Microsoft 365 Mobility and Security (Exam MS-101) - Intermediate

Duration
5 Hours, 40 Minutes

 

Delivery Method
Self-Paced

UT Pro from New Horizons

This class is part of a 12‑month UT Pro Subscription

Course Overview

This course will cover topics from the Microsoft MS-101 exam, which measures a student’s ability to accomplish the following technical and administrative tasks: Identify threat vectors; use Secure Score; configure Azure Identity Protection; configure Exchange online protection; implement modern device services; implement Microsoft 365 security and threat management; and manage Microsoft 365 governance and compliance.

Course Objectives

Introduction , Identifying Threat Vectors , Using Secure Score , Configuring Azure Identity Protection , Exchange Online Protection , Microsoft 365 Threat Intelligence , Microsoft Data Governance , Security and Compliance , Managing Search and Investigation , Planning for Device Management , Windows 10 Deployment Strategy , Conclusion , Implementing Mobile Device Management

Course Prerequisites

Working knowledge of Microsoft 365 workloads.

Agenda

1 - Introduction

  • Introduction

2 - Identifying Threat Vectors

  • Today's Threat Landscape
  • What is Spoofing?
  • What is Phishing?
  • How Do Spam and Malware Cause Harm?
  • How Do Account Breaches Cause Harm?
  • Data Exfiltration, Deletion and Spillage

3 - Using Secure Score

  • What is a Secure Score?
  • Using the Secure Score Dashboard and Analyzer
  • Increasing Your Security Posture

4 - Configuring Azure Identity Protection

  • What is Azure Identity Protection?
  • Activating Azure Identity Protection
  • Configuring Azure Identity Protection
  • Configuring Alerts and Investigation
  • Setting Exclusions

5 - Exchange Online Protection

  • What is Exchange Online Protection?
  • Understanding Zero Hour Auto Purge
  • Spoofing and Phishing Protection
  • Configuring with Exchange AntiSpam
  • Configuring Exchange AntiMalware
  • Creating a Safe Attachment Policy
  • Creating a Transport Rule to Bypass Safe Attachments
  • Creating a Safe Links Policy
  • Creating a Transport Rule to Bypass Safe Links
  • Monitoring and Reporting

6 - Microsoft 365 Threat Intelligence

  • Microsoft Intelligent Security Graph
  • Working with the Security Dashboard
  • Viewing the Threat Explorer
  • What is Microsoft Advanced Threat Analytics?
  • Configuring ATA
  • Managing ATA

7 - Microsoft Data Governance

  • In-Place Archive in Exchange
  • Enabling In-Place Archiving
  • In-Place Records Management in SharePoint
  • Activating In-Place Records Management
  • Messaging Records Management
  • Creating MRM Policy and Tags
  • Troubleshooting MRM Policies that Don't Run
  • Information Rights Management in Exchange
  • Information Rights Management in SharePoint
  • Office 365 Message Encryption

8 - Security and Compliance

  • Planning Security and Compliance Roles
  • Reviewing GDPR Needs
  • Building an Ethical Wall
  • Working with a Retention Policy
  • Creating a Retention Policy
  • Data Loss Prevention
  • Creating a DLP Policy
  • Troubleshooting Policy Tips
  • What is Azure Information Protection?
  • Planning Azure Information Protection
  • Configuring Super User For AIP
  • Implementing the AIP Tenant Key
  • Working with AIP Labels and Policies
  • What is Windows Information Protection?
  • Planning for Windows Information Protection
  • Implementing Windows Information Protection

9 - Managing Search and Investigation

  • What is Content Search?
  • Creating a Content Search
  • Auditing in Microsoft 365
  • Searching Audit Logs
  • Configuring Audit Policy in SharePoint

10 - Planning for Device Management

  • Planning for Device Management
  • Prerequisites for Using Co-Management
  • Enabling Co-Management
  • Transferring Service to Intune
  • What is the Microsoft Store for Business?
  • Configuring the Microsoft Store for Business
  • Managing Settings for the Microsoft Store for Business
  • What is Mobile Application Management?
  • Configuring Mobile Application Management
  • Using Azure Ad for Apps

11 - Windows 10 Deployment Strategy

  • Planning for Windows as a Service
  • What are Windows 10 Deployment Models?
  • Planning Your Subscription Activation Strategy
  • Resolving Windows 10 Upgrade Errors

12 - Implementing Mobile Device Management

  • Managing Devices with MDM
  • Activating MDM
  • Configuring MDM
  • Managing Device Policies
  • Creating Conditional Access Policies
  • Enrolling Devices for MDM
  • Monitoring Enrolled Devices

13 - Conclusion

  • Course Recap

What is UT Pro?

UT Pro is a 12-month subscription that provides unlimited access to full-day or short-duration live classes, on-demand video courses, class recordings, and quick reference cards. New Horizons offers more learning solutions for Microsoft Office than any other training provider and they are all included in your UT Pro subscription.

  • Unlimited enrollments into over 90 full-day and short-duration live training classes
  • Over 750 hours of on-demand video based content
  • A full library of digital quick reference cards for your favorite Office applications
  • Access to class recordings so you never have to worry about missing a scheduled class

Benefits of a UT Pro Subscription

Our UT Pro subscription is built to fit in and around your schedule. It will change the way you think about training.

  • Ask questions and get immediate answers during our full-day and short-duration live classes
  • Learn how to perform specific tasks instead of wasting time learning things you already know
  • Collaborate with fellow students and gain insight into new ways to solve problems
  • View on-demand courses with instructors that never leave your screen
  • Utilize course assessments to validate new skills
  • Take full day training classes on your schedule by accessing our class recordings
  • Revisit a prior class to further enhance your skills

Need more information? Click here to learn more about UT Pro.