Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft 365 Security and Compliance for Administrators

You're reading from   Microsoft 365 Security and Compliance for Administrators A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture

Arrow left icon
Product type Paperback
Published in Mar 2024
Publisher Packt
ISBN-13 9781837638376
Length 432 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Sasha Kranjac Sasha Kranjac
Author Profile Icon Sasha Kranjac
Sasha Kranjac
Omar Kudović Omar Kudović
Author Profile Icon Omar Kudović
Omar Kudović
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1:Introduction to Microsoft 365 FREE CHAPTER
2. Chapter 1: Getting Started with Microsoft 365 Security and Compliance 3. Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security 4. Part 2: Microsoft 365 Security
5. Chapter 3: Microsoft Defender for Office 365 6. Chapter 4: Microsoft Defender for Endpoint 7. Chapter 5: Getting Started with Microsoft Purview 8. Chapter 6: Microsoft Defender for Cloud Apps 9. Chapter 7: Microsoft Defender Vulnerability Management 10. Chapter 8: Microsoft Defender for Identity 11. Part 3: Microsoft 365 Governance and Compliance
12. Chapter 9: Microsoft Purview Insider Risk Management 13. Chapter 10: Microsoft Purview Information Protection 14. Chapter 11: Understanding the Lifecycle of Auditing and Records 15. Index 16. Other Books You May Enjoy

Insider Risk Management

Microsoft Purview Insider Risk Management (IRM) is just one product in the palette of risk and compliance solutions available in Microsoft Purview that works together with communication compliance, information barriers, and privileged access management to help organizations successfully mitigate insider threats.

The potential dangers posed by insider threats, emerging from activities that are illegal, inappropriate, unauthorized, or unethical, constitute a significant concern for all companies. These risks can often remain unnoticed until it’s too late. Whether it involves intellectual property theft, data breaches, or other potential scenarios, safeguarding an organization’s data from both unintentional and malicious actions is of utmost importance. While it is harder to stop an intentional data exfiltration action than an unintentional action, IRM provides an additional layer of protection against data leakage and exfiltration. Microsoft provides...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime