->
Lynda - Microsoft Cybersecurity Stack: Shutting Down Shadow IT - 791357
Lynda - Microsoft Cybersecurity Stack: Shutting Down Shadow IT
Shadow IT is the use of systems and services—such as Dropbox and AWS—that are managed without the knowledge of a company's IT department. As a majority of modern enterprises grapple with the risks posed by shadow IT, IT pros need to grasp how to mitigate these threats. In this installment of the Microsoft Cybersecurity Stack series, Pete Zerger provides end-to-end coverage of shadow IT, from the risks it poses to how to identify and eliminate threats with tools in the Microsoft cybersecurity stack. Discover how to leverage Cloud App Security (CAS), as well as how to anonymize user identity information. Plus, learn how to leverage the Microsoft Data Classification Service and CAS file policies to protect confidential information, how to control access to unmanaged devices, and more.


Table of Contents

  • Introduction
  • 1. Intro to Shadow IT Threats and Strategy
  • 2. Enabling and Enriching Cloud Discovery
  • 3. Extending Control and Protection
  • Conclusion
  • Lynda - Microsoft Cybersecurity Stack: Shutting Down Shadow IT


     TO MAC USERS: If RAR password doesn't work, use this archive program: 

    RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


     TO WIN USERS: If RAR password doesn't work, use this archive program: 

    Latest Winrar  and extract password protected files without error.


     Coktum   |  

    Information
    Members of Guests cannot leave comments.




    rss