0% found this document useful (0 votes)
229 views8 pages

M365 Security Administration Guia MS 500

This document provides an overview of the MS-500T00-A: Microsoft 365 Security Administration training course. The 4-day course teaches students how to secure access to organizational resources in Microsoft 365, protect against threats, secure information, and conduct searches and investigations. It covers topics like conditional access, identity synchronization, threat protection technologies, information protection, archiving and retention, and more. The course is aimed at Microsoft 365 security administrators who implement and manage security and compliance solutions.

Uploaded by

Roberto Lopez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
229 views8 pages

M365 Security Administration Guia MS 500

This document provides an overview of the MS-500T00-A: Microsoft 365 Security Administration training course. The 4-day course teaches students how to secure access to organizational resources in Microsoft 365, protect against threats, secure information, and conduct searches and investigations. It covers topics like conditional access, identity synchronization, threat protection technologies, information protection, archiving and retention, and more. The course is aimed at Microsoft 365 security administrators who implement and manage security and compliance solutions.

Uploaded by

Roberto Lopez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

TEMARIO

MS-500T00-A: Microsoft 365 Security


Administration
Course MS-500T00-A: Microsoft 365 Security Administration (4 days)
OVERVIEW

About this course


In this course you will learn how to secure user access to your organization’s resources. The course
covers user password protection, multi-factor authentication, how to enable Azure Identity Protection,
how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365.
You will learn about threat protection technologies that help protect your Microsoft 365 environment.
Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats.
You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection,
Windows Defender Advanced Threat Protection, and threat management. In the course you will learn
about information protection technologies that help secure your Microsoft 365 environment. The
course discusses information rights managed content, message encryption, as well as labels, policies
and rules that support data loss prevention and information protection. Lastly, you will learn about
archiving and retention in Microsoft 365 as well as data governance and how to conduct content
searches and investigations. This course covers data retention policies and tags, in-place records
management for SharePoint, email retention, and how to conduct content searches that support
eDiscovery investigations.

Audience profile
The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise
Administrator, business stakeholders and other workload administrators to plan and implement
security strategies and to ensures that the solutions comply with the policies and regulations of the
organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities
include responding to threats, implementing, managing and monitoring security and compliance
solutions for the Microsoft 365 environment. They respond to incidents, investigations and
enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft
365 workloads and hybrid environments. This role has strong skills and experience with identity
protection, information protection, threat protection, security management and data governance.
Skills gained
• Administer user and group access in Microsoft 365.
• Describe and manage Azure Identity Protection features.
• Plan and implement Azure AD Connect.
• Manage synchronized identities.
• Describe and use conditional access.
• Describe cyber-attack threat vectors.
• Describe security solutions for Microsoft 365.
• Use Microsoft Secure Score to evaluate your security posture.
• Configure various advanced threat protection services for Microsoft 365.
• Configure Advanced Threat Analytics.
• Plan and deploy secure mobile devices.
• Implement information rights management.
• Secure messages in Office 365.
• Configure Data Loss Prevention policies.
• Deploy and manage Cloud App Security.
• Implement Windows information protection for devices.
• Plan and deploy a data archiving and retention system.
• Create and manage an eDiscovery investigation.
• Manage GDPR data subject requests.

Prerequisites
Learners should start this course already having the following skills:
• Basic conceptual understanding of Microsoft Azure.
• Experience with Windows 10 devices.
• Experience with Office 365.
• Basic understanding of authorization and authentication.
• Basic understanding of computer networks.
• Working knowledge of managing mobile devices.

Duracion Examen PDU Requisitos Idioma

4 días No Incluido No Aplica PDU Ver Ingles


Prerrequisitos
TEMARIO

Module 1: User and Group Protection Module 2: Identity Synchronization

This module explains how to manage user accounts and This module explains concepts related to synchronizing
groups in Microsoft 365. It introduces you to Privileged identities for Microsoft 365. Specifically, it focuses on
Identity Management in Azure AD as well as Identity Azure AD Connect and managing directory
Protection. The module sets the foundation for the synchronization to ensure the right people are
remainder of the course. connecting to your Microsoft 365 system.
Lessons Lessons
• Identity and Access Management Concepts • Introduction to Identity Synchronization
• Zero Trust Security • Planning for Azure AD Connect
• User Accounts in Microsoft 365 • Implementing Azure AD Connect
• Administrator Roles and Security Groups in • Managing Synchronized Identities
Microsoft 365 • Introduction to Federated Identities
• Password Management in Microsoft 365 Lab: Implement Identity Synchronization
• Azure AD Identity Protection • Set up your organization for identity
Lab: Initialize your trial tenant synchronization
• Set up your Microsoft 365 tenant After completing this module, students will be able to:
Lab: Configure Privileged Identity Management • Describe authentication options for Microsoft
• Discover and Manage Azure Resources 365.
• Assign Directory Roles • Explain directory synchronization.
• Activate and Deactivate PIM Roles • Plan directory synchronization.
• Directory Roles (General) • Describe and use Azure AD Connect.
• PIM Resource Workflows • Configure Azure AD Connect Prerequisites.
• View audit history for Azure AD roles in PIM • Manage users and groups with directory
After completing this module, students will be able to: synchronization.
• Create and manage user accounts. • Describe Active Directory federation.
• Describe and use Microsoft 365 admin roles.
• Plan for password policies and authentication.
• Describe the concepts of Zero Trust security
• Implement multi-factor authentication in Office
365.
• Enable Azure Identity Protection
Module 3: Access Management Module 5: Advanced Threat Protection

This module explains conditional access for Microsoft This module explains the various threat protection
365 and how it can be used to control access to technologies and services available for Microsoft 365.
resources in your organization. The module also explains The module covers message protection through
Role Based Access Control (RBAC) and solutions for Exchange Online Protection, Azure Advanced Threat
external access. Protection and Windows Defender Advanced Threat
Lessons Protection.
• Conditional access Lessons
• Manage device access • Exchange Online Protection
• Role Based Access Control (RBAC) • Office 365 Advanced Threat Protection
• Solutions for external access • Manage Safe Attachments
Lab: Use Conditional Access to enable MFA • Manage Safe Links
• MFA Authentication Pilot (require MFA for • Azure Advanced Threat Protection
specific apps) • Microsoft Defender Advanced Threat Protection
• MFA Conditional Access (complete an MFA roll Lab: Manage Microsoft 365 Security Services
out) • Implement ATP Policies
After completing this module, students will be able to: After completing this module, students will be able to:
• Describe the concept of conditional access. • Describe the anti-malware pipeline as email is
• Describe and use conditional access policies. analyzed by Exchange Online Protection.
• Plan for device compliance. • Describe how Safe Attachments is used to block
• Configure conditional users and groups. zero-day malware in email attachments and
• Configure role based access control documents.
• Describe how Safe Links protect users from
malicious URLs embedded in email and
Module 4: Security in Microsoft 365 documents that point
• Configure Azure Advanced Threat Protection.
• Configure Windows Defender ATP.

This module explains the various cyber-attack threats


Module 6: Threat Management
that exist. It then introduces you to the Microsoft
solutions used to mitigate those threats. The module
finishes with an explanation of Microsoft Secure Score
and how it can be used to evaluate and report your This module explains Microsoft Threat Management
organizations security posture. which provides you with the tools to evaluate and
Lessons address cyber threats and formulate responses. You will
• Threat vectors and data breaches learn how to use the Security dashboard and Azure
• Security strategy and principles Sentinel for Microsoft 365. The module also explains and
• Security solutions in Microsoft 365 configures Microsoft Advanced Threat Analytics.
• Microsoft Secure Score Lessons
Lab: Use Microsoft Secure Score • Use the Security dashboard
• Improve your secure score in the Microsoft 365 • Microsoft 365 threat investigation and response
Security Center • Azure Sentinel for Microsoft 365
After completing this module, students will be able to: • Configuring Advanced Threat Analytics
• Describe several techniques attackers use to Lab: Using Attack Simulator
compromise user accounts through email. • Conduct a simulated Spear phishing attack
• Describe techniques attackers use to gain control • Conduct simulated password attacks
over resources.
• List the types of threats that can be avoided by
using Exhange Online Protection and Office 365
ATP.
After completing this module, students will be able to:
Module 8: Information Protection
• Describe how Threat Explorer can be used to
investigate threats and help to protect your
tenant.
• Describe how the Security Dashboard gives C-
level executives insight into top risks and trends. The module explains how to implement Azure
• Describe what Advanced Thread Analytics (ATA) Information Protection and Windows Information
is and what requirements are needed to deploy Protection.
it. Lessons
• Configure Advanced Threat Analytics. • Information Protection Concepts
• Use the attack simulator in Microsoft 365. • Azure Information Protection
• Describe how Azure Sentinel can used for • Advanced Information Protection
Microsoft 365. • Windows Information Protection
Lab: Implement Azure Information Protection and
Windows Information Protection
• Implement Azure Information Protection
Module 7: Mobility
• Implement Windows Information Protection
After completing this module, students will be able to:
• Configure labels and policies for Azure
Information Protection.
This module focuses on securing mobile devices and • Configure the advance AIP service settings for
applications. You will learn about Mobile Device Rights Management Services (RMS) templates.
Management and how it works with Microsoft Intune. • Plan a deployment of Windows Information
You will also learn about how Intune and Azure AD can Protection policies.
be used to secure mobile applications.
Lessons
• Plan for Mobile Application Management
Module 9: Rights Management and Encryption
• Plan for Mobile Device Management
• Deploy Mobile Device Management
• Enroll Devices to Mobile Device Management
Lab: Configure Azure AD for Intune
• Enable Device Management This module explains information rights management in
• Configure Azure AD for Intune Exchange and SharePoint. The module also describes
• Create Intune Policies encryption technologies used to secure messages.
After completing this module, students will be able to: Lessons
• Describe mobile application considerations. • Information Rights Management
• Use Intune to manage mobile applications. • Secure Multipurpose Internet Mail Extension
• Manage devices with MDM. • Office 365 Message Encryption
• Configure Domains for MDM. Lab: Configure Office 365 Message Encryption
• Manage Device Security Policies. • Configure Office 365 Message Encryption
• Enroll devices to MDM. • Validate Information Rights Management
• Configure a Device Enrollment Manager Role. After completing this module, students will be able to:
• Describe the various Microsoft 365 Encryption
Options.
• Describe the use of S/MIME.
• Describe and enable Office 365 Message
Encryption.
Module 10: Data Loss Prevention Module 12: Compliance in Microsoft 365

This module focuses on data loss prevention in Microsoft This module focuses on data governance in Microsoft
365. You will learn about how to create policies, edit 365. The module will introduce you to Compliance
rules, and customize user notifications to protect your Manager and discuss Global Data Protection Regulations
data. (GDPR).
Lessons Lessons
• Data Loss Prevention Explained • Plan for compliance requirements
• Data Loss Prevention Policies • Build ethical walls in Exchange Online
• Custom DLP Policies • Manage Retention in Email
• Creating a DLP Policy to Protect Documents • Troubleshoot Data Governance
• Policy Tips After completing this module, students will be able to:
Lab: Implement Data Loss Prevention policies • Plan security and compliance roles.
• Manage DLP Policies • Describe what you need to consider for GDPR.
• Test MRM and DLP Policies • Describe what an ethical wall in Exchange is and
After completing this module, students will be able to: how it works.
• Describe Data Loss Prevention (DLP). • Work with retention tags in mailboxes.
• Use policy templates to implement DLP policies • Describe retention policies with email messages
for commonly used information. and email folders.
• Configure the correct rules for protecting • Explain how the retention age of elements are
content. calculated.
• Describe how to modify existing rules of DLP • Repair retention policies that do not operate as
policies. expected.
• Configure the user override option to a DLP rule.
• Explain how SharePoint Online creates crawled
properties from documents.
Module 13: Archiving and Retention

Module 11: Cloud Application Security


This module explains concepts related to retention and
archiving of data for Microsoft 365 including Exchange
and SharePoint.
This module focuses on cloud application security in Lessons
Microsoft 365. The module will explain cloud discovery, • Archiving in Microsoft 365
app connectors, policies, and alerts. You will learn how • Retention in Microsoft 365
these features work to secure you cloud applications. • Retention policies in the Microsoft 365
Lessons Compliance Center
• Cloud App Security Explained • Archiving and Retention in Exchange
• Using Cloud Application Security Information • In-place Records Management in SharePoint
After completing this module, students will be able to: Lab: Compliance and Retention
• Describe Cloud App Security. • Initialize Compliance
• Explain how to deploy Cloud App Security. • Configure retention tags and policies
• Control your Cloud Apps with Policies.
• Use the Cloud App Catalog.
• Use the Cloud Discovery dashboard.
• Manage cloud app permissions.
After completing this module, students will be able to:
• Describe the difference between In-Place Archive
and Records Management.
• Explain how data is archived in Exchange.
• Explain how a retention policy functions.
• Create a retention policy.
• Enable and disable in-place archiving.
• Create useful retention tags.

Module 14: Content Search and Investigation

This module focuses on content search and


investigations. The module covers how to use eDiscovery
to conduct advanced investigations of Microsoft 365
data. It also covers audit logs and discusses GDPR data
subject requests.
Lessons
• Content Search
• Audit Log Investigations
• Advanced eDiscovery
Lab : Manage Search and Investigation
• Investigate your Microsoft 365 Data
• Conduct a Data Subject Request
After completing this module, students will be able to:
• Describe how to use content search.
• Design a content search.
• Configure search permission filtering.
• Configure Audit Policies.
• Enter criteria for searching the audit log.
• Describe advanced eDiscovery in Microsoft 365.
• View the advanced eDiscovery event log.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy