Microsoft 365 Security Administration, Part 4 of 4: Manage Governance and Compliance Features
Interactive

Microsoft 365 Security Administration, Part 4 of 4: Manage Governance and Compliance Features

LearnNow Online
Updated Dec 09, 2020

Course description

Candidates for this (MS-500) exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. This course covers Domain 3 of the exam, which is 25-35% of the test. Knowledge covered includes: Compliance in Microsoft 365, Insider Risk Management and Discover and Respond.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.

Prerequisites

Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance.

Meet the expert

Cristian Calinescu

Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.

 

Video Runtime

147 Minutes

Time to complete

428 Minutes

 

Course Outline

Compliance in Microsoft 365

Compliance Center (19:54)

Introduction (00:08)

Compliance Center (02:06)

Demo: Compliance Center (08:28)

Compliance Score Componennts (03:44)

Compliance Score Assessments (05:19)

Summary (00:08)

Insider Risk Management

Insider Risk (19:57)

Introduction (00:08)

Insider Risk (01:19)

Insider Risk Management Explained (02:43)

Configure Insider Risk Management (05:28)

Risk Alerts (02:28)

Communications Compliance (02:57)

Data Protection Regulation (04:43)

Summary (00:08)

Privileged Access (07:30)

Introduction (00:08)

Privileged Access (00:29)

PAM in office 365 (03:38)

PAM Flow (00:18)

Customer Lockbox (02:48)

Summary (00:08)

Information Barriers (09:37)

Introduction (00:08)

Information Barriers (00:57)

Information Barrier Policies (04:58)

Innformation Barriers in Teams (03:25)

Summary (00:08)

Building Ethical Walls in Exchange Online (13:43)

Introduction (00:08)

Building Ethical Walls in Exchange Online (01:08)

Ethical Walls in Exchange Online (03:39)

Ethical Walls using Groups (00:55)

Demo: Walls (05:20)

Best Practices (02:22)

Summary (00:08)

Discover and Respond

Content Search (24:18)

Introduction (00:08)

Content Search (04:21)

Design Content Search (01:47)

Demo: Content Search (05:00)

Clone Content Search (03:46)

Configure Search Permissions (01:39)

Search Third Party Data (02:23)

Demo: Search Third Party (05:02)

Summary (00:08)

Audit Log Investigations (28:04)

Introduction (00:08)

Audit Log Investigations (01:23)

Audit Log Search Explained (02:17)

Demo: Auditing (24:08)

Summary (00:08)

Advanced eDiscovery (24:14)

Introduction (00:08)

Advanced eDiscovery (06:33)

eDiscovery Workflow (04:44)

Configure Advanced eDiscovery (06:35)

Analyze Data in Advanced eDiscovery (06:05)

Summary (00:08)

;