OBIETTIVI
- Microsoft 365 Security Metrics
- Microsoft 365 Security Services
- Microsoft 365 Threat Intelligence
- Data Governance in Microsoft 365
- Data Governance in Microsoft 365 Intelligence
- Search and Investigations
- Device Management
- Windows 10 Deployment Strategies
- Mobile Device Managemen
CONTENUTI:
Module 1: Explore security metrics in Microsoft 365
- Examine threat vectors and data breaches
- Explore the Zero Trust security model
- Explore security solutions in Microsoft 365
- Examine Microsoft Secure Score
- Examine Privileged Identity Management
- Examine Azure Identity Protection
Lab : Tenant Setup and Privileged Identity Management
- Initialize your Microsoft 365 Tenant
- PIM Resource Workflows
Module 2: Manage your Microsoft 365 security services
- Examine Exchange Online Protection
- Examine Microsoft Defender for Office 365
- Manage Safe Attachments
- Manage Safe Links
- Explore reporting in the Microsoft 365 security services
Lab : Manage Microsoft 365 Security Services
- Implement a Safe Attachments policy
- Implement a Safe Links policy
Module 3: Implement threat intelligence in Microsoft 365
- Explore threat intelligence in Microsoft 365
- Explore the Security Dashboard
- Implement Microsoft Defender for Identity
- Implement Microsoft Cloud Application Security
Lab : Implement Threat Intelligence
- Conduct a Spear Phishing attack using the Attack Simulator
- Conduct Password attacks using the Attack Simulator
- Prepare for Alert Policies
- Implement a Mailbox Permission Alert
- Implement a SharePoint Permission Alert
- Test the Default eDiscovery Alert
Module 4: Introduction to Data Governance in Microsoft 365
- Explore archiving in Microsoft 365
- Explore retention in Microsoft 365
- Explore Information Rights Management
- Explore Office 365 Message Encryption
- Explore In-place Records Management in SharePoint
- Explore Data Loss Prevention in Microsoft 365
Lab : Implement Data Governance
- Configure Microsoft 365 Message Encryption
- Validate Information Rights Management
- Initialize Compliance
- Configure Retention Tags and Policies
Module 5: Implement data governance in Microsoft 365
- Evaluate your compliance readiness
- Implement compliance solutions
- Create information barriers in Microsoft 365
- Create a DLP policy from a built-in template
- Create a custom DLP policy
- Create a DLP policy to protect documents
- Implement policy tips for DLP policies
Lab : Implement DLP Policies
- Manage DLP Policies
- Test MRM and DLP Policies
Module 6: Manage data governance in Microsoft 365
- Manage retention in email
- Troubleshoot data governance
- Explore sensitivity labels
- Implement sensitivity labels
- Implement Data Governance
Lab : Implement Data Governance
- Implement sensitivity labels
- Implement Windows Information Protection
Module 7: Manage content search and investigations in Microsoft 365
- Search for content in the Microsoft 365 Compliance center
- Conduct audit log investigations
- Manage Advanced eDiscovery
Lab : Manage Search and Investigations
- Conduct a data search
- Investigate Your Microsoft 365 Data
Module 8: Prepare for device management in Microsoft 365
- Explore Co-management of Windows 10 device
- Prepare your Windows 10 devices for Co-management
- Transition from Configuration Manager to Intune
- Examine the Microsoft Store for Business
- Plan for application management
Lab : Implement the Microsoft Store for Business
- Configure the Microsoft Store for Business
- Manage the Microsoft Store for Business
Module 9: Plan your Windows 10 deployment strategy
- Examine Windows 10 deployment scenarios
- Explore Windows Autopilot deployment models
- Plan your Windows 10 Subscription Activation strategy
- Resolve Windows 10 upgrade errors
- Analyze Windows 10 diagnostic data using Desktop Analytics
Module 10: Implement Mobile Device Management in Microsoft 365
- Explore Mobile Device Management
- Deploy Mobile Device Management
- Enroll devices to Mobile Device Management
- Manage device compliance
Lab : Manage devices with Intune
- Enable device management
- Configure Azure AD for Intune
- Create Intune policies
- Enroll a Windows 10 device
- Manage and monitor a device in Intune