Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

You're reading from   Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Arrow left icon
Product type Paperback
Published in May 2022
Last Updated in May 2022
Publisher Packt
ISBN-13 9781801815994
Length 404 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Dwayne Natwick Dwayne Natwick
Author Profile Icon Dwayne Natwick
Dwayne Natwick
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Section 1: Exam Overview
2. Chapter 1: Preparing for Your Microsoft Exam FREE CHAPTER 3. Section 2: The Key Concepts of Security, Compliance, and Identity
4. Chapter 2: Describing Security Methodologies 5. Chapter 3: Understanding Key Security Concepts 6. Chapter 4: Key Microsoft Security and Compliance Principles 7. Section 3: The Microsoft Identity Management Solutions
8. Chapter 5: Defining Identity Principles/Concepts and the Identity Services within Azure AD 9. Chapter 6: Describing the Authentication and Access Management Capabilities of Azure AD 10. Chapter 7: Describing the Identity Protection and Governance Capabilities of Azure AD 11. Section 4: The Microsoft Security Solutions for Microsoft 365 and Azure
12. Chapter 8: Describing Basic Security Services and Management Capabilities in Azure 13. Chapter 9: Describing Security Management and Capabilities of Azure 14. Chapter 10: Describing Threat Protection with Microsoft 365 Defender 15. Chapter 11: Describing the Security Capabilities of Microsoft Sentinel 16. Chapter 12: Describing Security Management and the Endpoint Security Capabilities of Microsoft 365 17. Section 5: The Microsoft Compliance Monitoring Capabilities within Microsoft 365 and Azure
18. Chapter 13: Compliance Management Capabilities in Microsoft 19. Chapter 14: Describing Information Protection and Governance Capabilities of Microsoft 365 20. Chapter 15: Describing Insider Risk, eDiscovery, and Audit Capabilities in Microsoft 365 21. Chapter 16: Describing Resource Governance Capabilities in Azure 22. Chapter 17: Final Assessment/ Mock Exam 23. Other Books You May Enjoy

Describe secure remote management of virtual machines

The previous sections have discussed how to segment and protect traffic that is inbound and outbound on your Azure network. Since you are now using resources on Azure and not on-premises, you need to consider how to manage your virtual machines securely without leaving them open to attacks. Typically, you are managing either a Linux virtual machine on SSH port 22 or a Windows virtual machine on RDP port 3389. Attackers know this and are known to run programs that check IP addresses to see if these ports are open. They can then leverage this for a brute-force attack on your resources. Therefore, it is important that you do not leave these ports open to the internet.

Azure provides options to avoid having these ports open to the internet, while still making them available to you to remotely manage at the operating system level. The two that will be discussed are Just-in-Time Virtual Machine access and Azure Bastion. Let's...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime