MS-101T00 Microsoft 365 Mobility And Security

Length: 5 Day(s), Price: $$3,136.00 exl GST

It covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You will then examine how to implement these compliance features through the use of data classification and sensitivity labels. You will conclude this section by learning how to manage search and investigation in the Microsoft Purview compliance portal. You will cover Microsoft Purview Audit (Standard and Premium) and Microsoft Purview eDiscovery (Standard and Premium). The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows devices for co-management, planning for mobile application management, examining Windows client deployment scenarios, Windows Autopilot deployment models, and planning your Windows client subscription strategy. Finally, you will transition from planning to implementing device management; specifically, your Windows client deployment strategy, Windows Autopilot, Mobile Device Management (MDM), device enrollment to MDM, and endpoint security in Microsoft Intune.

  • Gain comprehensive knowledge of Microsoft 365 enterprise administration
  • Learn about Microsoft 365 security management, compliance management, and device management
  • Understand common threat vectors and data breaches and how Microsoft 365 security solutions address them
  • Explore Microsoft Secure Score, Azure Active Directory Identity Protection, and security services like Exchange Online Protection
  • Familiarize yourself with threat intelligence tools such as Microsoft 365 Defender and Microsoft Defender for Endpoint
  • Dive into data governance, including archiving, retention, message encryption, and data loss prevention (DLP)
  • Implement compliance features using data classification and sensitivity labels
  • Manage search and investigation in the Microsoft Purview compliance portal
  • Cover device management planning, including Windows client deployment scenarios and Windows Autopilot deployment models
  • Implement device management strategies such as Windows Autopilot, Mobile Device Management (MDM), and endpoint security in Microsoft Intune

This course is designed for individuals who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths.

Before attending this course, students must have:

  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

 1. Examine threat vectors and data breaches

 2. Explore the Zero Trust security model

 3. Explore security solutions in Microsoft 365 Defender

 4. Examine Microsoft Secure Score

 5. Examine Privileged Identity Management

 6. Examine Azure Identity Protection

 7. Examine Exchange Online Protection

 8. Examine Microsoft Defender for Office 365

 9. Manage Safe Attachments

 10. Manage Safe Links

 11. Explore threat intelligence in Microsoft 365 Defender

 12. Implement app protection by using Microsoft Defender for Cloud Apps

 13. Implement endpoint protection by using Microsoft Defender for Endpoint

 14. Implement threat protection by using Microsoft Defender for Office 365

 15. Examine governance and compliance solutions in Microsoft Purview

 16. Explore archiving and records management in Microsoft 365

 17. Explore retention in Microsoft 365

 18. Explore Microsoft Purview Message Encryption

 19. Explore compliance in Microsoft 365

 20. Implement Microsoft Purview Insider Risk Management

 21. Create information barriers in Microsoft 365

 22. Explore Data Loss Prevention in Microsoft 365

 23. Implement Data Loss Prevention policies

 24. Implement data classification of sensitive information

 25. Explore sensitivity labels

 26. Implement sensitivity labels

 27. Search for content in the Microsoft Purview compliance portal

 28. Manage Microsoft Purview Audit (Standard)

 29. Manage Microsoft Purview Audit (Premium)

 30. Manage Microsoft Purview eDiscovery (Standard)

 31. Manage Microsoft Purview eDiscovery (Premium)

 32. Explore device management using Microsoft Endpoint Manager

 33. Prepare your Windows devices for Co-management

 34. Plan for mobile application management in Microsoft Intune

 35. Examine Windows client deployment scenarios

 36. Explore Windows Autopilot deployment models

 37. Plan your Windows client Subscription Activation strategy

 38. Explore Mobile Device Management

 39. Deploy Mobile Device Management

 40. Enroll devices to Mobile Device Management

 41. Manage device compliance

 42. Implement endpoint security in Microsoft Intune

Request Course Information

Loading
Your message has been sent. Thank you!
Hello, world! This is a toast message.

Select and Book a Session