Objectives of the training
This training enables participants to acquire the knowledge and skills to protect information in your Microsoft 365 deployment.Targeted audience
This training is intended for information protection administrators, risk practitioners, and security engineers.Prerequisite
Before attending this training, participants should have: • A basic understanding of Microsoft security and compliance technologies • A basic understanding of information protection concepts • An understanding of cloud computing concepts • An understanding of Microsoft 365 products and servicesTrainers
Benefits for Participants
• Explain the configuration of data loss prevention policies
• Apply security in Office 365 messages
• Describe the information governance configuration process
• Explain the content explorer and activity explorer
• Describe how to use sensitive information types and trainable classifiers
• Review and analyze DLP reports and identify and mitigate DLP policy violations
• Describe the integration of DLP with Microsoft Cloud App Security (MCAS) and deploy endpoint DLP
• Explain event-based retention configuration
• Create custom keyword dictionaries
• Implement document fingerprinting
Course architecture
Implementing Information Protection in Microsoft 365
• Introduction to Information Protection and Governance in Microsoft 365
• Classify data for protection and governance
• Create and manage sensitive information types
• Describe encryption in Microsoft 365
• Deploy Office 365 message encryption
• Configure sensitivity labels
• Apply and manage sensitivity labels
Implementing Data Loss Prevention in Microsoft 365
• Prevent data loss in Microsoft 365
• Implement endpoint data loss prevention
• Configure DLP policies for Microsoft Cloud App Security and Power Platform
• Manage DLP policies and reports in Microsoft 365
Implementing Information Governance in Microsoft 365
• Govern information in Microsoft 365
• Manage data retention in Microsoft 365 workloads
• Manage records in Microsoft 365
Monitoring and Investigating Data and Activities Using Microsoft Purview
Explore compliance in Microsoft 365
o Help organizations manage risks, protect data, and stay compliant with regulations and standards using Microsoft 365
o Plan your initial compliance tasks in Microsoft Purview
o Manage compliance requirements with Compliance Manager
o Manage compliance posture and improvement actions using the Compliance Manager dashboard
o Explain how an organization’s compliance score is determined
Search content in the Microsoft Purview compliance portal
o Use content search in the Microsoft Purview compliance portal
o Design and create a content search
o Preview search results
o View search statistics
o Export search results and report
o Configure search permission filtering
Manage Microsoft Purview eDiscovery (Standard)
o Build on the basic search and export functionality of Microsoft Purview eDiscovery (Standard)
o Describe the basic eDiscovery (Standard) workflow
o Create an eDiscovery case
o Create an eDiscovery hold for a case
o Search content in a case and then export that content
o Close, reopen, and delete a case
Manage Microsoft Purview eDiscovery (Premium)
o Describe how Microsoft Purview eDiscovery (Premium) builds on eDiscovery (Standard)
o Describe the basic eDiscovery (Premium) workflow
o Create and manage cases in eDiscovery (Premium)
o Manage custodian and non-custodian data sources
o Analyze case content and use analytical tools to reduce the size of search result sets
Manage Microsoft Purview Audit (Standard)
o Describe the differences between Audit (Standard) and Audit (Premium)
o Identify key features of the Audit (Standard) solution
o Configure and implement audit log search using Audit (Standard)
o Export, configure, and view audit log records
o Use audit log search to troubleshoot common support issues
Manage Microsoft Purview Audit (Premium)
o Describe the differences between Audit (Standard) and Audit (Premium)
o Configure and implement Microsoft Purview Audit (Premium)
o Create audit log retention policies
o Conduct investigations regarding compromised user accounts
Managing Insider and Privacy Risks in Microsoft 365
Prepare for Microsoft Purview Communication Compliance
o List the enhancements of communication compliance over the Office 365 supervision policies it will replace
o Identify and remediate code of conduct policy violations
o List prerequisites before creating communication compliance policies
o Describe the types of built-in and pre-defined policy templates
Manage Insider Risk in Microsoft Purview
o Prevent, detect, and contain internal risks in an organization with Microsoft Purview Insider Risk Management
o Describe the types of built-in and pre-defined policy templates
o List prerequisites before creating insider risk policies
o Explain actions to take in an insider risk management case
Implement Microsoft Purview Information Barriers
o Describe how information barriers and the components can restrict or allow communication and collaboration between specific user groups
o Enable information barriers
o Discover how information barriers help organizations determine users to add or remove from a Microsoft Team, OneDrive account, and SharePoint site
o Prevent users or groups from communicating and collaborating in Microsoft Teams, OneDrive, and SharePoint using information barriers
Manage regulatory and privacy requirements with Microsoft Priva
o Create and manage risk management policies for data overexposure, data transfer, and data minimization
o Review and remediate risk alerts
o Send notifications to users
o Create and manage subject rights requests
o Estimate and retrieve subject data
o Review subject data
o Create subject rights reports
Pedagogical details
Type of training
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote