Microsoft 365 Mobility and Security

Formation inter et intra-entreprise

À qui s'adresse la formation?

This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.

Niveau atteint

Avancé

Durée

5,00 jour(s)

Langues(s) de prestation

EN

Prochaine session

Prérequis

  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

Objectifs

At Course Completion, by actively participating in this course, you will learn about the following:

  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence
  • Data Governance in Microsoft 365
  • Archiving and Retention in Office 365
  • Data Governance in Microsoft 365 Intelligence
  • Search and Investigations
  • Device Management
  • Windows 10 Deployment Strategies
  • Mobile Device Management

Contenu

Module 1: Introduction to Microsoft 365 Security Metrics

Lessons

  • Threat Vectors and Data Breaches
  • Security Solutions in Microsoft 365
  • Introduction to the Secure Score
  • Introduction to Azure Active Directory Identity Protection

Module 2: Managing Your Microsoft 365 Security Services

Lessons

  • Introduction to Exchange Online Protection
  • Introduction to Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Monitoring and Reports

Module 3: Lab 1 - Manage Microsoft 365 Security Services

Lab: Manage Microsoft 365 Security Services

  • Exercise 1 - Set up a Microsoft 365 Trial Tenant
  • Exercise 2 - Implement an ATP Safe Links policy and Safe Attachment policy

Module 4: Microsoft 365 Threat Intelligence

Lessons

  • Overview of Microsoft 365 Threat Intelligence
  • Using the Security Dashboard
  • Configuring Advanced Threat Analytics
  • Implementing Your Cloud Application Security

Module 5: Lab 2 - Implement Alert Notifications Using the Security Dashboard

Lab: Implement Alert Notifications Using the Security Dashboard

  • Exercise 1 - Prepare for implementing Alert Policies
  • Exercise 2 - Implement Security Alert Notifications
  • Exercise 3 - Implement Group Alerts
  • Exercise 4 - Implement eDiscovery Alerts

Module 6: Introduction to Data Governance in Microsoft 365

Lessons

  • Introduction to Archiving in Microsoft 365
  • Introduction to Retention in Microsoft 365
  • Introduction to Information Rights Management
  • Introduction to Secure Multipurpose Internet Mail Extension
  • Introduction to Office 365 Message Encryption
  • Introduction to Data Loss Prevention

Module 7: Archiving and Retention in Office 365

Lessons

  • In-Place Records Management in SharePoint
  • Archiving and Retention in Exchange
  • Retention Policies in the SCC

Module 8: Lab 3 - Implement Archiving and Retention

Lab: Implement Archiving and Retention

  • Exercise 1 - Initialize Compliance in Your Organization
  • Exercise 2 - Configure Retention Tags and Policies
  • Exercise 3 - Implement Retention Policies

Module 9: Implementing Data Governance in Microsoft 365 Intelligence

Lessons

  • Planning Your Security and Complaince Needs
  • Building Ethical Walls in Exchange Online
  • Creating a Simple DLP Policy from a Built-in Template
  • Creating a Custom DLP Policy
  • Creating a DLP Policy to Protect Documents
  • Working with Policy Tips

Module 10: Lab 4 - Implement DLP Policies

Lab: Implement DLP Policies

  • Exercise 1 - Manage DLP Policies
  • Exercise 2 - Test MRM and DLP Policies

Module 11: Managing Data Governance in Microsoft 365

Lessons

  • Managing Retention in Email
  • Troubleshooting Data Governance
  • Implementing Azure Information Protection
  • Implementing Advanced Features of AIP
  • Implementing Windows Information Protection

Module 12: Lab 5 - Implement AIP and WIP

Lab: Implement AIP and WIP

  • Exercise 1 - Implement Azure Information Protection
  • Exercise 2 - Implement Windows Information Protection

Module 13: Managing Search and Investigations

Lessons

  • Searching for Content in the Security and Compliance Center
  • Auditing Log Investigations
  • Managing Advanced eDiscovery

Module 14: Lab 6 - Manage Search and Investigations

Lab: Manage Search and Investigations

  • Exercise 1 - Investigate Your Microsoft 365 Data
  • Exercise 2 - Configure and Deploy a Data Subject Request

Module 15: Planning for Device Management

Lessons

  • Introduction to Co-management
  • Preparing Your Windows 10 Devices for Co-management
  • Transitioning from Configuration Manager to Intune
  • Introduction to Microsoft Store for Business
  • Planning for Mobile Application Management

Module 16: Lab 7 - Implement the Microsoft Store for Business

Lab: Implement the Microsoft Store for Business

  • Exercise 1 - Configure the Microsoft Store for Business
  • Exercise 2 - Manage the Microsoft Store for Business

Module 17: Planning Your Windows 10 Deployment Strategy

Lessons

  • Windows 10 Deployment Scenarios
  • Implementing Windows Autopilot
  • Planning Your Windows 10 Subscription Activation Strategy
  • Resolving Windows 10 Upgrade Errors
  • Introduction to Windows Analytics

Module 18: Implementing Mobile Device Management

Lessons

  • Planning Mobile Device Management
  • Deploying Mobile Device Management
  • Enrolling Devices to MDM
  • Managing Device Compliance

Module 19: Lab 8 - Manage Devices with Intune

Lab: Manage Devices with Intune

  • Exercise 1 - Enable Device Management
  • Exercise 2 - Configure Azure AD for Intune
  • Exercise 3 - Create Intune Policies
  • Exercise 4 - Enroll a Windows 10 Device
  • Exercise 5 - Manage and Monitor a Device in Intune

Certificat, diplôme

Certificat de fin de formation délivré par Elgon

Ces formations pourraient vous intéresser

EN
Journée
Informatique et systèmes d'information - Système information - Architecture système information - Cloud Computing
FR
Journée
Informatique et systèmes d'information - Système information - Architecture système information - Cloud Computing