MS-101T00 Microsoft 365 Mobility And Security
Length: 5 Day(s), Price: $$3,136.00 exl GST
It covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You will then examine how to implement these compliance features through the use of data classification and sensitivity labels. You will conclude this section by learning how to manage search and investigation in the Microsoft Purview compliance portal. You will cover Microsoft Purview Audit (Standard and Premium) and Microsoft Purview eDiscovery (Standard and Premium). The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows devices for co-management, planning for mobile application management, examining Windows client deployment scenarios, Windows Autopilot deployment models, and planning your Windows client subscription strategy. Finally, you will transition from planning to implementing device management; specifically, your Windows client deployment strategy, Windows Autopilot, Mobile Device Management (MDM), device enrollment to MDM, and endpoint security in Microsoft Intune.
- Gain comprehensive knowledge of Microsoft 365 enterprise administration
- Learn about Microsoft 365 security management, compliance management, and device management
- Understand common threat vectors and data breaches and how Microsoft 365 security solutions address them
- Explore Microsoft Secure Score, Azure Active Directory Identity Protection, and security services like Exchange Online Protection
- Familiarize yourself with threat intelligence tools such as Microsoft 365 Defender and Microsoft Defender for Endpoint
- Dive into data governance, including archiving, retention, message encryption, and data loss prevention (DLP)
- Implement compliance features using data classification and sensitivity labels
- Manage search and investigation in the Microsoft Purview compliance portal
- Cover device management planning, including Windows client deployment scenarios and Windows Autopilot deployment models
- Implement device management strategies such as Windows Autopilot, Mobile Device Management (MDM), and endpoint security in Microsoft Intune
This course is designed for individuals who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths.
Before attending this course, students must have:
- Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
- A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
- A proficient understanding of general IT practices.
1. Examine threat vectors and data breaches
2. Explore the Zero Trust security model
3. Explore security solutions in Microsoft 365 Defender
4. Examine Microsoft Secure Score
5. Examine Privileged Identity Management
6. Examine Azure Identity Protection
7. Examine Exchange Online Protection
8. Examine Microsoft Defender for Office 365
9. Manage Safe Attachments
10. Manage Safe Links
11. Explore threat intelligence in Microsoft 365 Defender
12. Implement app protection by using Microsoft Defender for Cloud Apps
13. Implement endpoint protection by using Microsoft Defender for Endpoint
14. Implement threat protection by using Microsoft Defender for Office 365
15. Examine governance and compliance solutions in Microsoft Purview
16. Explore archiving and records management in Microsoft 365
17. Explore retention in Microsoft 365
18. Explore Microsoft Purview Message Encryption
19. Explore compliance in Microsoft 365
20. Implement Microsoft Purview Insider Risk Management
21. Create information barriers in Microsoft 365
22. Explore Data Loss Prevention in Microsoft 365
23. Implement Data Loss Prevention policies
24. Implement data classification of sensitive information
25. Explore sensitivity labels
26. Implement sensitivity labels
27. Search for content in the Microsoft Purview compliance portal
28. Manage Microsoft Purview Audit (Standard)
29. Manage Microsoft Purview Audit (Premium)
30. Manage Microsoft Purview eDiscovery (Standard)
31. Manage Microsoft Purview eDiscovery (Premium)
32. Explore device management using Microsoft Endpoint Manager
33. Prepare your Windows devices for Co-management
34. Plan for mobile application management in Microsoft Intune
35. Examine Windows client deployment scenarios
36. Explore Windows Autopilot deployment models
37. Plan your Windows client Subscription Activation strategy
38. Explore Mobile Device Management
39. Deploy Mobile Device Management
40. Enroll devices to Mobile Device Management
41. Manage device compliance
42. Implement endpoint security in Microsoft Intune