In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats.
You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
After completing this course, learners should be able to
Microsoft 365 Security Metrics
Microsoft 365 Security Services
Microsoft 365 Threat Intelligence
Data Governance in Microsoft 365
Archiving and Retention in Office 365
Data Governance in Microsoft 365 Intelligence
Search and Investigations
Device Management
Windows 10 Deployment Strategies
Mobile Device Management
This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.
Introduction to Microsoft 365 Security Metrics
Threat Vectors and Data Breaches
The Zero Trust Model
Security Solutions in Microsoft 365
Introduction to Microsoft Secure Score
Privileged Identity Management
Introduction to Azure Active Directory Identity Protection
Managing Your Microsoft 365 Security Services
Introduction to Exchange Online Protection
Introduction to Advanced Threat Protection
Managing Safe Attachments
Managing Safe Links
Monitoring and Reports
Microsoft 365 Threat Intelligence
Overview of Microsoft 365 Threat Intelligence
Using the Security Dashboard
Configuring Advanced Threat Analytics
Implementing Your Cloud Application Security
Introduction to Data Governance in Microsoft 365
Introduction to Archiving in Microsoft 365
Introduction to Retention in Microsoft 365
Introduction to Information Rights Management
Introduction to Secure Multipurpose Internet Mail Extension
Introduction to Office 365 Message Encryption
Introduction to Data Loss Prevention
Archiving and Retention in Microsoft 365
In-Place Records Management in SharePoint
Archiving and Retention in Exchange
Retention Policies in the SCC
Implementing Data Governance in Microsoft 365 Intelligence
Evaluating Your Compliance Readiness
Implementing Compliance Center Solutions
Building Ethical Walls in Exchange Online
Creating a Simple DLP Policy from a Built-in Template
Creating a Custom DLP Policy
Creating a DLP Policy to Protect Documents
Working with Policy Tips
Managing Data Governance in Microsoft 365
Managing Retention in Email
Troubleshooting Data Governance
Implementing Azure Information Protection
Implementing Advanced Features of AIP
Implementing Windows Information Protection
Managing Search and Investigations
Searching for Content in the Security and Compliance Center
Auditing Log Investigations
Managing Advanced eDiscovery
Planning for Device Management
Introduction to Co-management
Preparing Your Windows 10 Devices for Co-management
Transitioning from Configuration Manager to Intune
Introduction to Microsoft Store for Business
Planning for Mobile Application Management
Planning Mobile Device Management
Deploying Mobile Device Management
Enrolling Devices to MDM
Managing Device Compliance
Planning Your Windows 10 Deployment Strategy
Windows 10 Deployment Scenarios
Implementing and Managing Windows Autopilot
Planning Your Windows 10 Subscription Activation Strategy
Resolving Windows 10 Upgrade Errors
Introduction to Windows Analytics