Now Available !
Microsoft 365 Security for IT Pros

[eBook] Microsoft 365 Security for IT Pro
This book will follow the same model as the highly-popular “Office 365 for IT Pros“-book. Some of you might already be familiar with the format. Our goal is to issue monthly updates of the book! The book’s website will be the vehicle through which we will announce the updates and keep track of what’s changed month after month. Once a year, we will release a completely new version. To be able to do this, we will only offer the book in e-format; no printed copies are available.

Security Experts and Microsoft MVPs
Meet The Authors
Blog: https://itcalls.net/
Blog: https://365bythijs.be/
What to expect from this book?
The book is never finished. If we were to cover all security features of Microsoft 365 before releasing the book, we would never get to publish it in the first place!
As we update the book, we will also be adding new content. In the coming releases (over the next few months), you can expect more information to be included in the existing chapters, and you can expect new chapters. The author team is already working hard to deliver to you a world-class Azure Sentinel-chapter along a brand new chapter on Office Advanced Threat Protection.
If there is anything you believe is missing from the book, or would like to see covered (in more depth), feel free to send us a message at feedback[at]m365securitybook.com. We’ll be happy to take it into consideration!

What You'll Learn?
Explore the content of this book and get peak on what's inside
chapter 2
Securing Identities

Azure AD Protection Options

Identity Protection

Azure AD Advanced Security


chapter 3
Microsoft Intune
App Protection vs Mobile Device Management | BYOD vs Corporate Owned Devices
Full guide on Onboarding devices to Microsoft Intune
Apple iOS and Android Security Concepts | Apple macOS Security Concepts
Windows Security Concepts and Endpoint security and compliance | Threat Protection
chapter 4
Microsoft Defender ATP

Full Architecture view on Defender ATP | Features and Requirements

Comprehensive Overview of the Full Feature set

The Era of Endpoint Detect and Response


chapter 5
Cloud App Security

Discovering cloud applications (Shadow IT)

Monitoring and security activities

Third-Party Integrations and Real-world Scenarios
chapter 6
Microsoft Threat Protection

Introducing Microsoft Threat Protection

Investigating Alerts and Incidents

Microsoft Secure Score


chapter 7
Microsoft Information Protection
The need for Information Protection | Enabling Microsoft Information Protection
Rights Management | Flow of Protection | Enabling Email Protection
Office 365 Message Encryption | Sensitivity Labels Deep Dive
Protecting SharePoint Online and Onedrive for Business
ebook Extra
Get Monthly Updates for Free!
Send us your feedback
Access the ebook change log
We are updating the ebook every month, so make sure to check the change log