Microsoft 365 Security Administration, Part 2 of 4: Implement and Manage Threat Protection
Interactive

Microsoft 365 Security Administration, Part 2 of 4: Implement and Manage Threat Protection

LearnNow Online
Updated Dec 09, 2020

Course description

Candidates for this (MS-500) exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. This course covers Domain 2 of the exam, which is 20-25% of the test. The knowledge covered include: Security in Microsoft 365, Threat Protection, Threat Management and Mobility.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.

Prerequisites

Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance.

Meet the expert

Cristian Calinescu

Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.

 

Video Runtime

332 Minutes

Time to complete

910 Minutes

 

Course Outline

Security in Microsoft 365

Threat Vectors and Data Breaches (37:06)

Introduction (00:08)

Threat Vectors and Data Breaches (01:03)

The Workplace and Threat Landscape (07:13)

Phishing (03:56)

Spoofing (03:00)

Spam and Malware (01:53)

Account Breach (05:40)

Data Exfiltration (03:53)

Data Deletion (03:38)

Coin Mining (01:49)

Other Attacks (04:41)

Summary (00:08)

Security Strategy and Principles (25:45)

Introduction (00:08)

Security Strategy and Principles (00:36)

Security Principles (00:56)

Measuring Security Success (03:13)

Defenders Dilemma (03:10)

Raise Attackers Cost (02:37)

Microsoft Security Solutions (00:50)

Security Center (01:07)

Demo: Security Center (03:57)

Exchange Online Protection (04:59)

Cloud Application Security (03:58)

Summary (00:08)

Secure Score (18:38)

Introduction (00:08)

Secure Score (01:02)

Secure Score Explained (05:47)

Demo: Secure Score Dashboard (05:41)

Secure Score API (01:20)

Improve Scurity Posture (04:30)

Summary (00:08)

Threat Protection

Exchange Online Protection (EOP) (24:41)

Introduction (00:08)

Exchange Online Protection (EOP) (02:05)

Anti-Malware Pipeline (05:21)

Zero-Hour Auto Purge (10:52)

Spoof Intelligence (01:30)

Manage Spoof Intelligence (00:49)

Demo: Spoof (03:45)

Summary (00:08)

Office 365 Advanced Threat Protection (34:21)

Introduction (00:08)

Office 365 Advanced Threat Protection (01:27)

ATP Expands on Exchange Online Protection (01:28)

Safe Attachments (04:08)

Safe Links (04:13)

ATP for SharePoint and OneDrive (03:55)

Manage Safe Attachments (00:39)

Safe Attachment Policies (01:15)

Demo: Create Safe Attachment Policy (05:07)

Create with PowerShell (03:35)

Demo: Modify policy (05:19)

End-user Experience with Safe Attachments (02:53)

Summary (00:08)

Manage Safe Links (17:38)

Introduction (00:08)

Manage Safe Links (01:52)

Demo: Create Safe Links (05:27)

Create Safe Link Policies with PowerShell (01:50)

Demo: Modify Safe Links (03:38)

End-User Experience with Safe Links (04:33)

Summary (00:08)

Azure Advanced Threat Protection (25:26)

Introduction (00:08)

Azure Advanced Threat Protection (00:47)

Azure ATP Explained (06:05)

Demo: Azure ATP (18:18)

Summary (00:08)

Microsoft Defender Advanced Threat Protection (33:22)

Introduction (00:08)

Microsoft Defender Advanced Threat Protection (00:39)

Defender ATP Explained (05:12)

Configure Defender ATP (05:45)

Defender ATP with security Center (05:49)

Defender Application Control (06:28)

Demo: Windows Defender (02:54)

Security Configuration Framework (06:17)

Summary (00:08)

Threat Management

Security Dashboard (35:55)

Introduction (00:08)

Security Dashboard (01:43)

Threat Dashboard (04:11)

Demo: Threats (03:41)

More Insights (01:01)

Demo: Alert (02:51)

Threat Investigation and Response (01:06)

Threat Explorer (02:01)

Demo: threat Explorer (04:32)

Automated Investigation Response (04:55)

Demo: Automated Investigation Response (04:26)

Graph Security API (05:07)

Summary (00:08)

Azure Sentinel (23:54)

Introduction (00:08)

Azure Sentinel (01:03)

Sentinel Overview (06:06)

Connect Data Sources (01:15)

Analytics (07:36)

Demo: Sentinel (07:36)

Summary (00:08)

Mobility

Mobile Application Management (MAM) (30:34)

Introduction (00:08)

Mobile Application Management (MAM) (00:33)

Mobile Application Management (04:58)

Using Configuration Manager (05:57)

Application Considerations (03:19)

Mobile Device Management (MDM) (05:56)

Compare MDM and Intune (02:03)

Policy Settings for Mobile Devices (02:32)

Control Email and Document Access (02:11)

Demo: Control Access (02:45)

Summary (00:08)

Deploy Mobile Device Services (25:23)

Introduction (00:08)

Deploy Mobile Device Services (00:30)

Activate MDM Services (02:33)

Deploy MDM (03:42)

Configure APN Certificate for IOS (05:08)

Define Corporate Device Enrollment Policy (01:41)

Enroll Devices to MDM (01:05)

Enroll Windows 10 and Android Devices (04:34)

Demo: Enrollment (02:30)

Enrollment Rules (01:42)

Multi-Factor Authentication Considerations (01:37)

Summary (00:08)

;