MS-101: Microsoft 365 Mobility and Security

Advanced 595(5 Ratings)
What will you learn?
  • Managing Microsoft 365 Security
  • Implementing Data Governance in Microsoft 365 Intelligence
  • Configure the advance AIP service settings for Rights Management Services (RMS) templates
  • Microsoft 365 Compliance Center and how to access it
  • Creating DLP policies to protect documents
  • Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM)

Live training
  • Working knowledge of Microsoft 365 workloads
  • Should have a working knowledge of networking, server administration, and IT fundamentals such as DNS, Active Directory, and PowerShell.

In This training focus on the three key concepts of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In this training you will learn all the common types of threat vectors and data breaches, and then you will learn how Microsoft 365’s security solutions address these security threats.

Module 1: Introduction to Microsoft 365 Security Metrics

In this module, you'll examine all the common types of threat vectors and data breaches in which organizations facing issue today. Then you will learn how Microsoft 365's security solutions convey these security threats. You'll get the overview of Microsoft Secure Score, Privileged Identity Management and, Azure Active Directory Identity Protection.

Now you can

  • Describe techniques hackers use to compromise data
  • Describe the Zero Trust approach to security in Microsoft 365.
  • Describe the components of Zero Trust security.
  • Describe and five steps to implementing a Zero Trust model in your organization.
  • Explain Zero Trust networking

Module 2: Managing Your Microsoft 365 Security Services

This Module covers how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links.

Now you can

  • List several mechanisms used to filter spam and malware
  • Describe additional solutions to protect against phishing and spoofing
  • Describe the benefits of the Spoof Intelligence feature
  • Describe how Safe Attachments is used to block zero-day malware in email attachments and documents

Module 3: Microsoft 365 Threat Intelligence

This module go into security services to threat intelligence. You will learn how to use Security Dashboard, Configure Advanced Threat Analytics. Then we will conclude with Implementing Your Cloud Application Security.

Now you can

  • Describe how the Security Dashboard displays top risks, global trends, and protection quality
  • Describe what Advanced Thread Analytics (ATA) is and what requirements are needed to deploy it
  • Configure Advanced Threat Analytics
  • Manage the ATA services

Module 4: Introduction to Data Governance in Microsoft 365

This unit examines the key components of building Microsoft 365 building management. It begins by reviewing all key aspects of data governance, including data archiving and retention, information rights management, secure Multipurpose Internet Mail Extension (S / MIME), Office 365 message encryption, and blocking. Data loss.

Now you can

  • Understand how MRM works in Exchange
  • List the types of retention tags that can be applied to mailboxes
  • Know the different Microsoft 365 Encryption Options
  • Understand how IRM can be used in Exchange
  • Configure IRM protection for Exchange mails
  • Explain how IRM can be used in SharePoint

Module 5: Archiving and Retention in Microsoft 365

This model goes deeper into archiving and retention, with a focus on managing space records in SharePoint, archiving and maintaining exchanges, and Retention policies in the Security & Compliance Center.

Now you can

  • Understand the process of records management
  • Create a file plan for your organization
  • Describe two methods for converting active docs to records
  • Describe the benefits of In-Place Records Management
  • Configure of In-Place Records Management for your organization
  • Enable and disable In-Place Archiving

Module 6: Implementing Data Governance in Microsoft 365 Intelligence

This module looks at how to implement key aspects of data governance, including building ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips.

Now you can

  • Configure insider risk management policies
  • Configure insider risk management policies
  • Explain the communication compliance capabilities in Microsoft 365
  • Describe what an ethical wall in Exchange is and how it works
  • Explain how to create an ethical wall in Exchange
  • Identify best practices for building and working with ethical walls in Exchange

Module 7: Managing Data Governance in Microsoft 365

This unit start with managing data governance in Microsoft 365, which includes email retention management, troubleshooting, retention policies, and policy advice that fails, also we will learn troubleshooting sensitive data. Then conclusion on how to implement Azure Information Protection and Windows Information Protection.

Now you can

  • Repair retention policies that do not run as expected
  • Understand how to systematically troubleshoot when a retention policy appears to fail
  • Perform policy tests in test mode with policy tips
  • Describe how to monitor DLP policies through message tracking
  • Describe the required planning steps to use AIP in your company
  • Configure and customize labels

Module 8: Managing Search and Investigations

This module covers with data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.

Now you can

  • Describe when to use scripts for advanced searches
  • Describe what the audit log is and the permissions that are necessary to search the Office 365 audit
  • Configure Audit Policies
  • Enter criteria for searching the audit log
  • View, sort, and filter search results

Module 9: Planning for Device Management

In this module we will deep dive into Microsoft 365 Device management. Module will begin planning various ways of device management, including preparing your Windows 10 devices for co-management. Then we will conclude with Microsoft Store for Business and, how to plan for Mobile Application Management.

Now you can

  • Identify the prerequisites for using Co-management
  • Configure Configuration Manager for Co-management
  • Enroll Windows 10 Devices to Intune
  • Modify your co-management settings
  • Transfer workloads to Intune

Module 10: Planning Your Windows 10 Deployment Strategy

This module focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Windows Analytics, and planning your Windows 10 subscription activation service.

Now you can

  • Create and Assign an Autopilot profile
  • Deploy and validate Autopilot
  • Describe Autopilot Self-deployments, White Glove deployments, and User-drive deployments
  • Deploy BitLocker Encryption for Autopiloted Devices
  • Understand Windows 10 Enterprise E3 in CSP
  • Configure VDA for Subscription Activation

Module 11: Implementing Mobile Device Management

This module will teach you Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.

Now you can

  • Manage devices with MDM
  • Compare MDM for Office 365 and Intune
  • Understand policy settings for mobile devices
  • Control Email and Document Access
  • Activate Mobile Device Management Services
  • Deploy Mobile Device Management
  • Configure Domains for MDM

Student feedback
Average rating
  • 22%
  • 17%
  • 19%
  • 18%
  • 21%
Buy now
  • Lifetime Access. No Limits!
  • Certificate of Completion
  • Flexible Schedule
  • 100% online courses