This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today. You will also learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score and Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
With your Microsoft 365 security components now firmly in place, you will examine the critical components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center.
Now that you understand the critical aspects of data governance, you will examine how to implement them, including building ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, and troubleshooting sensitive data. You will then learn to implement Azure Information Protection and Windows Information Protection. Finally, you will conclude this section by learning to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.
The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. Next, you will learn how to transition from Configuration Manager to Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. At this point, you will transition from planning to implementing device management, specifically, your Windows 10 deployment strategy. This includes learning to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you will learn how to deploy it, enroll devices to MDM, and manage device compliance.
Microsoft 365 Mobility and Security Training (MS-101) Delivery Methods
In-Person
Online
Important MS-101 Course and Certification Information
Microsoft 365 Mobility and Security Training (MS-101) Course Benefits
Microsoft 365 Security Metrics, Services, and Threat Intelligence
Data Governance in Microsoft 365 & Microsoft 365 Intelligence
Search and Investigations
Device Management
Windows 10 Deployment Strategies
Mobile Device Management
Microsoft 365 Mobility and Security Training (MS-101) Prerequisites
Before attempting MS-101, attendees should have:
Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
A proficient understanding of DNS and essential functional experience with Microsoft 365 services.
A proficient understanding of general IT practices.
Microsoft 365 Mobility and Security Training (MS-101) Exam Information
This course can help you prepare for the following Microsoft role-based certification exam — MS-101: Microsoft 365 Mobility and Security.
Microsoft 365 Mobility and Security Course Outline
Module 1: Explore security metrics in Microsoft 365
In this learning path, you will examine all the common types of threat vectors and data breaches facing organizations today. You will also learn how Microsoft 365’s security solutions address these security threats, including the Zero Trust approach. In addition, you will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Identity Protection and Microsoft Defender for Office 365.
Lessons
Examine threat vectors and data breaches
Explore the Zero Trust security model
Explore security solutions in Microsoft 365
Examine Microsoft Secure Score
Examine Privileged Identity Management
Examine Azure Identity Protection
Lab: Tenant Setup and Privileged Identity Management
Initialize your Microsoft 365 Tenant
PIM Resource Workflows
After completing this module, students will be able to:
Describe several techniques hackers use to compromise user accounts through email
Describe techniques hackers use to gain control over resources
Describe techniques hackers use to compromise data
Describe the Zero Trust approach to security in Microsoft 365.
Describe the components of Zero Trust security.
Describe five steps to implementing a Zero Trust model in your organization.
Explain Zero Trust networking
List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365
Describe how Microsoft 365 Threat Intelligence can benefit your organization
Monitor your organization through auditing and alerts
Describe how ASM enhances visibility and control over your tenant through three core areas
Describe the benefits of Secure Score and what kind of services can be analyzed
Describe how to collect data using the Secure Score API
Know where to identify actions that will increase your security by mitigating risks
Explain how to determine the threats each action will mitigate and the impact it has on the use
Explain Privileged Identity Management (PIM) in Azure administration
Configure PIM for use in your organization
Audit PIM roles
Explain Microsoft Identity Manager
Explain Privileged Access Management in Microsoft 365
Describe Azure Identity Protection and what kind of identities can be protected
Understand how to enable Azure Identity Protection
Know how to identify vulnerabilities and risk events
Plan your investigation in protecting cloud-based identities
Plan how to protect your Azure Active Directory environment from security breaches
Module 2: Manage your Microsoft 365 security services
Module 3: Implement threat intelligence in Microsoft 365
Module 4: Introduction to Data Governance in Microsoft 365
Module 5: Implement data governance in Microsoft 365
Module 6: Manage data governance in Microsoft 365
Module 7: Manage content search and investigations in Microsoft 365
Module 8: Prepare for device management in Microsoft 365
Module 9: Plan your Windows 10 deployment strategy
Module 10: Implement Mobile Device Management in Microsoft 365