0%

Book Description

Build and enhance your own scripts to easily and efficiently manage the Security and Compliance Center

Key Features

  • Gather information you need to start using PowerShell right away
  • Discover innovative ways to construct useful scripts
  • Learn how to manage SCC with PowerShell through real-world scenarios

Book Description

PowerShell is an integral part of Office 365. With an emphasis on security, Microsoft has given high importance to the Security and Compliance Center for Office 365. Managing the security for your tenant can become an easy task with a powerful tool like PowerShell. This book shares tips, tricks, and best practices for using PowerShell with the Security and Compliance Center.

You'll begin by learning the basic tools of PowerShell, such as PowerShell ISE and PowerShell repositories, and connect to the SCC using multi-factor authentication. As you move on to more advanced topics, you'll learn to layer the security by managing role groups and explore the importance of information barriers and how to set them up. You'll discover how to manage various devices by using the tenant policies and the device access rules. As the book concludes, it teaches you the various best practices that help you produce better code.

By the end of this book, you'll have all the information to confidently manage the Security and Compliance Center (SCC) with PowerShell.

What you will learn

  • Enhance the script, test it, and transition it into production
  • Make your PowerShell scripts more usable and accessible
  • Study directory synchronization and its applications
  • Explore the various layers of security and how to implement them with PowerShell
  • Use PowerShell to implement Data Loss Prevention (DLP)
  • Understand compliance and how it can be managed with PowerShell

Who this book is for

If you are already managing Exchange and have some PowerShell experience, then this book is ideal for you. Those professionals who want to gain more proficiency in PowerShell but are unsure of how to approach it will also find this book useful. To gain the most from this book, you must have sufficient experience of working in PowerShell and need no detailed introduction about its history and usefulness.

Table of Contents

  1. Preface
    1. Chapter Layout and Conventions
      1. Chapter Layout
        1. Conventions
      2. Author’s Notes and Findings
  2. Introduction
    1. The Security and Compliance Center (SCC) and PowerShell
      1. Why PowerShell and Not the Security and Compliance Center
      2. Security and Compliance Center PowerShell
      3. Command Structure
        1. Cmdlet Examples
      4. Piping
      5. Protecting Yourself and What If
      6. Command Discovery Techniques
      7. PowerShell Modules
      8. Getting Help!?!
      9. Cloud-Only vs Synced Environments
        1. Non-Synced Accounts (Cloud-Only)
        2. Synced Accounts
  3. 1 PowerShell Basics
    1. Security and Compliance Center PowerShell: Where to Begin
      1. Variables
      2. Arrays
      3. Hash Tables 
      4. CSV Files
      5. Operators
      6. Loops
        1. Foreach-Object
        2. Do { } While ()
        3. Export-CSV
        4. How to Use these Cmdlets
      7. Functions
      8. PowerShell Tools
        1. PowerShell ISE
        2. PowerShell Repositories
        3. Alternatives to ISE
        4. ISE Plug-ins and More
        5. PSharp Plug-in for PowerShell
  4. 2 Beyond the Basics
    1. Formatting
      1. Capitalization
        1. Commenting
        2. Mind Your Brackets!
      2. Command Output
        1. Cmdlet Output Formatting
        2. Filtering
        3. Splitting
      3. Scripting in Color
        1. Color Coding Examples
      4. Miscellaneous
        1. Quotes
        2. Code Signing
  5. 3 Connecting With PowerShell
    1. Introduction
      1. Connecting to the Security and Compliance Center
        1. Security and Compliance Center PowerShell Cmdlets
      2. Multi-Factor Authentication (MFA)
      3. Closing and Removing Connections
        1. Revealing PowerShell Sessions
  6. 4 Identity Management
    1. Introduction
      1. Directory Synchronization (DirSync)
        1. History
      2. Preparing Your AD - IdFix
        1. Option 1 – Express Installation
        2. Option 2 – Customize
      3. PowerShell and Directory Synchronization
      4. What Needs to be Performed Where?
        1. Active Directory
        2. Azure Active Directory Connect
        3. Azure AD Connect – Connectors
      5. Licensing
      6. Azure AD Recycle Bin
  7. 5 Security
    1. Layered Security
      1. Role Groups
        1. PowerShell
        2. Management Roles per Role Groups
      2. Assigning Role Group Membership
        1. Mail Flow Administrator Role
        2. Reviewer Role
        3. Records Management
        4. Security Administrator
        5. Organization Management
        6. Supervisory Review
        7. Compliance Administrator
        8. Security Reader
        9. eDiscovery Manager/Administrator
        10. Service Assurance User
        11. Compliance Data Administrator
        12. Security Operator
        13. Data Investigator
        14. Global Reader
      3. Removing User(s) From Role Groups
      4. Management Roles
      5. Audit in Security and Compliance Center
        1. Searching the Admin Audit Log
  8. 6 Data Loss Prevention
    1. Introduction
      1. Sensitive Information Types
      2. Custom Sensitive Information Types
      3. Fingerprints
      4. Keyword Dictionaries
      5. Exact Data Match (EDM)
        1. Requirements
        2. PowerShell
      6. DLP Compliance
      7. Other DLP Cmdlets
  9. 7 Compliance
    1. Introduction
      1. Compliance Cases
      2. Compliance Searches
        1. What is a Compliance Search?
        2. PowerShell
        3. Set-ComplianceSearch
        4. Set-ComplianceSearchAction
        5. Get-CaseHold Cmdlets
      3. Retention Compliance
        1. PowerShell
        2. Teams Retention Compliance Policies and Rules
  10. 8 Supervision
    1. Introduction
      1. Getting Started
        1. Remove Cmdlets
        2. Set Cmdlets
      2. Supervision Reporting
      3. Viewing Supervised Emails
        1. Security and Compliance Center
        2. Outlook Configuration
  11. 9 Alerting
    1. Introduction  
      1. Activity Alerts
      2. Alerts Polices
        1. Beyond the New
  12. 10 Information Barriers
    1. Introduction  
      1. Information Barriers
        1. What are Information Barriers?
        2. Getting Started with Information Barriers
        3. Permissions required
      2. Restrictions in Teams
        1. Prerequisites
        2. Administrative Consent
      3. PowerShell
      4. Real World Experience
        1. Caveats to Blocking
      5. Documenting Settings (Script)
        1. PowerShell
  13. 11 Threats & Mail Flow
    1. Introduction
      1. Threat Management
        1. Dashboard
        2. Investigations
        3. Explorer
        4. Submissions
        5. Attack Simulator
        6. Review
        7. Policy
        8. Threat Tracker
      2. Mail Flow
  14. 12 Device Management
    1. Introduction
      1. Security and Compliance Center PowerShell
        1. Tenant Policy and Rule
        2. Device Conditional Access
        3. Device Configuration
  15. 13 Labels and File Plans
    1. Introduction
      1. Labels
        1. Creating Labels
        2. Conditions
        3. Encryption
        4. Content Marking
        5. Endpoint Protection
        6. Additional Cmdlets
      2. Label Policies
      3. File Plans
        1. How To Use File Plan Properties?
  16. 14 Building Scripts
    1. How to Begin
      1. Documentation of SCC
      2. PowerShell and Change
        1. Coding the Script
      3. Script Building Summary
      4. What is a Best Practice?
      5. Summary of Best Practices
      6. PowerShell Best Practices
        1. Commenting
        2. Useful Comments
        3. Variable Naming
        4. Variable Block
        5. Matching Variables to Parameters
        6. Preference Variables
        7. Naming Conventions, this time for Functions and Scripts
        8. Singular Task Functions
        9. Signing Your Code
        10. Filter vs. Where
        11. Error Handling
        12. Write-Output / Write-Verbose
        13. '#Requires'
        14. Set-StrictMode -Version Latest
        15. Capitalization
        16. Using full command names
        17. Cmdlet Binding
        18. Script Structure
        19. Quotes
        20. Running Applications
      7. Conclusion and Further Help
  17. B Miscellaneous
    1. Introduction
      1. Menus
      2. Aliases
        1. New-Alias
        2. Set-Alias
        3. Removing an Alias
      3. Foreach-Object (%)
      4. PowerShell Interface Customization
  18. C Microsoft Secure Score
    1. Introduction
      1. Score Analyzer
        1. Removed Tasks in 2018
        2. PowerShell and Microsoft Secure Score
      2. Detailed Analysis
3.140.186.241