M365 Security Administration Guia MS 500
M365 Security Administration Guia MS 500
Audience profile
The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise
Administrator, business stakeholders and other workload administrators to plan and implement
security strategies and to ensures that the solutions comply with the policies and regulations of the
organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities
include responding to threats, implementing, managing and monitoring security and compliance
solutions for the Microsoft 365 environment. They respond to incidents, investigations and
enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft
365 workloads and hybrid environments. This role has strong skills and experience with identity
protection, information protection, threat protection, security management and data governance.
Skills gained
• Administer user and group access in Microsoft 365.
• Describe and manage Azure Identity Protection features.
• Plan and implement Azure AD Connect.
• Manage synchronized identities.
• Describe and use conditional access.
• Describe cyber-attack threat vectors.
• Describe security solutions for Microsoft 365.
• Use Microsoft Secure Score to evaluate your security posture.
• Configure various advanced threat protection services for Microsoft 365.
• Configure Advanced Threat Analytics.
• Plan and deploy secure mobile devices.
• Implement information rights management.
• Secure messages in Office 365.
• Configure Data Loss Prevention policies.
• Deploy and manage Cloud App Security.
• Implement Windows information protection for devices.
• Plan and deploy a data archiving and retention system.
• Create and manage an eDiscovery investigation.
• Manage GDPR data subject requests.
Prerequisites
Learners should start this course already having the following skills:
• Basic conceptual understanding of Microsoft Azure.
• Experience with Windows 10 devices.
• Experience with Office 365.
• Basic understanding of authorization and authentication.
• Basic understanding of computer networks.
• Working knowledge of managing mobile devices.
This module explains how to manage user accounts and This module explains concepts related to synchronizing
groups in Microsoft 365. It introduces you to Privileged identities for Microsoft 365. Specifically, it focuses on
Identity Management in Azure AD as well as Identity Azure AD Connect and managing directory
Protection. The module sets the foundation for the synchronization to ensure the right people are
remainder of the course. connecting to your Microsoft 365 system.
Lessons Lessons
• Identity and Access Management Concepts • Introduction to Identity Synchronization
• Zero Trust Security • Planning for Azure AD Connect
• User Accounts in Microsoft 365 • Implementing Azure AD Connect
• Administrator Roles and Security Groups in • Managing Synchronized Identities
Microsoft 365 • Introduction to Federated Identities
• Password Management in Microsoft 365 Lab: Implement Identity Synchronization
• Azure AD Identity Protection • Set up your organization for identity
Lab: Initialize your trial tenant synchronization
• Set up your Microsoft 365 tenant After completing this module, students will be able to:
Lab: Configure Privileged Identity Management • Describe authentication options for Microsoft
• Discover and Manage Azure Resources 365.
• Assign Directory Roles • Explain directory synchronization.
• Activate and Deactivate PIM Roles • Plan directory synchronization.
• Directory Roles (General) • Describe and use Azure AD Connect.
• PIM Resource Workflows • Configure Azure AD Connect Prerequisites.
• View audit history for Azure AD roles in PIM • Manage users and groups with directory
After completing this module, students will be able to: synchronization.
• Create and manage user accounts. • Describe Active Directory federation.
• Describe and use Microsoft 365 admin roles.
• Plan for password policies and authentication.
• Describe the concepts of Zero Trust security
• Implement multi-factor authentication in Office
365.
• Enable Azure Identity Protection
Module 3: Access Management Module 5: Advanced Threat Protection
This module explains conditional access for Microsoft This module explains the various threat protection
365 and how it can be used to control access to technologies and services available for Microsoft 365.
resources in your organization. The module also explains The module covers message protection through
Role Based Access Control (RBAC) and solutions for Exchange Online Protection, Azure Advanced Threat
external access. Protection and Windows Defender Advanced Threat
Lessons Protection.
• Conditional access Lessons
• Manage device access • Exchange Online Protection
• Role Based Access Control (RBAC) • Office 365 Advanced Threat Protection
• Solutions for external access • Manage Safe Attachments
Lab: Use Conditional Access to enable MFA • Manage Safe Links
• MFA Authentication Pilot (require MFA for • Azure Advanced Threat Protection
specific apps) • Microsoft Defender Advanced Threat Protection
• MFA Conditional Access (complete an MFA roll Lab: Manage Microsoft 365 Security Services
out) • Implement ATP Policies
After completing this module, students will be able to: After completing this module, students will be able to:
• Describe the concept of conditional access. • Describe the anti-malware pipeline as email is
• Describe and use conditional access policies. analyzed by Exchange Online Protection.
• Plan for device compliance. • Describe how Safe Attachments is used to block
• Configure conditional users and groups. zero-day malware in email attachments and
• Configure role based access control documents.
• Describe how Safe Links protect users from
malicious URLs embedded in email and
Module 4: Security in Microsoft 365 documents that point
• Configure Azure Advanced Threat Protection.
• Configure Windows Defender ATP.
This module focuses on data loss prevention in Microsoft This module focuses on data governance in Microsoft
365. You will learn about how to create policies, edit 365. The module will introduce you to Compliance
rules, and customize user notifications to protect your Manager and discuss Global Data Protection Regulations
data. (GDPR).
Lessons Lessons
• Data Loss Prevention Explained • Plan for compliance requirements
• Data Loss Prevention Policies • Build ethical walls in Exchange Online
• Custom DLP Policies • Manage Retention in Email
• Creating a DLP Policy to Protect Documents • Troubleshoot Data Governance
• Policy Tips After completing this module, students will be able to:
Lab: Implement Data Loss Prevention policies • Plan security and compliance roles.
• Manage DLP Policies • Describe what you need to consider for GDPR.
• Test MRM and DLP Policies • Describe what an ethical wall in Exchange is and
After completing this module, students will be able to: how it works.
• Describe Data Loss Prevention (DLP). • Work with retention tags in mailboxes.
• Use policy templates to implement DLP policies • Describe retention policies with email messages
for commonly used information. and email folders.
• Configure the correct rules for protecting • Explain how the retention age of elements are
content. calculated.
• Describe how to modify existing rules of DLP • Repair retention policies that do not operate as
policies. expected.
• Configure the user override option to a DLP rule.
• Explain how SharePoint Online creates crawled
properties from documents.
Module 13: Archiving and Retention