Microsoft 365 Mobility and Security

Course ID : MS-101T00-A

Microsoft 365 Mobility and Security

Course ID : MS-101T00-A

This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center. Now that you understand the key aspects of data governance, you will examine how to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection. You will conclude this section by learning how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. At this point, you will transition from planning to implementing device management; specifically, your Windows 10 deployment strategy. This includes learning how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.

Microsoft 365 Mobility and Security

Course ID : MS-101T00-A

This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center. Now that you understand the key aspects of data governance, you will examine how to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection. You will conclude this section by learning how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. At this point, you will transition from planning to implementing device management; specifically, your Windows 10 deployment strategy. This includes learning how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.

Discover course

Module 1: Explore security metrics in Microsoft 365

  • Examine threat vectors and data breaches
  • Explore the Zero Trust security model
  • Explore security solutions in Microsoft 365
  • Examine Microsoft Secure Score
  • Examine Privileged Identity Management
  • Examine Azure Identity Protection
  • Lab 1: Tenant Setup and Privileged Identity Management
    • Initialize your Microsoft 365 Tenant
    • PIM Resource Workflows

Module 2: Manage your Microsoft 365 security services

  • Examine Exchange Online Protection
  • Examine Microsoft Defender for Office 365
  • Manage Safe Attachments
  • Manage Safe Links
  • Explore reporting in the Microsoft 365 security services
  • Lab 2: Manage Microsoft 365 Security Services
    • Implement a Safe Attachments policy
    • Implement a Safe Links policy

Module 3: Implement threat intelligence in Microsoft 365

  • Conduct a Spear Phishing attack using the Attack Simulator
  • Conduct Password attacks using the Attack Simulator
  • Prepare for Alert Policies
  • Implement a Mailbox Permission Alert
  • Implement a SharePoint Permission Alert
  • Test the Default eDiscovery Alert

Module 4: Introduction to Data Governance in Microsoft 365

  • Explore archiving in Microsoft 365
  • Explore retention in Microsoft 365
  • Explore Information Rights Management
  • Explore Office 365 Message Encryption
  • Explore In-place Records Management in SharePoint
  • Explore Data Loss Prevention in Microsoft 365
  • Lab 3: Implement Data Governance
    • Configure Microsoft 365 Message Encryption
    • Validate Information Rights Management
    • Initialize Compliance
    • Configure Retention Tags and Policies

Module 5: Implement data governance in Microsoft 365

  • Evaluate your compliance readiness
  • Implement compliance solutions
  • Create information barriers in Microsoft 365
  • Create a DLP policy from a built-in template
  • Create a custom DLP policy
  • Create a DLP policy to protect documents
  • Implement policy tips for DLP policies
  • Lab 4: Implement DLP Policies
    • Manage DLP Policies
    • Test MRM and DLP Policies

Module 6: Manage data governance in Microsoft 365

  • Manage retention in email
  • Troubleshoot data governance
  • Explore sensitivity labels
  • Implement sensitivity labels
  • Implement Data Governance
  • Lab 5: Implement Data Governance
    • Implement sensitivity labels
    • Implement Windows Information Protection

Module 7: Manage content search and investigations in Microsoft 365

  • Search for content in the Microsoft 365 Compliance center
  • Conduct audit log investigations
  • Manage Advanced eDiscovery
  • Lab 6: Manage Search and Investigations
    • Conduct a data search
    • Investigate Your Microsoft 365 Data

Module 8: Prepare for device management in Microsoft 365

  • Explore Co-management of Windows 10 device
  • Prepare your Windows 10 devices for Co-management
  • Transition from Configuration Manager to Intune
  • Examine the Microsoft Store for Business
  • Plan for application management
  • Lab 7: Implement the Microsoft Store for Business
    • Configure the Microsoft Store for Business
    • Manage the Microsoft Store for Business

Module 9: Plan your Windows 10 deployment strategy

  • Examine Windows 10 deployment scenarios
  • Explore Windows Autopilot deployment models
  • Plan your Windows 10 Subscription Activation strategy
  • Resolve Windows 10 upgrade errors
  • Analyze Windows 10 diagnostic data using Desktop Analytics

Module 10: Implement Mobile Device Management in Microsoft 365

  • Explore Mobile Device Management
  • Deploy Mobile Device Management
  • Enroll devices to Mobile Device Management
  • Manage device compliance
  • Lab 8: Manage devices with Intune
    • Enable device management
    • Configure Azure AD for Intune
    • Create Intune policies
    • Enroll a Windows 10 device
    • Manage and monitor a device in Intune

Audience(s)

  • This course will cover topics from the Microsoft MS-101 modules, which measures a student’s ability to accomplish the following technical and administrative tasks: Identify threat vectors; use Secure Score; configure Azure Identity Protection; configure Exchange online protection; implement modern device services; implement Microsoft 365 security and threat management; and manage Microsoft 365 governance and compliance.

Objectives

By actively participating in this course, you will learn about the following:

  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence

Related Course

Associated Badge

Microsoft 365 Identity and Services

Course ID : MS-100T00-A

Related Course

Microsoft 365 Identity and Services

Course ID : MS-100T00-A

Associated Badge

Ready for the training ? Fill the form

Make the most of your online learning experience

Our Online Learning Resource Center has tips, tricks and inspiring stories to help you learn while staying home.

THINK

Grow your expertise and advance your career