After completing this module, students will be able to: This module examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. In addition, attendees explore the world of Microsoft 365 device management. Microsoft 365 Mobility and Security. Hide completed. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. In this module, you will then transition from security services to … English. San Antonio, TX 78225, 560 Warner Robins Street Describe the components of Zero Trust security. Farmington, UT 84025. Microsoft 365 Mobility and Security #M365. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. List the types of threats that can be avoided by using EOP and Office 365 ATP, Describe how Microsoft 365 Threat Intelligence can be benefit your organization, Monitor your organization through auditing and alerts, Describe how ASM enhances visibility and control over your tenant through three core areas, Describe the benefits of Secure Score and what kind of services can be analyzed, Describe how to collect data using the Secure Score API, Know where to identify actions that will increase your security by mitigating risks, Explain how to determine the threats each action will mitigate and the impact it has on use, Explain Privileged Identity Management (PIM) in Azure administration, Configure PIM for use in your organization, Explain Privileged Access Management in Microsoft 365, Describe Azure Identity Protection and what kind of identities can be protected, Understand how to enable Azure Identity Protection, Know how to identify vulnerabilities and risk events, Plan your investigation in protecting cloud-based identities, Plan how to protect your Azure Active Directory environment from security breaches, Introduction to Exchange Online Protection, Introduction to Advanced Threat Protection, Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection, List several mechanisms used to filter spam and malware, Describe additional solutions to protect against phishing and spoofing, Describe the benefits of the Spoof Intelligence feature, Describe how Safe Attachments is used to block zero-day malware in email attachments and documents, Describe how Safe Links protect users from malicious URLs embedded in email and documents, Create and modify a Safe Attachments policy in the Security & Compliance Center, Create a Safe Attachments policy by using Windows PowerShell, Configure a Safe Attachments policy to take certain actions, Understand how a transport rule can be used to disable the Safe Attachments functionality, Describe the end-user experience when an email attachment is scanned and found to be malicious, Create and modify a Safe Links policy in the Security & Compliance Center, Create a Safe Links policy by using Windows PowerShell, Understand how a transport rule can be used to disable the Safe Links functionality, Describe the end-user experience when Safe Links identifies a link to a malicious website or file, Describe how reports provide visibility into how EOP and ATP is protecting your organization, Understand where to access reports generated by EOP and ATP, Understand how to access detailed information from reports generated by EOP and ATP, Overview of Microsoft 365 Threat Intelligence, Implementing Your Cloud Application Security, Conduct a Spear Phishing attack using the Attack Simulator, Conduct Password attacks using the Attack Simulator, Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph, Describe how the threat dashboard can benefit C-level security officers, Understand how Threat Explorer can be used to investigate threats and help to protect your tenant, Describe how the Security Dashboard displays top risks, global trends, and protection quality, Describe what Advanced Thread Analytics (ATA) is and what requirements are needed to deploy it, Introduction to Archiving in Microsoft 365, Introduction to Retention in Microsoft 365, Introduction to Information Rights Management, Introduction to Secure Multipurpose Internet Mail Extension, Introduction to Office 365 Message Encryption, Configure Microsoft 365 Message Encryption, Understand Data Governance in Microsoft 365, Describe the difference between In-Place Archive and Records Management, Recognize the benefits of In Place Records Management in SharePoint. A .gov website belongs to an official government organization in the United States. In this module, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365's security solutions address these security threats, including the Zero Trust approach. Learn more about Microsoft 365 Enterprise 1. Windows RT. The exam is available in only two languages. This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. This course covers three central elements of Microsoft 365 enterprise administration: Microsoft 365 security management. Explain the difference between Message Records Management (MRM) in Exchange and Retention in SCC. This module focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Windows Analytics, and planning your Windows 10 subscription activation service.. The Microsoft 365 Mobility and Security course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role. So, make sure that you’re well versed with at least one of the languages mentioned above. Would you like to participate on a survey? They perform Microsoft 365 tenant management tasks for an enterprise, including its identities, security, compliance, and supporting technologies.
The Starling Laura Harrier, Karani Meaning In Tamil, New Hampshire Environmental Jobs, Matrix Burgundy Hair Color Price, Fantasy Names For Desert, Paula's Choice Weightless Body Treatment Amazon, Curly Girl Method Products For Wavy Hair,