This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You will then examine how to implement these compliance features through the use of data classification and sensitivity labels. You will conclude this section by learning how to manage search and investigation in the Microsoft Purview compliance portal. You will cover Microsoft Purview Audit (Standard and Premium) and Microsoft Purview eDiscovery (Standard and Premium). The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows devices for co-management, planning for mobile application management, examining Windows client deployment scenarios, Windows Autopilot deployment models, and planning your Windows client subscription strategy. Finally, you will transition from planning to implementing device management; specifically, your Windows client deployment strategy, Windows Autopilot, Mobile Device Management (MDM), device enrollment to MDM, and endpoint security in Microsoft Intune.
Before attending this course, students must have:
Examine threat vectors and data breaches
Explore the Zero Trust security model
Explore security solutions in Microsoft 365 Defender
Examine Microsoft Secure Score
Examine Privileged Identity Management
Examine Azure Identity Protection
Examine Exchange Online Protection
Examine Microsoft Defender for Office 365
Manage Safe Attachments
Manage Safe Links
Explore threat intelligence in Microsoft 365 Defender
Implement app protection by using Microsoft Defender for Cloud Apps
Implement endpoint protection by using Microsoft Defender for Endpoint
Implement threat protection by using Microsoft Defender for Office 365
Examine governance and compliance solutions in Microsoft Purview
Explore archiving and records management in Microsoft 365
Explore retention in Microsoft 365
Explore Microsoft Purview Message Encryption
Explore compliance in Microsoft 365
Implement Microsoft Purview Insider Risk Management
Create information barriers in Microsoft 365
Explore Data Loss Prevention in Microsoft 365
Implement Data Loss Prevention policies
Implement data classification of sensitive information
Explore sensitivity labels
Implement sensitivity labels
Search for content in the Microsoft Purview compliance portal
Manage Microsoft Purview Audit (Standard)
Manage Microsoft Purview Audit (Premium)
Manage Microsoft Purview eDiscovery (Standard)
Manage Microsoft Purview eDiscovery (Premium)
Explore device management using Microsoft Endpoint Manager
Prepare your Windows devices for Co-management
Plan for mobile application management in Microsoft Intune
Examine Windows client deployment scenarios
Explore Windows Autopilot deployment models
Plan your Windows client Subscription Activation strategy
Explore Mobile Device Management
Deploy Mobile Device Management
Enroll devices to Mobile Device Management
Manage device compliance
Implement endpoint security in Microsoft Intune