Objectives of the training
The objective of this training is to enable participants to secure Microsoft 365 environments, protect sensitive information, configure compliance policies, and manage data and insider risks.Targeted audience
Security administrators. Anyone wishing to secure data stored in Microsoft 365Prerequisite
Experience with Office 365Trainers
Benefits for Participants
• Implement information rights management
• Master data classification and secure messaging in Office 365
• Explain and use sensitivity labels
• Configure data loss prevention policies
• Plan and deploy an archiving and data retention system
• Manage insider risks
Course architecture
Module 1: Manage and Troubleshoot Mail Flow in Microsoft 365
Implement and manage identity and access
• Secure hybrid Microsoft 365 environments
• Configure and manage security integration components in hybrid Microsoft 365 environments, including connectivity, synchronization services, and authentication
• Plan Azure AD authentication options
• Plan Azure AD synchronization options
• Monitor and interpret Azure AD Connect events
• Secure user accounts
• Implement dynamic Azure AD group membership
• Implement Azure AD self-service password reset
• Manage Azure AD access reviews
• Implement authentication methods
• Plan sign-in security
• Implement multi-factor authentication (MFA)
• Manage and monitor MFA
• Implement device sign-in methods
• Manage authentication methods
• Monitor authentication methods
• Implement conditional access
• Plan compliance and conditional access policies
• Configure and manage device compliance policy
• Configure and manage conditional access policy
• Monitor conditional access and device compliance
• Implement role-based access control (RBAC)
• Plan for RBAC
• Configure RBAC
• Monitor RBAC usage
• Implement Azure AD Privileged Identity Management (PIM)
• Plan for Azure PIM
• Configure and manage Azure PIM
• Monitor Azure PIM
• Implement Azure AD Identity Protection
• Implement user risk policy
• Implement sign-in risk policy
• Configure identity protection alerts
• Review and respond to risk events
Module 2: Implement and Manage Threat Protection
• Implement a hybrid threat protection solution for the enterprise
• Plan an Azure Advanced Threat Protection (ATP) solution
• Install and configure Azure ATP
• Manage Azure ATP workspace health
• Generate Azure ATP reports
• Integrate Azure ATP with Microsoft Defender ATP
• Monitor Azure ATP
• Manage suspicious activities
• Implement device threat protection
• Plan and implement a Microsoft Defender ATP solution
• Manage Microsoft Defender ATP
• Monitor Microsoft Defender ATP
• Implement and manage device and application protection
• Plan device protection
• Configure and manage Windows Defender Application Guard
• Configure and manage Windows Defender Application Control
• Configure and manage Windows Defender Exploit Guard
• Configure secure boot
• Configure and manage Windows 10 device encryption
• Configure and manage non-Windows device encryption
• Plan application data protection on devices
• Define managed applications for mobile application management (MAM)
• Protect enterprise data using Windows Information Protection (WIP)
• Configure Intune app protection policies for Windows and non-Windows devices
• Implement and manage Office 365 ATP
• Configure Office 365 ATP anti-phishing protection
• Configure Office 365 ATP anti-phishing policies
• Define users and domains to protect with Office 365 ATP Anti-phishing
• Configure Office 365 ATP anti-spoofing
• Configure anti-spoofing actions
• Configure Office 365 ATP anti-spam protection
• Enable Office 365 ATP safe attachments
• Configure Office 365 ATP safe attachments policies
• Configure Office 365 ATP safe attachments options
• Configure Office 365 ATP safe links options
• Configure Office 365 ATP blocked URLs
• Configure Office 365 ATP safe links policies
• Review threats and malware trends on the Office 365 ATP threat management dashboard
• Review threats and malware trends with Office 365 ATP Threat Explorer and Threat Tracker
• Create and review Office 365 ATP incidents
• Review quarantined items in ATP, including Microsoft SharePoint Online, OneDrive for Business, Exchange Online, and Microsoft Teams
• Monitor online anti-malware solutions using Office 365 ATP reports
• Perform tests using the attack simulator
Module 3: Implement and Manage Information Protection
• Secure data access in Office 365
• Plan secure data access in Office 365
• Implement and manage Customer Lockbox
• Configure data access in Office 365 collaboration workloads
• Configure B2B sharing for external users
• Manage Azure Information Protection (AIP)
• Plan an AIP solution
• Enable Azure Rights Management
• Configure usage rights
• Configure and manage super users
• Customize policy settings
• Create and configure labels and conditions
• Create and configure templates
• Configure languages
• Configure and use the AIP scanner
• Deploy the RMS connector
• Manage tenant keys
• Deploy the AIP client
• Track and revoke protected documents
• Integrate AIP with Microsoft Online Services
• Manage data loss prevention (DLP)
• Plan a DLP solution
• Create and manage DLP policies
• Create and manage sensitive information types
• Monitor DLP reports
• Manage DLP notifications
• Create queries to locate sensitive data
• Implement and manage Microsoft Cloud App Security
• Plan cloud app security implementation
• Configure Microsoft Cloud App Security
• Perform productivity app discovery using Cloud App Security
• Manage entries in the Cloud App catalog
• Manage third-party apps in Cloud App Security
• Manage Microsoft Cloud app security
• Configure Cloud App Security connectors
• Configure cloud app security policies
• Configure and manage Cloud App Security templates
• Configure Cloud App Security users and permissions
• Review and respond to cloud app security alerts
• Review and interpret Cloud App Security dashboards and reports
• Review and interpret Cloud App Security activity log and governance log
Module 4: Manage Governance and Compliance Features in Microsoft 365
• Configure and analyze security reports
• Interpret Windows Analytics
• Configure Windows telemetry options
• Configure Office telemetry options
• Review and interpret security reports and dashboards
• Plan custom security reports with Intelligent Security Graph
• Review Office 365 security score and recommendations
• Configure reports and dashboards in Azure Log Analytics
• Review and interpret reports and dashboards in Azure Log Analytics
• Configure alert policies in the Office 365 Security and Compliance Center
• Manage and analyze audit logs and reports
• Plan audit and reporting
• Configure Office 365 audit and reporting
• Perform audit log search
• Review and interpret compliance reports and dashboards
• Configure audit alert policy
• Configure Office 365 classification and labeling
• Plan data governance, classification, and labeling
• Search for personal data
• Apply labels to personal data
• Monitor personal data leaks
• Create and publish Office 365 labels
• Configure labeling policies
• Manage data governance and retention
• Plan data governance and retention
• Review and interpret data governance reports and dashboards
• Configure retention policies
• Define data governance event types
• Define data governance supervision policies
• Configure retained information
• Search and recover deleted Office 365 data
• Import data into the Security and Compliance Center
• Configure data archiving
• Manage inactive mailboxes
• Manage search and investigation
• Plan content search and eDiscovery
• Delegate permissions to use search and investigation tools
• Use search and investigation tools to perform content searches
• Export content search results
• Manage eDiscovery cases
• Manage regulatory compliance for data privacy
• Plan regulatory compliance in Microsoft 365
• Review and interpret law 25 dashboards and reports
• Manage data subject requests (DSR)
• Review Compliance Manager reports
• Create and run Compliance Manager assessments and actions
Pedagogical details
Type of training
Private or personalized training
Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.
Request a quotePrivate or personalized training
Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.
Request a quote