Managing Office 365 Identities and Services MS-500T00
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.
Prérequis
Learners should start this course already having the following skills:
- Basic conceptual understanding of Microsoft Azure.
- Experience with Windows 10 devices.
- Experience with Office 365.
- Basic understanding of authorization and authentication.
- Basic understanding of computer networks.
- Working knowledge of managing mobile devices.
The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.
Objectifs
Éléments du contenu
Create, configure, and manage identities
At the end of this module, you’ll be able to:
- Create, configure, and manage users
- Create, configure, and manage groups
- Manage licenses
- Explain custom security attributes and automatic user provisioning
Explore identity synchronization
By the end of this module, you’ll be able to:
- Describe the Microsoft 365 authentication and provisioning options
- Explain directory synchronization
- Explain how Azure AD Connect enables coexistence between your on-premises Active Directory environment and Microsoft 365
Implement and manage hybrid identity
By the end of this module you will be able to:
- Plan, design, and implement Azure Active Directory Connect (AADC)
- Manage Azure Active Directory Connect (AADC)
- Manage password hash synchronization (PHS)
- Manage pass-through authentication (PTA)
- Manage seamless single sign-on (seamless SSO)
- Manage federation excluding manual ADFS deployments
- Troubleshoot synchronization errors
- Implement and manage Azure Active Directory Connect Health
Implement and manage external identities
By the end of this module, you will be able to:
- Manage external collaboration settings in Azure Active Directory
- Invite external users (individually or in bulk)
- Manage external user accounts in Azure Active Directory
- Configure identity providers (social and SAML/WS-fed)
Manage secure user access in Microsoft 365
By the end of this module, you’ll be able to:
- Manage user passwords
- Describe pass-through authentication
- Enable multifactor authentication
- Describe self-service password management
- Implement Azure AD Smart Lockout
- Implement entitlement packages in Azure AD Identity Governance
- Implement conditional access policies
- Create and perform an access review
Manage user authentication
By the end of this module, you will be able to:
- Administer authentication methods (FIDO2 / Passwordless)
- Implement an authentication solution based on Windows Hello for Business
- Configure and deploy self-service password reset
- Deploy and manage password protection
- Implement and manage tenant restrictions
Plan, implement, and administer Conditional Access
By the end of this module, you will be able to:
- Plan and implement security defaults.
- Plan conditional access policies.
- Implement conditional access policy controls and assignments (targeting, applications, and conditions).
- Test and troubleshoot conditional access policies.
- Implement application controls.
- Implement session management.
- Configure smart lockout thresholds.
Plan and implement privileged access
By the end of this module, you will be able to:
- Define a privileged access strategy for administrative users (resources, roles, approvals, and thresholds)
- Configure Privileged Identity Management for Azure AD roles
- Configure Privileged Identity Management for Azure resources
- Assign roles
- Manage PIM requests
- Analyze PIM audit history and reports
- Create and manage emergency access accounts
Plan and implement entitlement management
By the end of this module, you will be able to:
- Define catalogs.
- Define access packages.
- Plan, implement and manage entitlements.
- Implement and manage terms of use.
- Manage the lifecycle of external users in Azure AD Identity Governance settings.
Manage Azure AD Identity Protection
By the end of this module you will be able to:
- Implement and manage a user risk policy
- Implement and manage sign-in risk policies
- Implement and manage MFA registration policy
- Monitor, investigate, and remediate elevated risky users
Protect against threats with Microsoft Defender for Endpoint
In this module, you will learn how to:
- Define the capabilities of Microsoft Defender for Endpoint.
- Understand how to hunt threats within your network.
- Explain how Microsoft Defender for Endpoint can remediate risks in your environment.
Deploy the Microsoft Defender for Endpoint environment
Upon completion of this module, the learner will be able to:
- Create a Microsoft Defender for Endpoint environment
- Onboard devices to be monitored by Microsoft Defender for Endpoint
- Configure Microsoft Defender for Endpoint environment settings
Protect against malicious attacks and unauthorized access with Microsoft Edge
At the end of this module, you will be able to:
- Describe how Microsoft Edge is built for secure browsing
- Use Microsoft Defender SmartScreen and Application Guard to protect against malicious attacks and unauthorized access.
- Manage Microsoft Edge security options through policies and controls in Microsoft Endpoint Manager
Understand Microsoft 365 encryption
Upon completion of this module, you should be able to:
- Explain how encryption mitigates the risk of unauthorized data disclosure.
- Describe Microsoft data-at-rest and data-in-transit encryption solutions.
- Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
- Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
Understand app management using Microsoft Endpoint Manager
In this module, you will:
- Understand how your organization’s apps can be configured and protected.
- Understand the app management lifecycle.
- Learn about the data protection framework using app protection policies.
Manage device compliance
By the end of this module, you’ll be able to:
- Plan for device compliance by defining the rules and settings that must be configured on a device for it to be considered compliant
- Configure conditional users and groups for deploying profiles, policies, and apps
- Create Conditional Access policies to implement automated access control decisions for accessing your cloud apps
- Monitor enrolled devices to control their Intune activities and compliance status
Remediate risks with Microsoft Defender for Office 365
In this module, you will learn how to:
- Define the capabilities of Microsoft Defender for Office 365.
- Understand how to simulate attacks within your network.
- Explain how Microsoft Defender for Office 365 can remediate risks in your environment.
Query, visualize, and monitor data in Microsoft Sentinel
In this module you will:
- Visualize security data using Microsoft Sentinel Workbooks.
- Understand how queries work.
- Explore workbook capabilities.
- Create a Microsoft Sentinel Workbook.
Create and manage sensitive information types
After completing this module, you will be able to:
- Recognize the difference between built-in and custom sensitivity labels
- Configure sensitive information types with exact data match-based classification
- Implement document fingerprinting
- Create custom keyword dictionaries
Apply and manage sensitivity labels
After completing this module, you will be able to:
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
- Monitor label usage using label analytics.
- Configure on-premises labeling.
- Manage protection settings and marking for applied sensitivity labels.
- Apply protections and restrictions to email.
- Apply protections and restrictions to files.
Prevent data loss in Microsoft Purview
When you finish with this module, you’ll be able to:
- Discuss the data loss prevention solution and its benefits.
- Describe the data loss prevention configuration process.
- Explain what users will experience when the solution is implemented.
Manage data loss prevention policies and reports in Microsoft 365
After completing this module, you’ll be able to:
- Review and analyze DLP reports.
- Manage permissions for DLP reports.
- Identify and mitigate DLP policy violations.
- Mitigate DLP violations in Microsoft Defender for Cloud Apps.
Manage the data lifecycle in Microsoft Purview
Upon completion of this module, you should be able to:
- Discuss the Data Lifecycle Management solution and its benefits.
- List the customer scenarios the Data Lifecycle Management solution addresses.
- Describe the Data Lifecycle Management configuration process.
- Explain what users will experience when the solution is implemented.
- Articulate deployment and adoption best practices.
Manage data retention in Microsoft 365 workloads
After completing this module, you will be able to:
- Describe the retention features in Microsoft 365 workloads.
- Configure retention settings in Microsoft Teams, Yammer, and SharePoint Online.
- Recover content protected by retention settings.
- Regain protected items from Exchange Mailboxes.
Manage records in Microsoft Purview
Upon completion of this module, you should be able to:
- Discuss the Microsoft Purview Records Management solution and its benefits.
- List the customer scenarios the Microsoft Purview Records Management solution addresses.
- Describe the Microsoft Purview Records Management configuration process.
- Explain what users will experience when the solution is implemented.
- Articulate deployment and adoption best practices.
Manage compliance in Microsoft 365 and Exchange Online
At the end of this module, you should be able to:
- Explain retention policies.
- Explain data loss prevention policies.
- Explain audit logs.
- Explain content search.
Manage Microsoft Purview eDiscovery (Premium)
By the end of this module, you’ll be able to:
- Describe how Microsoft Purview eDiscovery (Premium) builds on eDiscovery (Standard).
- Describe the basic workflow of eDiscovery (Premium).
- Create and manage cases in eDiscovery (Premium).
- Manage custodians and non-custodial data sources.
- Analyze case content and use analytical tools to reduce the size of search result sets.
Manage regulatory and privacy requirements with Microsoft Priva
Upon completion of this module, the learner will be able to:
- Create and manage risk management policies for data overexposure, data transfer, and data minimization
- Investigate and remediate risk alerts
- Send user notifications
- Create and manage Subject Rights Requests
- Estimate and retrieve subject data
- Review subject data
- Create subject rights reports
Prepare Microsoft Purview Communication Compliance
Upon completion of this module, you should be able to:
- List the enhancements in communication compliance over Office 365 Supervision policies, which it will replace.
- Explain how to identify and remediate code-of-conduct policy violations.
- List the prerequisites that need to be met before creating communication compliance policies.
- Describe the types of built-in, pre-defined policy templates.
Manage insider risk in Microsoft Purview
Upon completion of this module, you should be able to:
- Explain how Microsoft Purview Insider Risk Management can help prevent, detect, and contain internal risks in an organization.
- Describe the types of built-in, pre-defined policy templates.
- List the prerequisites that need to be met before creating insider risk policies.
- Explain the types of actions you can take on an insider risk management case.
Plan information barriers
Upon completion of this module, you should be able to:
- Describe how information barrier policies can help your organization maintain compliance with relevant industry standards and regulations, and avoid potential conflicts of interest.
- List the types of situations when information barriers would be applicable.
- Explain the process of creating an information barrier policy.
- Explain how to troubleshoot unexpected issues after information barriers are in place.
Implement privileged access management
Upon completion of this module, you should be able to:
- Explain the difference between privileged access management and privileged identity management.
- Describe the privileged access management process flow.
- Describe how to configure and enable privileged access management.
Manage Customer Lockbox
Upon completion of this module, you should be able to:
- Describe the Customer Lockbox workflow.
- Explain how to approve or deny a Customer Lockbox request.
- Explain how you can audit actions performed by Microsoft engineers when access requests are approved.
Note :
Formation donnée en français, logiciel et manuel en anglais.
Notre tarification inclut le matériel pédagogique.