your Security Operations Center (SOC).The real-world insights, threat scenarios, and response strategies are incredibly useful. The book’s sections on boosting Secure Score, implementation tips, and the value of managed XDR and SIEM solutions are especially helpful. I appreciate the practical examples and case studies that make complex ideas easier to grasp.I’m still reading and learning, but so far, the knowledge I’ve gained is invaluable. For CISOs, IT leaders, security pros, or anyone curious about cybersecurity, this book provides actionable insights to optimize your security setup with Microsoft’s tools. If you’re looking to modernize your security operations and make the most of your existing licenses, this book is a must-read. Highly recommended!
Amazon Verified review Amazon
Raymond Apr 07, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is perfect in so many ways to me. The authors use an illustrativer case study as a foundation for their illustrations of modernizing a business into more secure solutions. Zero Trust and an overview of SIEM basics and function are covered prior to introduction of XDR and SIEM solution. Microsofts unified approach to Threat Detection and Response , utilizing XDR to defend and utilizinf Microsoft XDR and SIEM for investigations and Incident response. This is excellent as a learning resource as well as a great refence resource in any SOC utilizing Microsofts XDR/SIEM.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.