Description
There was a time (still quite recent) when in the minds of professionals, cloud and security did not necessarily go well together. And the doubt increased further when the use of applications or mobile equipment was mentioned. Aware of this reluctance, major market players have developed numerous tools aimed at implementing effective security at all levels. Microsoft has thus integrated into its 365 offering a complete range of particularly effective tools to protect each element of the IS (directory, authentication, client/server dialogue, mobile applications, etc.). The purpose of this training is precisely to present in detail all of these tools and to allow professionals concerned with the subject of security to learn how to implement them.
Who is this training for ?
For whom ?Anyone wishing to deploy and administer Microsoft 365 services
Prerequisites
Training objectives
Training program
- PART 1: MANAGING MICROSOFT 365 SECURITY
don’t have a program yet
- DESIGNING YOUR MICROSOFT 365 CLIENT
- Planning an on-premises Microsoft 365 infrastructure
- Planning your identity and authentication solution
- CONFIGURING YOUR MICROSOFT 365 CLIENT
- Planning your Microsoft 365 experience
- Setting up your Microsoft 365 experience
- Leveraging FastTrack and partner services
- Implementing your Microsoft 365 services domain
- MANAGING YOUR MICROSOFT 365 CUSTOMER
- Configuring tenant roles
- Managing tenant health and services
- PRACTICAL WORKSHOP
- Microsoft 365 Security Management
- PART 2: MANAGING MICROSOFT 365 COMPLIANCE
don’t have a program yet
- INTRODUCTION TO DATA GOVERNANCE IN MICROSOFT 365
- Introduction to Archiving in Microsoft 365
- Introduction to Retention in Microsoft 365
- Introduction to Information Rights Management
- Introduction to the Secure Multipurpose Internet Email Extension
- Introduction to Office 365 Message Encryption
- Introduction to Data Loss Prevention
- ARCHIVING AND RETENTION IN MICROSOFT 365
- estimating records on-premises in SharePoint
- Archiving and retention in Exchange
- Retention policies in the CCN
- Implementing your recording services domain
- IMPLEMENTING DATA GOVERNANCE IN MICROSOFT 365
- Planning your security and compliance needs
- Building ethical walls in Exchange Online
- Creating a simple DLP strategy from a built-in template
- Creating a custom DLP policy
- Creating a DLP policy to protect documents
- Working with policy guidance
- MANAGING DATA GOVERNANCE IN MICROSOFT 365
- Managing Email Retention
- Troubleshooting Data Governance
- Implementing Information Protection
- Implementing Advanced Information Protection
- Introduction to Windows Information Protection
- MANAGEMENT OF RESEARCH AND INVESTIGATIONS
- Search content in the Security and Compliance Center
- Search the audit log
- Advanced eDiscovery Management
- PRACTICAL WORKSHOPS
- Setting up your TP environment
- Archiving and retention in Microsoft 365
- Implementing data governance
- Checking your policies data governance
- PART 3: MANAGING MICROSOFT 365 DEVICES
don’t have a program yet
- PLANNING DEVICE MANAGEMENT
- Introduction to co-management
- Prepare your Windows 10 devices for co-management
- Transitioning from Configuration Manager to Intune
- Introduction to Microsoft Store for Business
- Mobile Application Management Planning
- PLANNING YOUR WINDOWS 10 DEPLOYMENT STRATEGY
- Windows 10 deployment scenarios
- Planning your Windows 10 subscription activation strategy
- Resolving Windows 10 upgrade errors
- Introduction to Windows Analytics
- IMPLEMENTING MOBILE DEVICE MANAGEMENT
- Planning for mobile device management
- Deploying mobile device management
- Enrolling devices into MDM
- Managing compliance peripherals
- PRACTICAL WORKSHOPS
- Working with Microsoft Store for Business
- Managing devices using Intune