Course MS-500T00: Microsoft 365 Security Administration

Course Description

In this course, participants will learn how to secure user access to your organization's resources. The course covers user password protection, multifactor authentication, how to apply for Azure Identity Protection, how to set up & use Azure AD Connect, & introduces you to conditional access in Microsoft 365. Participants will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors & Microsoft's security solutions to mitigate threats. Participants will learn about Secure Score, Azure Advanced Threat Protection, Exchange Online Protection, Windows Defender Advanced Threat Protection, & threat management. Participants will learn about information protection technologies that help secure your Microsoft 365 environment in the course. The course discusses information rights managed content, labels, policies, message encryption, & rules that support data loss prevention & information protection. Lastly, you will learn about archiving & retention in Microsoft 365, as well as data governance & how to conduct content searches & investigations. This course covers data retention policies & tags, in-place records management for SharePoint, email retention, & how to conduct content searches that support eDiscovery investigations.

The Microsoft 365 Enterprise Administrator and Microsoft 365 Security Administrator work together with business stakeholders & other workload administrators to plan & implement security strategies & to ensure that the solutions comply with the policies & regulations of the organization. This role proactively protects Microsoft 365 enterprise environments. Responsibilities include responding to threats & implementing, managing & monitoring security & compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations & enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads & hybrid environments. This role has strong skills & experience with identity protection, information protection, threat protection, security management & data governance.

 

Prerequisites

Learners should start this training already having the following skills:

  •  Basic conceptual understanding of Microsoft Azure.
  •  Experience with Windows 10 devices.
  •  Experience with Office 365.
  •  Basic understanding of authorization & authentication.
  •  Basic understanding of computer networks.
  •  Working knowledge of managing mobile devices.

Content Outline

  • Describe the Microsoft 365 authentication & provisioning options
  • Explain directory synchronization
  •  Describe how Azure AD Connect enables coexistence between your on-premises Active Directory environment & Microsoft 365
  • Manage user passwords
  • Explain pass-through authentication
  • Enable multifactor authentication
  • Explain self-service password management
  • Implement Azure AD Smart Lockout
  • Apply entitlement packages in Azure AD Identity Governance
  • Implement conditional access policies
  • Create & perform an access review
  • Explain the capabilities of the Microsoft Defender for Endpoint.
  • Understand how to find threats within your network.
  • Describe how Microsoft Defender for Endpoint can remediate risks in your environment.
  • Create a Microsoft Defender for the Endpoint environment
  • Onboard devices are to be monitored by Microsoft Defender for Endpoint
  • Configure Microsoft Defender for Endpoint environment settings
  • Describe how Microsoft Edge is made for secure browsing
  • Using Microsoft Defender SmartScreen & Application Guard to protect against malicious attacks & unauthorized access.
  • Manage Microsoft Edge security options through policies & controls in Microsoft Endpoint Manager
  • Describe how encryption mitigates the risk of unauthorized data disclosure.
  •  Explain Microsoft data-at-rest & data-in-transit encryption solutions.
  •  Describe how Microsoft 365 implements service encryption to protect customer data at the application layer.
  • Understand the differences between Microsoft-managed keys & customer-managed keys for use with service encryption.
  • Understand how your organization's apps can be configured & protected.
  • Understand the app management lifecycle.
  • Understand the data protection framework using app protection policies.
  • Plan for device compliance by defining the rules & settings that must be configured on a gadget for it to be considered compliant
  • Configure conditional users & groups for deploying profiles, policies, & apps
  • Create Conditional Access policies to implement automated access management decisions for accessing your cloud apps
  • Monitor enrolled gadgets to control their Intune activities & compliance status.
  • Explain the abilities of Microsoft Defender for Office 365.
  • Understand how to simulate attacks within your network.
  • Describe how Microsoft Defender for Office 365 can remediate risks in your environment.
  • Visualize security data using Microsoft Sentinel Workbooks.
  • Understand how queries work.
  • Explore workbook capabilities.
  • Create a Microsoft Sentinel Workbook.
  • Recognize the difference between built-in & custom sensitivity labels
  • Set up sensitive information types with exact data match-based classification
  • Implement document fingerprinting
  • Create custom keyword dictionaries
  • Apply sensitivity labels to the Microsoft Teams, Microsoft 365 groups, & SharePoint sites.
  • Monitor label usage using label analytics.
  • Configure on-premises labeling.
  • Manage protection settings & marking for applied sensitivity labels.
  • Apply protections & restrictions to email.
  • Apply protections & restrictions to files.
  • Discuss the data loss prevention solution & its benefits.
  • Describe the data loss prevention configuration process.
  • Describe what users will experience when the solution is implemented.
  • Review & analyze DLP reports.
  • Manage permissions for DLP reports.
  • Identify & mitigate DLP policy violations.
  • Mitigate DLP violations in the Microsoft Defender for Cloud Apps.
  • Discuss the Data Lifecycle Management solution & its benefits.
  • List the customer scenarios the Data Lifecycle Management solution addresses.
  • Explain the Data Lifecycle Management configuration process.
  • Describe what users will experience when the solution is implemented.
  • Articulate deployment & adoption of best practices.
  • Describe the retention features in the Microsoft 365 workloads.
  • Set up retention settings in Microsoft Teams, Yammer, & SharePoint Online.
  • Recover content protected by retention settings.
  • Regain protected items from Exchange Mailboxes.
  • Discuss the Microsoft Purview Records Management solution & its benefits.
  • List the customer scenarios the Microsoft Purview Records Management solution addresses.
  • Explain the Microsoft Purview Records Management configuration process.
  •  Describe what users will experience when the solution is implemented.
  • Articulate deployment & adoption of best practices.
  • Explain retention policies.
  • Explain data loss prevention policies.
  • Explain audit logs.
  • Explain content search.
  • DSRs
  • Use of a DSR in Azure Active Directory (Azure AD).
  •  Use of a DSR for Microsoft accounts.
  •  Use of a DSR for Office 365 apps.
  •  Use of a DSR for consumer data & logs.
  • List the enhancements in communication compliance over the Office 365 Supervision policies, which it will displace.
  • Describe how to identify & remediate code-of-conduct policy violations.
  • List the prerequisites that need to be done before creating communication compliance policies.
  • Explain the types of built-in, pre-defined policy templates.
  • Explain how Microsoft Purview Insider Risk Management can help remove, detect, & contain internal risks in an organization.
  • Explain the types of built-in, pre-defined policy templates.
  • List the prerequisites that need to be done before creating insider risk policies.
  •  Describe the types of actions you can take on an insider risk management case.
  • Describe how information barrier policies can help the organization maintain compliance with appropriate industry standards & regulations, & avoid potential conflicts of interest.
  • Write the types of situations when information barriers would be applicable.
  • Describe the process of creating an information barrier policy.
  •  Describe how to troubleshoot unexpected issues after information barriers are in place.
  • Explain the difference between privileged access management & privileged identity management.
  • Describe the privileged access management process flow.
  • Describe how to configure & enable privileged access management.

FAQs

Azure Security Center is a unified infrastructure security management system that strengthens the security posture of user data centers & also provides advanced threat protection across user hybrid workloads in the cloud, don't matter whether they're in Azure or not, as well as on-premises.

To implement security in Azure, users can use the following steps:-

  • Get continuous protection with deeper insights from Azure Security Center.
  • Simplify security with built-in controls
  • Manage identity & control access.
  • Secure your network.
  • Safeguard data.
  • Key, secrets & certificate management.
  • Get centralized visibility & prevent attacks.

View performance directly from an Azure virtual machine scale set. To access directly from an Azure virtual machine scale set, some steps are required &, i.e., In the portal of Azure, the user selects Virtual machine scale sets. From the list, the user can easily choose a VM & in the Monitoring, section chooses Insights to view the Performance tab.

Microsoft Azure, commonly referred to as Azure, is a cloud computing service formed by Microsoft for making, testing, deploying, & managing applications & services through Microsoft-managed data centers.

The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. 

You can use the certificate in your future job interviews will surely help you to l& your dream job.

 

To attend the training session, you should have operational Desktops or Laptops with the required specification, along with a good internet connection to access the labs. 

If you want to become an azure admin, then you have to start with azure fundamentals. An individual with a professional experience in Azure-specific job roles can easily aim at improving their skills with official certification. However, you could also be included in other scenarios.

This exam measures your ability to accomplish the following technical tasks: manage Azure subscriptions & resources; implement & manage storage; deploy & manage virtual machines (VMs); configure & manage virtual networks; & manage identities.

The migration Assistant tool helps the user to examine your IIS installation. It helps the user to recognize which site can be migrated to the cloud. In general, it features components that are either not migrated or unsupported on the Azure platform.

ASP.Net, PHP, & WCF are a type of web application that can be deployed with SQL Azure.

To attend the training session, you should have operational Desktops or Laptops with the required specification, along with a good internet connection to access the labs. 

We would always recommend you attend the live session to practice & clarify the doubts instantly & get more value from your investment. However, due to some contingency, if you have to skip the class, Radiant Techlearning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption & NOT for distribution or any commercial use.

Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant h&-on-practice. 

Participants can easily access these labs over the cloud with the help of a remote desktop connection. 

Radiant virtual labs provide you with the flexibility to learn from anywhere in the world & in any time zone. 

 

The learners will be enthralled as we engage them the real-world & industry Oriented projects during the training program. These projects will improve your skills & knowledge & you will gain a better experience. These real-time projects will help you a lot in your future tasks & assignments.

Send a Message.


  • Enroll