Takaisin

MS-101.1:Microsoft 365 Security Management

Learn about Microsoft 365 Security Management, including how to manage your security metrics, how to enable Azure AD Identity Protection, how to configure your Microsoft 365 security services, and user Microsoft 365 Threat Intelligence.

This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths.

After completing this course, students will be able to:

  • Manage Security Metrics
  • Implement security solutions in Microsoft 365
  • Plan and configure Azure AD identity protection
  • Implement Microsoft Secure Score
  • Implement Exchange Online Protection
  • Implement Advanced Threat Protection
  • Manage Safe Attachments and Safe Links
  • Implement Microsoft 365 Threat Intelligence
  • Use the Microsoft 365 Security Dashboard
  • Configure Advanced Threat Analytics
  • Implement cloud application security

 

Related courses for MS-101: Microsoft 365 Mobility and Security certification:

MS-101: Microsoft 365 Compliance Management

MS-101: Microsoft 365 Device Management

 

If you have MCSE: Productivity certification, that certification plus passing Exams MS-100 and MS-101 will earn you the Microsoft 365 Certified: Enterprise Administrator Expert.

Module 1: Designing your Microsoft 365 Tenant

  • Planning a Microsoft 365 On-premises infrastructure
  • Planning Your Identity and Authentication Solution

Module 2: Configuring your Microsoft 365 Tenant

  • Planning your Microsoft 365 Experience
  • Configuring your Microsoft 365 Experience
  • Leveraging FastTrack and Partner Services
  • Implementing Your Domain Services

Module 3: Managing your Microsoft 365 Tenant

  • Configuring Tenant Roles
  • Managing Tenant Health and Services

Module 4: Hands-On Lab

Lab : Managing Microsoft 365 Security

  • Exercise 1: Setting up your lab environment
  • Exercise 2: Editing an ATP Safe Links policy and create a Safe Attachment policy
  • Exercise 3: Enabling and installing the ATA Center
Näytä lisää Sulje
Markus Lintuala Senior System Consultant Tämä sähköpostiosoite on suojattu spamboteilta. Tarvitset JavaScript-tuen nähdäksesi sen.

Microsoft Certified Trainer

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.