MS-500 - Microsoft 365 Security Administration

In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.

Duration: 4.0 days

Enquire Now

Schedule

Kuala Lumpur | 08 Aug 2023 - 11 Aug 2023 Malaysia
Virtual ILT | 08 Aug 2023 - 11 Aug 2023 Malaysia
Virtual ILT | 13 Jun 2023 - 16 Jun 2023 India
Virtual ILT | 18 Sep 2023 - 21 Sep 2023 Thailand
Virtual ILT | 26 Jun 2023 - 30 Jun 2022 Sri Lanka
Virtual ILT | 26 Jun 2023 - 29 Jun 2023 United Arab Emirates
Singapore | 31 Jul 2023 - 03 Aug 2023 Singapore
Virtual ILT | 31 Jul 2023 - 03 Aug 2023 Singapore
Virtual ILT | 31 Jul 2023 - 03 Aug 2023 Australia

Start learning today!

Click Hereto customize your Training

Objectives

  • Describe the Microsoft 365 authentication and provisioning options
  • Explain directory synchronization
  • Explain how Azure AD Connect enables coexistence between your on-premises Active Directory environment and Microsoft 365
  • Manage user passwords
  • Describe pass-through authentication
  • Enable multifactor authentication
  • Describe self-service password management
  • Implement Azure AD Smart Lockout
  • Implement entitlement packages in Azure AD Identity Governance
  • Implement conditional access policies
  • Create and perform an access review
  • Define the capabilities of Microsoft Defender for Endpoint.
  • Understand how to hunt threats within your network.
  • Explain how Microsoft Defender for Endpoint can remediate risks in your environment.
  • Create a Microsoft Defender for Endpoint environment
  • Onboard devices to be monitored by Microsoft Defender for Endpoint
  • Configure Microsoft Defender for Endpoint environment settings
  • Describe how Microsoft Edge is built for secure browsing
  • Use Microsoft Defender SmartScreen and Application Guard to protect against malicious attacks and unauthorized access.
  • Manage Microsoft Edge security options through policies and controls in Microsoft Endpoint Manager
  • Explain how encryption mitigates the risk of unauthorized data disclosure.
  • Describe Microsoft data-at-rest and data-in-transit encryption solutions.
  • Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
  • Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
  • Understand how your organization's apps can be configured and protected.
  • Understand the app management lifecycle.
  • Learn about the data protection framework using app protection policies.
  • Plan for device compliance by defining the rules and settings that must be configured on a device for it to be considered compliant
  • Configure conditional users and groups for deploying profiles, policies, and apps
  • Create Conditional Access policies to implement automated access control decisions for accessing your cloud apps
  • Monitor enrolled devices to control their Intune activities and compliance status
  • Define the capabilities of Microsoft Defender for Office 365.
  • Understand how to simulate attacks within your network.
  • Explain how Microsoft Defender for Office 365 can remediate risks in your environment.
  • Visualize security data using Microsoft Sentinel Workbooks.
  • Understand how queries work.
  • Explore workbook capabilities.
  • Create a Microsoft Sentinel Workbook.
  • Recognize the difference between built-in and custom sensitivity labels
  • Configure sensitive information types with exact data match-based classification
  • Implement document fingerprinting
  • Create custom keyword dictionaries
  • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
  • Monitor label usage using label analytics.
  • Configure on-premises labeling.
  • Manage protection settings and marking for applied sensitivity labels.
  • Apply protections and restrictions to email.
  • Apply protections and restrictions to files.
  • Discuss the data loss prevention solution and its benefits.
  • Describe the data loss prevention configuration process.
  • Explain what users will experience when the solution is implemented.
  • Review and analyze DLP reports.
  • Manage permissions for DLP reports.
  • Identify and mitigate DLP policy violations.
  • Mitigate DLP violations in Microsoft Defender for Cloud Apps.
  • Discuss the Data Lifecycle Management solution and its benefits.
  • List the customer scenarios the Data Lifecycle Management solution addresses.
  • Describe the Data Lifecycle Management configuration process.
  • Explain what users will experience when the solution is implemented.
  • Articulate deployment and adoption best practices.
  • Describe the retention features in Microsoft 365 workloads.
  • Configure retention settings in Microsoft Teams, Yammer, and SharePoint Online.
  • Recover content protected by retention settings.
  • Regain protected items from Exchange Mailboxes.
  • Discuss the Microsoft Purview Records Management solution and its benefits.
  • List the customer scenarios the Microsoft Purview Records Management solution addresses.
  • Describe the Microsoft Purview Records Management configuration process.
  • Explain what users will experience when the solution is implemented.
  • Articulate deployment and adoption best practices.
  • Students should have completed a role-based administrator collection such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • Students should have a proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • Students must have a proficient understanding of general IT practices.
  • Explain retention policies.
  • Explain data loss prevention policies.
  • Explain audit logs.
  • Explain content search.
  • DSRs
  • How to use a DSR in Azure Active Directory (Azure AD).
  • How to use a DSR for Microsoft accounts.
  • How to use a DSR for Office 365 apps.
  • How to use a DSR for consumer data and logs.
  • List the enhancements in communication compliance over Office 365 Supervision policies, which it will replace.
  • Explain how to identify and remediate code-of-conduct policy violations.
  • List the prerequisites that need to be met before creating communication compliance policies.
  • Describe the types of built-in, pre-defined policy templates.
  • Explain how Microsoft Purview Insider Risk Management can help prevent, detect, and contain internal risks in an organization.
  • Describe the types of built-in, pre-defined policy templates.
  • List the prerequisites that need to be met before creating insider risk policies.
  • Explain the types of actions you can take on an insider risk management case.
  • Describe how information barrier policies can help your organization maintain compliance with relevant industry standards and regulations, and avoid potential conflicts of interest.
  • List the types of situations when information barriers would be applicable.
  • Explain the process of creating an information barrier policy.
  • Explain how to troubleshoot unexpected issues after information barriers are in place.
  • Explain the difference between privileged access management and privileged identity management.
  • Describe the privileged access management process flow.
  • Describe how to configure and enable privileged access management.

Content

1. Create, configure, and manage identities

Access to cloud-based workloads needs to be controlled centrally by providing a definitive identity for each user and resource. You can ensure employees and vendors have just-enough access to do their job.

Click here to know more

2. Explore identity synchronization

This module examines identity synchronization using Azure AD Connect and explores the authentication and provisioning options that can be used and the inner workings of directory synchronization.

Click here to know more

3. Implement and manage hybrid identity

Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.

Click here to know more

4. Implement and manage external identities

Inviting external users to use company Azure resources is a great benefit, but you want to do it in a secure way. Explore how to enable secure external collaboration.

Click here to know more

5. Manage secure user access in Microsoft 365

This module examines various password-related tasks for user and admin accounts, such as creating and configuring password policies, configuring self-service password management, configuring multifactor authentication, and implementing entitlement packages and conditional access policies.

Click here to know more

6. Manage user authentication

There are multiple options for authentication in Azure AD. Learn how to implement and manage the right authentications for users based on business needs.

Click here to know more

7. Plan, implement, and administer Conditional Access

Conditional Access gives a fine granularity of control over which users can do specific activities, access which resources, and how ensure data and systems are safe.

Click here to know more

8. Plan and implement privileged access

Ensuring that administrative roles are protected and managed to increase your Azure solution security is a must. Explore how to use PIM to protect your data and resources.

Click here to know more

9. Plan and implement entitlement management

When new users or external users join your site, quickly assigning them access to Azure solutions is a must. Explore how to entitle users to access your site and resources.

Click here to know more

10. Manage Azure AD Identity Protection

Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud solution. Explore how to design and implement Azure AD Identity protection.

Click here to know more

11. Protect against threats with Microsoft Defender for Endpoint

Learn how Microsoft Defender for Endpoint can help your organization stay secure.

Click here to know more

12. Deploy the Microsoft Defender for Endpoint environment

Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security.

Click here to know more

13. Protect against malicious attacks and unauthorized access with Microsoft Edge

Microsoft Edge helps protect your network and devices from malicious attacks and helps prevent unauthorized access to, and leaks of, corporate data with Microsoft Defender SmartScreen and Microsoft Defender Application Guard.

Click here to know more

14. Understand Microsoft 365 encryption

Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.

Click here to know more

15. Understand app management using Microsoft Endpoint Manager

As part of application management, Microsoft Endpoint Manager helps you configure apps, protect app data, manage app policy assignments, and implement app security rules.

Click here to know more

16. Manage device compliance

This module examines device compliance policies, how organizations effectively use them, how to create policies and configure conditional users and groups, how to build Conditional Access policies, and how to monitor enrolled devices.

Click here to know more

17. Remediate risks with Microsoft Defender for Office 365

Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender.

Click here to know more

18. Query, visualize, and monitor data in Microsoft Sentinel

This module describes how to query, visualize, and monitor data in Microsoft Sentinel.

Click here to know more

19. Create and manage sensitive information types

Learn how to use sensitive information types to support your information protection strategy.

Click here to know more

20. Apply and manage sensitivity labels

Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate are not hindered.

Click here to know more

21. Prevent data loss in Microsoft Purview

Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.

Click here to know more

22. Manage data loss prevention policies and reports in Microsoft 365

Learn how to manage data loss prevention policies and mitigate data loss prevention policy violations.

Click here to know more

23. Manage the data lifecycle in Microsoft Purview

Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don't.

Click here to know more

24. Manage data retention in Microsoft 365 workloads

Learn how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services.

Click here to know more

25. Manage records in Microsoft Purview

Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.

Click here to know more

26. Manage compliance in Microsoft 365 and Exchange Online

Learn how compliance works in an Exchange Online environment. Learn how to use retention and data loss prevention policies to keep the data and communications you're required to maintain, how to find that data and communications, and how to ensure you're ready for an audit.

Click here to know more

27. Manage Microsoft Purview eDiscovery (Premium)

This module explores how to use Microsoft Purview eDiscovery (Premium) to preserve, collect, analyze, review, and export content that's responsive to an organization's internal and external investigations, and communicate with custodians involved in a case.

Click here to know more

28. Manage regulatory and privacy requirements with Microsoft Priva

Learn how to use Microsoft Priva to manage privacy risk policies and subject rights requests.

Click here to know more

29. Prepare Microsoft Purview Communication Compliance

Microsoft Purview Communication Compliance is a solution that helps organizations address code-of-conduct policy violations in company communications, while also assisting organizations in regulated industries meet specific supervisory compliance requirements. Communication Compliance uses machine learning to intelligently detect violations across different communication channels such as Microsoft Teams, Exchange Online, or Yammer messages.

Click here to know more

30. Manage insider risk in Microsoft Purview

Microsoft Purview Insider Risk Management helps organizations address internal risks, such as IP theft, fraud, and sabotage. Learn about insider risk management and how Microsoft technologies can help you detect, investigate, and take action on risky activities in your organization.

Click here to know more

31. Plan information barriers

Information barriers enable administrators to define policies to allow or prevent communications between groups of users in Microsoft Teams chats and channels. When information barrier policies are in place, people who should not communicate with other specific users won't be able to find, select, chat, or call those users. With information barriers, checks are in place to prevent unauthorized communication.

Click here to know more

32. Implement privileged access management

Privileged access management allows granular access control over privileged admin tasks in Office 365. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bound approval workflow. This configuration gives users just enough access to perform the task at hand without risking exposure of sensitive data or critical configuration settings.

Click here to know more

33. Manage Customer Lockbox

Customer Lockbox supports requests to access data in Exchange Online, SharePoint Online, and OneDrive when Microsoft engineers need to access customer content to determine root cause and fix an issue. Customer Lockbox requires the engineer to request access from the customer as a final step in the approval workflow. This gives organizations the option to approve or deny these requests and provide direct-access control to the customer.

Click here to know more

Audience

The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.

Prerequisites

Learners should start this course already having the following skills:
  • Basic conceptual understanding of Microsoft Azure.
  • Experience with Windows 10 devices.
  • Experience with Office 365.
  • Basic understanding of authorization and authentication.
  • Basic understanding of computer networks.
  • Working knowledge of managing mobile devices.

Certification

product-certification

Skills Measured

  • Implement and manage identity and access (25-30%)
  • Implement and manage threat protection (30-35%)
  • Implement and manage information protection (15-20%)
  • Manage compliance in Microsoft 365 (20-25%)

Course Benefits

product-benefits
  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

Microsoft Popular Courses

sc-900t00

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

az-204

Learn to create end-to-end solutions in Microsoft Azure in this 5-days official Microsoft course.

az-104

This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, co

ms-700t00

The Managing Microsoft Teams course is designed for those aspiring to be Microsoft 365 Teams Administrators to deploy, configure and manage Office 365 workloads
Enquire Now
 
 
 
 
m08e9d
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy