Ourcloudnetwork Ms 102
Ourcloudnetwork Ms 102
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
ContentName
Deploy and manage a Microsoft 365 tenant (25–30%)
Implement and manage a Microsoft 365 tenant
Create a tenant
How to get a free Microsoft 365 E5 developer account (Video)
Create your Office 365 tenant account (Ms doc)
Implement and manage domains
Add a domain (Ms doc)
Remove a domain (Ms doc)
Configure organizational settings, including security, privacy, and profile
Change your organization’s address, technical contact, and more (Ms doc)
Basic Security Set Up for Microsoft 365 (Ms doc)
Identify and respond to service health issues
How to check Microsoft 365 service health (Ms doc)
Configure notifications in service health
How to check Microsoft 365 service health (Ms doc) – about half way down the page.
Monitor adoption and usage
Microsoft 365 Reports in the admin center (Ms doc)
Manage users and groups
Create and manage users
Add users one at a time in the dashboard view (Ms doc)
Restore a user in the Microsoft 365 admin center (Ms doc)
Remove a former employee and secure data (Ms doc)
Create and manage guest users
Guest users in Microsoft 365 admin center (Ms doc)
Create and manage contacts
Manage mail contacts in Exchange Online (MS doc)
Create and manage groups, including Microsoft 365 groups
Creating and understanding Microsoft 365 groups (Video)
Create a group in the Microsoft 365 admin center (Ms doc)
Manage and monitor Microsoft 365 license allocations
Assign Microsoft 365 licenses to users (Ms doc)
Unassign Microsoft 365 licenses from users (Ms doc)
Perform bulk user management, including PowerShell
How To Use New-MgUser To Create Users With Microsoft Graph PowerShell (Blog)
How To Assign User Licenses With Microsoft Graph PowerShell (Blog)
Manage roles in Microsoft 365
Manage roles in Microsoft 365 and Azure AD
Assign user roles with Azure Active Directory (Ms doc)
Assign Azure AD roles to users (Ms doc)
Manage role groups for Microsoft Defender, Microsoft Purview, and Microsoft 365
workloads
Create a role-assignable group in Azure Active Directory (Ms doc)
Microsoft Defender for Identity role groups (Ms doc)
Access control in the Microsoft Purview governance portal (Ms doc)
Manage delegation by using administrative units
Create or delete administrative units (Ms doc)
Implement privileged identity management for Azure AD roles
Assign Azure AD roles in Privileged Identity Management (Ms doc)
Implement and manage identity and access in Azure AD
(25–30%)
Implement and manage identity synchronization with Azure AD
Prepare for identity synchronization by using IdFix
Query and fix invalid object attributes with the IdFix tool (Microsoft.Github.io)
Implement and manage directory synchronization by using Azure AD Connect cloud sync
Create a new configuration for Azure AD Connect cloud sync (Ms doc)
How To Migrate To Azure AD Connect Cloud Sync (Blog)
Implement and manage directory synchronization by using Azure AD Connect
Custom installation of Azure Active Directory Connect (Ms doc)
Monitor synchronization by using Azure AD Connect Health
What is Azure AD Connect Health? (Ms doc)
Azure Active Directory Connect Health operations (Ms doc)
Troubleshoot synchronization, including Azure AD Connect and Azure AD Connect cloud
sync
Troubleshoot object synchronization with Azure AD Connect sync (Ms doc)
Azure AD Connect Cloud Sync troubleshooting (Ms doc)
Implement and manage authentication
Implement and manage authentication methods, including Windows Hello for Business,
passwordless, tokens, and the Microsoft Authenticator app
Windows Hello for Business Overview (Ms doc)
Password-less strategy (Ms doc)
Password-less authentication options for Azure Active Directory (Ms doc)
Authentication methods in Azure Active Directory – OATH tokens (MS doc)
Authentication methods in Azure Active Directory – Microsoft Authenticator app (Ms doc)
Implement and manage self-service password reset (SSPR)
Enable users to unlock their account or reset passwords using Azure Active Directory self-service password re
Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog)
Implement and manage Azure AD Password Protection
Combined password policy and check for weak passwords in Azure Active Directory (Ms doc)
Eliminate bad passwords using Azure Active Directory Password Protection (Ms doc)
Enforce on-premises Azure AD Password Protection for Active Directory Domain Services (Ms doc)
Implement and manage multi-factor authentication (MFA)
Secure user sign-in events with Azure AD Multi-Factor Authentication
Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog)
Investigate and resolve authentication issues
Azure AD Authentication and authorization error codes (Ms doc)
Sign-in logs in Azure Active Directory (Ms doc)
Implement and manage secure access
Plan for identity protection
What is Identity Protection? (Ms doc)
Azure AD Identity Protection overview (Microsoft Learn)
Implement and manage Azure AD Identity Protection
Protect your identities with Azure AD Identity Protection (Microsoft Learn)
Plan Conditional Access policies
Plan a Conditional Access deployment (Ms doc)
Implement and manage Conditional Access policies
How to create a Conditional Access policy in Azure Active Directory (Blog)
How to create a Azure AD Conditional Access Policy using PowerShell (Blog)
Manage security and threats by using Microsoft 365
Defender (25–30%)
Manage security reports and alerts by using the Microsoft 365 Defender
portal
Review and take actions to improve the Microsoft Secure Score in the Microsoft 365
Defender portal
Assess your security posture with Microsoft Secure Score (Ms doc)
Track your Microsoft Secure Score history and meet goals (Ms doc)
Review and respond to security incidents and alerts in Microsoft 365 Defender
Prioritize incidents in Microsoft 365 Defender (Ms doc)
Incident response with Microsoft 365 Defender (Ms doc)
Review and respond to issues identified in security and compliance reports in Microsoft
365 Defender
Use and review reports in Microsoft Defender for Business (Ms doc)
Review and respond to threats identified in threat analytics
Track and respond to emerging threats through threat analytics (Ms doc)
Implement and manage email and collaboration protection by using
Microsoft Defender for Office 365
Implement policies and rules in Defender for Office 365
Configure anti-phishing policies in Microsoft Defender for Office 365 (Ms doc)
Set up Safe Attachments policies in Microsoft Defender for Office 365 (Ms doc)
Set up Safe Links policies in Microsoft Defender for Office 365 (Ms doc)
Review and respond to threats identified in Defender for Office 365, including threats and
investigations
Microsoft Defender for Office 365 Security Operations Guide (Ms doc)
Manage incidents and alerts from Microsoft Defender for Office 365 in Microsoft 365 Defender (Ms doc)
Responding to a Compromised Email Account (Ms doc)
Create and run campaigns, such as attack simulation
How To Run Attack Simulation Training in Microsoft 365 (Blog)
Unblock users
Remove blocked users from the Restricted users portal in Microsoft 365 (Ms doc)
Implement and manage endpoint protection by using Microsoft
Defender for Endpoint
Onboard devices to Defender for Endpoint
Defender for Endpoint onboarding Windows Client (Ms doc)
Defender for Endpoint onboarding Windows Server (MS doc)
Onboard non-Windows devices (Ms doc)
Configure Defender for Endpoint settings
Configure Microsoft Defender for Endpoint in Intune (Ms doc)
Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager (Ms doc)
Review and respond to endpoint vulnerabilities
Overview of endpoint detection and response (Ms doc)
Take response actions on a device (Ms doc)
Review and respond to risks identified in the Microsoft Defender Vulnerability Management
dashboard
Use your vulnerability management dashboard in Microsoft Defender for Business (Ms doc)
View and manage incidents in Microsoft Defender for Business (Ms doc)
Respond to and mitigate threats in Microsoft Defender for Business (Ms doc)
Manage compliance by using Microsoft Purview (15–
20%)
Implement Microsoft Purview information protection and data lifecycle
management
Implement and manage sensitive info types by using keywords, keyword lists, or regular
expressions
Create custom sensitive information types in the Compliance center (Ms doc)
Implement retention labels, retention label policies, and retention policies
Publish retention labels and apply them in apps (Ms doc)
Automatically apply a retention label to retain or delete content (Ms doc)
Create and configure retention policies (Ms doc)
Implement sensitivity labels and sensitivity label policies
Create and configure sensitivity labels and their policies (Ms doc)
Apply a sensitivity label to content automatically (Ms doc)
Implement Microsoft Purview data loss prevention (DLP)
Implement DLP for workloads
Create and Deploy data loss prevention policies (Ms doc)
Implement Endpoint DLP
Get started with Endpoint data loss prevention (Ms doc)
Configure endpoint data loss prevention settings (Ms doc)
Review and respond to DLP alerts, events, and reports
Get started with the data loss prevention Alerts dashboard (Ms doc)
ContentRemoteLink ContentLocalLink
#N/A
#N/A
#N/A
https://www.youtube.com/watch?v=PW3ZTTEM2wk&t=22s
https://learn.microsoft.com/en-us/microsoft-365/education/deploy/create-your-office-365-tenant
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/setup/add-domain?view=o365-worldwide
https://learn.microsoft.com/en-us/microsoft-365/admin/get-help-with-domains/remove-a-domain?view=o365-
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/manage/change-address-contact-and-more?view=o36
https://learn.microsoft.com/en-us/microsoft-365/community/basic-security-set-up-for-microsoft-365
#N/A
https://learn.microsoft.com/en-us/microsoft-365/enterprise/view-service-health?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/microsoft-365/enterprise/view-service-health?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/activity-reports/activity-reports?view=o365-worldwide
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/add-users?view=o365-worldwide#add-users
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/restore-user?view=o365-worldwide
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/remove-former-employee?view=o365-world
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/about-guest-users?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/exchange/recipients-in-exchange-online/manage-mail-contacts
#N/A
https://www.youtube.com/watch?v=SgTOu4ev18c&t=14s
https://learn.microsoft.com/en-us/microsoft-365/admin/create-groups/create-groups?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/manage/assign-licenses-to-users?view=o365-worldwid
https://learn.microsoft.com/en-us/microsoft-365/admin/manage/remove-licenses-from-users?view=o365-world
#N/A
https://ourcloudnetwork.com/how-to-use-new-mguser-to-create-users-with-microsoft-graph-powershell/
https://ourcloudnetwork.com/how-to-assign-user-licenses-with-microsoft-graph-powershell/
#N/A
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-assign-role-azure
https://learn.microsoft.com/en-us/azure/active-directory/roles/manage-roles-portal
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/roles/groups-create-eligible
https://learn.microsoft.com/en-us/defender-for-identity/role-groups
https://learn.microsoft.com/en-us/azure/purview/catalog-permissions
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/roles/admin-units-manage
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-add-role
#N/A
#N/A
#N/A
https://microsoft.github.io/idfix/
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/cloud-sync/how-to-configure
https://ourcloudnetwork.com/how-to-migrate-to-azure-ad-connect-cloud-sync/
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-custom
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/whatis-azure-ad-connect#what-is-azure-ad-co
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-health-operations?source=rec
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/tshoot-connect-objectsync
https://learn.microsoft.com/en-us/azure/active-directory/cloud-sync/how-to-troubleshoot
#N/A
#N/A
https://learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-overview
https://learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/passwordless-strate
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-passwordless
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-oath-tokens
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-authenticator
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/authentication/tutorial-enable-sspr
https://ourcloudnetwork.com/migrate-legacy-mfa-and-sspr-policies-to-authentication-methods/
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-combined
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-combined
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premis
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/authentication/tutorial-enable-azure-mfa
https://ourcloudnetwork.com/migrate-legacy-mfa-and-sspr-policies-to-authentication-methods/
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/develop/reference-aadsts-error-codes
https://learn.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-sign-ins
#N/A
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection
https://learn.microsoft.com/en-us/training/modules/protect-identities-with-aad-idp/2-azure-ad-idp-overview
#N/A
https://learn.microsoft.com/en-us/training/modules/protect-identities-with-aad-idp/
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access
#N/A
https://ourcloudnetwork.com/how-to-create-a-conditional-access-policy-in-azure-active-directory/
https://ourcloudnetwork.com/create-a-azure-ad-conditional-access-policy-using-powershell/
#N/A
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score-improvement-actio
https://learn.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score-history-metrics-tre
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender/incident-queue?view=o365-worldwide
https://learn.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender-business/mdb-reports?view=o365-worldwi
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/threat-analytics?view=o365-worl
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-config
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/safe-attachments-policies-configu
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/safe-links-policies-configure?view
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/mdo-sec-ops-guide?view=o365-w
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/mdo-sec-ops-manage-incidents-a
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/responding-to-a-compromised-em
#N/A
https://ourcloudnetwork.com/how-to-run-attack-simulation-training-in-microsoft-365/
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/removing-user-from-restricted-us
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/onboard-windows-client?view=o
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/onboard-windows-server?view=o
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-endpoints-non-window
#N/A
https://learn.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection-configure
https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/overview-endpoint-detection-res
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/respond-machine-alerts?view=o3
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender-business/mdb-view-tvm-dashboard?view=o
https://learn.microsoft.com/en-us/microsoft-365/security/defender-business/mdb-view-manage-incidents?view
https://learn.microsoft.com/en-us/microsoft-365/security/defender-business/mdb-respond-mitigate-threats?vi
#N/A
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/create-a-custom-sensitive-information-type?view
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/create-apply-retention-labels?view=o365-worldw
https://learn.microsoft.com/en-gb/microsoft-365/compliance/apply-retention-labels-automatically?view=o365-
https://learn.microsoft.com/en-us/microsoft-365/compliance/create-retention-policies?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/create-sensitivity-labels?view=o365-worldwide
https://learn.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-w
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-create-deploy-policy?view=o365-worldwide
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwi
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-configure-endpoint-settings?view=o365-world
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-alerts-dashboard-get-started?view=o365-wor
ce-365-tenant
365-worldwide
ove-a-domain?view=o365-worldwide
ntact-and-more?view=o365-worldwide
or-microsoft-365
w=o365-worldwide
w=o365-worldwide
orts?view=o365-worldwide
o365-worldwide#add-users-one-at-a-time-in-the-dashboard-view
w=o365-worldwide
employee?view=o365-worldwide
s?view=o365-worldwide
mail-contacts
s?view=o365-worldwide
users?view=o365-worldwide
om-users?view=o365-worldwide
ft-graph-powershell/
tory-users-assign-role-azure-portal
ment/pim-how-to-add-role-to-user
tall-custom
nnect#what-is-azure-ad-connect-health
alth-operations?source=recommendations
usiness/hello-overview
usiness/passwordless-strategy
thentication-passwordless
thentication-oath-tokens
thentication-authenticator-app
n-methods/
ssword-ban-bad-combined-policy
ssword-ban-bad-combined-policy
ssword-ban-bad-on-premises
able-azure-mfa
n-methods/
error-codes
ew-identity-protection
2-azure-ad-idp-overview
nditional-access
tive-directory/
e-score-improvement-actions?view=o365-worldwide
e-score-history-metrics-trends?view=o365-worldwide
view=o365-worldwide
ew?view=o365-worldwide
eports?view=o365-worldwide
-analytics?view=o365-worldwide
hishing-policies-mdo-configure?view=o365-worldwide
ttachments-policies-configure?view=o365-worldwide
nks-policies-configure?view=o365-worldwide
ec-ops-guide?view=o365-worldwide
ec-ops-manage-incidents-and-alerts?view=o365-worldwide
nding-to-a-compromised-email-account?view=o365-worldwide
ing-user-from-restricted-users-portal-after-spam?view=o365-worldwide
rd-windows-client?view=o365-worldwide
rd-windows-server?view=o365-worldwide
ure-endpoints-non-windows?view=o365-worldwide
ew=o365-worldwide
ew-endpoint-detection-response?view=o365-worldwide
nd-machine-alerts?view=o365-worldwide
ew-tvm-dashboard?view=o365-worldwide
ew-manage-incidents?view=o365-worldwide
espond-mitigate-threats?view=o365-worldwide
tive-information-type?view=o365-worldwide
-labels?view=o365-worldwide#before-you-begin
-automatically?view=o365-worldwide
es?view=o365-worldwide
s?view=o365-worldwide
automatically?view=o365-worldwide
cy?view=o365-worldwide
tarted?view=o365-worldwide
t-settings?view=o365-worldwide
et-started?view=o365-worldwide
web-scraper-order
ContentID
web-scraper-start-url ContentLinkedRenamed ContentLinkedID
174366595 1 https://ou 1-How to get a free Microsoft 365 E5 developer acc 4
174366595 2 https://ou 2-Create your Office 365 tenant account (Ms doc) 5
174366595 3 https://ou 3-Add a domain (Ms doc) 7
174366595 4 https://ou 4-Remove a domain (Ms doc) 8
174366595 5 https://ou 5-Change your organization’s address, technical con 10
174366595 6 https://ou 6-Basic Security Set Up for Microsoft 365 (Ms doc) 11
174366595 7 https://ou 7-How to check Microsoft 365 service health (Ms do 13
174366595 8 https://ou 8-How to check Microsoft 365 service health (Ms do 15
174366595 9 https://ou 9-Microsoft 365 Reports in the admin center (Ms do 17
174366595 10 https://ou 10-Add users one at a time in the dashboard view ( 20
174366595 11 https://ou 11-Restore a user in the Microsoft 365 admin cente 21
174366595 12 https://ou 12-Remove a former employee and secure data (Ms 22
174366595 13 https://ou 13-Guest users in Microsoft 365 admin center (Ms d 24
174366595 14 https://ou 14-Manage mail contacts in Exchange Online (MS do 26
174366595 15 https://ou 15-Creating and understanding Microsoft 365 group 28
174366595 16 https://ou 16-Create a group in the Microsoft 365 admin cente 29
174366595 17 https://ou 17-Assign Microsoft 365 licenses to users (Ms doc) 31
174366595 18 https://ou 18-Unassign Microsoft 365 licenses from users (Ms 32
174366595 19 https://ou 19-How To Use New-MgUser To Create Users With Mi 34
174366595 20 https://ou 20-How To Assign User Licenses With Microsoft Gra 35
174366595 21 https://ou 21-Assign user roles with Azure Active Directory (Ms 38
174366595 22 https://ou 22-Assign Azure AD roles to users (Ms doc) 39
174366595 23 https://ou 23-Create a role-assignable group in Azure Active Di 41
174366595 24 https://ou 24-Microsoft Defender for Identity role groups (Ms 42
174366595 25 https://ou 25-Access control in the Microsoft Purview governa 43
174366595 26 https://ou 26-Create or delete administrative units (Ms doc) 45
174366595 27 https://ou 27-Assign Azure AD roles in Privileged Identity Ma 47
174366595 28 https://ou 28-Query and fix invalid object attributes with the Id 51
174366595 29 https://ou 29-Create a new configuration for Azure AD Connect 53
174366595 30 https://ou 30-How To Migrate To Azure AD Connect Cloud Sync 54
174366595 31 https://ou 31-Custom installation of Azure Active Directory Co 56
174366595 32 https://ou 32-What is Azure AD Connect Health? (Ms doc) 58
174366595 33 https://ou 33-Azure Active Directory Connect Health operation 59
174366595 34 https://ou 34-Troubleshoot object synchronization with Azure 61
174366595 35 https://ou 35-Azure AD Connect Cloud Sync troubleshooting (M 62
174366595 36 https://ou 36-Windows Hello for Business Overview (Ms doc) 65
174366595 37 https://ou 37-Password-less strategy (Ms doc) 66
174366595 38 https://ou 38-Password-less authentication options for Azure A 67
174366595 39 https://ou 39-Authentication methods in Azure Active Directo 68
174366595 40 https://ou 40-Authentication methods in Azure Active Director 69
174366595 41 https://ou 41-Enable users to unlock their account or reset pas 71
174366595 42 https://ou 42-Migrate Legacy MFA and SSPR Policies to Authen 72
174366595 47 https://ou 47-Migrate Legacy MFA and SSPR Policies to Authen 72
174366595 43 https://ou 43-Combined password policy and check for weak pa 74
174366595 44 https://ou 44-Eliminate bad passwords using Azure Active Dire 75
174366595 45 https://ou 45-Enforce on-premises Azure AD Password Protectio 76
174366595 46 https://ou 46-Secure user sign-in events with Azure AD Multi-F 78
174366595 48 https://ou 48-Azure AD Authentication and authorization error 81
174366595 49 https://ou 49-Sign-in logs in Azure Active Directory (Ms doc) 82
174366595 50 https://ou 50-What is Identity Protection? (Ms doc) 85
174366595 51 https://ou 51-Azure AD Identity Protection overview (Microsoft 86
174366595 52 https://ou 52-Protect your identities with Azure AD Identity Pr 88
174366595 53 https://ou 53-Plan a Conditional Access deployment (Ms doc) 90
174366595 54 https://ou 54-How to create a Conditional Access policy in Azur 92
174366595 55 https://ou 55-How to create a Azure AD Conditional Access Poli 93
174366595 56 https://ou 56-Assess your security posture with Microsoft Secu 97
174366595 57 https://ou 57-Track your Microsoft Secure Score history and m 98
174366595 58 https://ou 58-Prioritize incidents in Microsoft 365 Defender (M 100
174366595 59 https://ou 59-Incident response with Microsoft 365 Defender 101
174366595 60 https://ou 60-Use and review reports in Microsoft Defender fo 103
174366595 61 https://ou 61-Track and respond to emerging threats through t 105
174366595 62 https://ou 62-Configure anti-phishing policies in Microsoft Def 108
174366595 63 https://ou 63-Set up Safe Attachments policies in Microsoft De 109
174366595 64 https://ou 64-Set up Safe Links policies in Microsoft Defender 110
174366595 65 https://ou 65-Microsoft Defender for Office 365 Security Oper 112
174366595 66 https://ou 66-Manage incidents and alerts from Microsoft Defe 113
174366595 67 https://ou 67-Responding to a Compromised Email Account (M 114
174366595 68 https://ou 68-How To Run Attack Simulation Training in Microso 116
174366595 69 https://ou 69-Remove blocked users from the Restricted users 118
174366595 70 https://ou 70-Defender for Endpoint onboarding Windows Clie 121
174366595 71 https://ou 71-Defender for Endpoint onboarding Windows Serv 122
174366595 72 https://ou 72-Onboard non-Windows devices (Ms doc) 123
174366595 73 https://ou 73-Configure Microsoft Defender for Endpoint in In 125
174366595 74 https://ou 74-Manage Microsoft Defender for Endpoint on devi 126
174366595 75 https://ou 75-Overview of endpoint detection and response (M 128
174366595 76 https://ou 76-Take response actions on a device (Ms doc) 129
174366595 77 https://ou 77-Use your vulnerability management dashboard in 131
174366595 78 https://ou 78-View and manage incidents in Microsoft Defender 132
174366595 79 https://ou 79-Respond to and mitigate threats in Microsoft Def 133
174366595 80 https://ou 80-Create custom sensitive information types in th 137
174366595 81 https://ou 81-Publish retention labels and apply them in apps 139
174366595 82 https://ou 82-Automatically apply a retention label to retain o 140
174366595 83 https://ou 83-Create and configure retention policies (Ms doc) 141
174366595 84 https://ou 84-Create and configure sensitivity labels and their 143
174366595 85 https://ou 85-Apply a sensitivity label to content automatically 144
174366595 86 https://ou 86-Create and Deploy data loss prevention policies 147
174366595 87 https://ou 87-Get started with Endpoint data loss prevention ( 149
174366595 88 https://ou 88-Configure endpoint data loss prevention settings 150
174366595 89 https://ou 89-Get started with the data loss prevention Alerts 152
ContentLinked ContentLinkedID
How to get a free Microsoft 365 E5 developer account (Video) 4
Create your Office 365 tenant account (Ms doc) 5
Add a domain (Ms doc) 7
Remove a domain (Ms doc) 8
Change your organization’s address, technical contact, and more (Ms doc) 10
Basic Security Set Up for Microsoft 365 (Ms doc) 11
How to check Microsoft 365 service health (Ms doc) 13
How to check Microsoft 365 service health (Ms doc) – about half way down th 15
Microsoft 365 Reports in the admin center (Ms doc) 17
Add users one at a time in the dashboard view (Ms doc) 20
Restore a user in the Microsoft 365 admin center (Ms doc) 21
Remove a former employee and secure data (Ms doc) 22
Guest users in Microsoft 365 admin center (Ms doc) 24
Manage mail contacts in Exchange Online (MS doc) 26
Creating and understanding Microsoft 365 groups (Video) 28
Create a group in the Microsoft 365 admin center (Ms doc) 29
Assign Microsoft 365 licenses to users (Ms doc) 31
Unassign Microsoft 365 licenses from users (Ms doc) 32
How To Use New-MgUser To Create Users With Microsoft Graph PowerShell (B 34
How To Assign User Licenses With Microsoft Graph PowerShell (Blog) 35
Assign user roles with Azure Active Directory (Ms doc) 38
Assign Azure AD roles to users (Ms doc) 39
Create a role-assignable group in Azure Active Directory (Ms doc) 41
Microsoft Defender for Identity role groups (Ms doc) 42
Access control in the Microsoft Purview governance portal (Ms doc) 43
Create or delete administrative units (Ms doc) 45
Assign Azure AD roles in Privileged Identity Management (Ms doc) 47
Query and fix invalid object attributes with the IdFix tool (Microsoft.Github.io) 51
Create a new configuration for Azure AD Connect cloud sync (Ms doc) 53
How To Migrate To Azure AD Connect Cloud Sync (Blog) 54
Custom installation of Azure Active Directory Connect (Ms doc) 56
What is Azure AD Connect Health? (Ms doc) 58
Azure Active Directory Connect Health operations (Ms doc) 59
Troubleshoot object synchronization with Azure AD Connect sync (Ms doc) 61
Azure AD Connect Cloud Sync troubleshooting (Ms doc) 62
Windows Hello for Business Overview (Ms doc) 65
Password-less strategy (Ms doc) 66
Password-less authentication options for Azure Active Directory (Ms doc) 67
Authentication methods in Azure Active Directory – OATH tokens (MS doc) 68
Authentication methods in Azure Active Directory – Microsoft Authenticator a 69
Enable users to unlock their account or reset passwords using Azure Active Dir 71
Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog) 72
Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog) 72
Combined password policy and check for weak passwords in Azure Active Dire 74
Eliminate bad passwords using Azure Active Directory Password Protection (M 75
Enforce on-premises Azure AD Password Protection for Active Directory Domai 76
Secure user sign-in events with Azure AD Multi-Factor Authentication 78
Azure AD Authentication and authorization error codes (Ms doc) 81
Sign-in logs in Azure Active Directory (Ms doc) 82
What is Identity Protection? (Ms doc) 85
Azure AD Identity Protection overview (Microsoft Learn) 86
Protect your identities with Azure AD Identity Protection (Microsoft Learn) 88
Plan a Conditional Access deployment (Ms doc) 90
How to create a Conditional Access policy in Azure Active Directory (Blog) 92
How to create a Azure AD Conditional Access Policy using PowerShell (Blog) 93
Assess your security posture with Microsoft Secure Score (Ms doc) 97
Track your Microsoft Secure Score history and meet goals (Ms doc) 98
Prioritize incidents in Microsoft 365 Defender (Ms doc) 100
Incident response with Microsoft 365 Defender (Ms doc) 101
Use and review reports in Microsoft Defender for Business (Ms doc) 103
Track and respond to emerging threats through threat analytics (Ms doc) 105
Configure anti-phishing policies in Microsoft Defender for Office 365 (Ms doc) 108
Set up Safe Attachments policies in Microsoft Defender for Office 365 (Ms doc 109
Set up Safe Links policies in Microsoft Defender for Office 365 (Ms doc) 110
Microsoft Defender for Office 365 Security Operations Guide (Ms doc) 112
Manage incidents and alerts from Microsoft Defender for Office 365 in Micros 113
Responding to a Compromised Email Account (Ms doc) 114
How To Run Attack Simulation Training in Microsoft 365 (Blog) 116
Remove blocked users from the Restricted users portal in Microsoft 365 (Ms d 118
Defender for Endpoint onboarding Windows Client (Ms doc) 121
Defender for Endpoint onboarding Windows Server (MS doc) 122
Onboard non-Windows devices (Ms doc) 123
Configure Microsoft Defender for Endpoint in Intune (Ms doc) 125
Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint 126
Overview of endpoint detection and response (Ms doc) 128
Take response actions on a device (Ms doc) 129
Use your vulnerability management dashboard in Microsoft Defender for Busi 131
View and manage incidents in Microsoft Defender for Business (Ms doc) 132
Respond to and mitigate threats in Microsoft Defender for Business (Ms doc) 133
Create custom sensitive information types in the Compliance center (Ms doc) 137
Publish retention labels and apply them in apps (Ms doc) 139
Automatically apply a retention label to retain or delete content (Ms doc) 140
Create and configure retention policies (Ms doc) 141
Create and configure sensitivity labels and their policies (Ms doc) 143
Apply a sensitivity label to content automatically (Ms doc) 144
Create and Deploy data loss prevention policies (Ms doc) 147
Get started with Endpoint data loss prevention (Ms doc) 149
Configure endpoint data loss prevention settings (Ms doc) 150
Get started with the data loss prevention Alerts dashboard (Ms doc) 152
ContentType
ContentLinked-href
ContentLinked-final-href
ContentLinked-doc-name
Video https://www.youtube.com/wat
Ms doc https://learn.microso Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft 3
Ms doc https://learn.microso Microsoft 3
Ms doc https://learn.microso Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft
MS doc https://learn.microso Exchange O
Video https://www.youtube.com/watc
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft
Blog https://ourcloudnetwork.com/how-to-use-new-mguser-to-create-users-with-microsoft-graph-powershell/
Blog https://ourcloudnetwork.com/how-to-assign-user-licenses-with-microsoft-graph-powershell/
Ms doc https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-p
Fundamenta
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microsofMicrosoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Privileged
Microsoft.Ghttps://microsoft.github.io/idfix/
Ms doc https://lea https://lea Hybrid iden
Blog https://ourcloudnetwork.com/how-to-migrate-to-azure-ad-connect-cloud-sync/
Ms doc https://learn.microso Hybrid iden
Ms doc https://learn.microso Hybrid iden
Ms doc https://learn.microso Hybrid iden
Ms doc https://learn.microso Hybrid iden
Ms doc https://learn.microso Hybrid iden
Ms doc https://learn.microso Windows 11
Ms doc https://learn.microso Windows 11
Ms doc https://lea https://lea Authentica
MS doc https://learn.microso Authentica
Ms doc https://learn.microso Authentica
Ms doc https://learn.microsofAuthentica
Blog https://ourcloudnetwork.com/migrate-legacy-mfa-and-sspr-policies-to-authentication-methods/
Blog https://ourcloudnetwork.com/migrate-legacy-mfa-and-sspr-policies-to-authentication-methods/
Ms doc https://learn.microso Authentica
Ms doc https://learn.microso Authentica
Ms doc https://learn.microso Authentica
Ms doc https://learn.microso Authentica
Ms doc https://lea https://lea Microsoft i
Ms doc https://lea https://lea Monitoring
Ms doc https://learn.microsofMicrosoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://lea https://lea Conditiona
Blog https://ourcloudnetwork.com/how-to-create-a-conditional-access-policy-in-azure-active-directory/
Blog https://ourcloudnetwork.com/create-a-azure-ad-conditional-access-policy-using-powershell/
Ms doc https://le https://le Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://le https://le Microsoft D
Ms doc https://learn.microso Microsoft
Ms doc https://lea https://le Office 365
Ms doc https://learn.microso Office 365
Ms doc https://learn.microso Office 365
Ms doc https://learn.microso Office 365
Ms doc https://learn.microso Office 365
Ms doc https://learn.microso Office 365
Blog https://ourcloudnetwork.com/how-to-run-attack-simulation-training-in-microsoft-365/
Ms doc https://learn.microso Office 365
Ms doc https://le https://le Microsoft D
MS doc https://learn.micros Microsoft D
Ms doc https://learn.micros Microsoft D
Ms doc https://le https://lea Microsoft
Ms doc https://learn.micros Microsoft
Ms doc https://learn.micros Microsoft D
Ms doc https://learn.micros Microsoft D
Ms doc https://learn.micros Microsoft D
Ms doc https://learn.micros Microsoft D
Ms doc https://learn.microso Microsoft D
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
Ms doc https://learn.microso Microsoft
ContentLinked-doc-href
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\1-How to get a free Microsoft 365 E5 develope
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 Education deployment
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 Community Content.p
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 for enterprise docume
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 for enterprise docume
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Exchange Online.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\15-Creating and understanding Microsoft 365 g
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft 365 admin center help.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\19-How To Use New-MgUser To Crea
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\20-How To Assign User Licenses With
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\21-Assign user roles with Azure Active Director
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Entra RBAC documentation
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Entra RBAC documentation
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Identity Docu
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Entra RBAC documentation
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Privileged Identity Management docu
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\28-Query and fix invalid object attrib
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Hybrid identity.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\30-How To Migrate To Azure AD Con
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Hybrid identity.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Hybrid identity.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Hybrid identity.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Hybrid identity.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Hybrid identity.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Windows 11 security book 🔗.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Windows 11 security book 🔗.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\42-Migrate Legacy MFA and SSPR Po
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\47-Migrate Legacy MFA and SSPR Po
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Authentication Documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft identity platform.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Monitoring and health documentatio
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Entra ID Protection Docum
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Entra ID Protection Docum
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Entra ID Protection Docum
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Conditional Access Documentation.p
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\54-How to create a Conditional Acce
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\55-How to create a Azure AD Conditi
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender XDR.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender XDR.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender XDR.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender XDR.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Business.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender XDR.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Office 365 security.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Office 365 security.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Office 365 security.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Office 365 security.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Office 365 security.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Office 365 security.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\68-How To Run Attack Simulation Tra
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Office 365 security.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Endpoint.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Endpoint.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Endpoint.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Intune documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Intune documentation.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Endpoint.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Endpoint.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Business.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Business.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Defender for Business.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
file:///C:\xampp\htdocs\imgdwn\python_file_dwn\ourcloudnetwork-ms-102\Contents\Microsoft Purview.pdf
ContentLinked-doc-href2
1-How to get a free Microsoft 365 E5 developer account (Video).mp4
Microsoft 365 Education deployment overview.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 Community Content.pdf
Microsoft 365 for enterprise documentation and resources.pdf
Microsoft 365 for enterprise documentation and resources.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
Exchange Online.pdf
15-Creating and understanding Microsoft 365 groups (Video).mp4
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
Microsoft 365 admin center help.pdf
19-How To Use New-MgUser To Create Users With Microsoft Graph PowerShell (Blog).pdf
20-How To Assign User Licenses With Microsoft Graph PowerShell (Blog).pdf
21-Assign user roles with Azure Active Directory (Ms doc).pdf
Microsoft Entra RBAC documentation.pdf
Microsoft Entra RBAC documentation.pdf
Microsoft Defender for Identity Documentation.pdf
Microsoft Purview.pdf
Microsoft Entra RBAC documentation.pdf
Privileged Identity Management documentation.pdf
28-Query and fix invalid object attributes with the IdFix tool (Microsoft.Github.io).pdf
Hybrid identity.pdf
30-How To Migrate To Azure AD Connect Cloud Sync (Blog).pdf
Hybrid identity.pdf
Hybrid identity.pdf
Hybrid identity.pdf
Hybrid identity.pdf
Hybrid identity.pdf
Windows 11 security book 🔗.pdf
Windows 11 security book 🔗.pdf
Authentication Documentation.pdf
Authentication Documentation.pdf
Authentication Documentation.pdf
Authentication Documentation.pdf
42-Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog).pdf
47-Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog).pdf
Authentication Documentation.pdf
Authentication Documentation.pdf
Authentication Documentation.pdf
Authentication Documentation.pdf
Microsoft identity platform.pdf
Monitoring and health documentation.pdf
Microsoft Entra ID Protection Documentation.pdf
Microsoft Entra ID Protection Documentation.pdf
Microsoft Entra ID Protection Documentation.pdf
Conditional Access Documentation.pdf
54-How to create a Conditional Access policy in Azure Active Directory (Blog).pdf
55-How to create a Azure AD Conditional Access Policy using PowerShell (Blog).pdf
Microsoft Defender XDR.pdf
Microsoft Defender XDR.pdf
Microsoft Defender XDR.pdf
Microsoft Defender XDR.pdf
Microsoft Defender for Business.pdf
Microsoft Defender XDR.pdf
Office 365 security.pdf
Office 365 security.pdf
Office 365 security.pdf
Office 365 security.pdf
Office 365 security.pdf
Office 365 security.pdf
68-How To Run Attack Simulation Training in Microsoft 365 (Blog).pdf
Office 365 security.pdf
Microsoft Defender for Endpoint.pdf
Microsoft Defender for Endpoint.pdf
Microsoft Defender for Endpoint.pdf
Microsoft Intune documentation.pdf
Microsoft Intune documentation.pdf
Microsoft Defender for Endpoint.pdf
Microsoft Defender for Endpoint.pdf
Microsoft Defender for Business.pdf
Microsoft Defender for Business.pdf
Microsoft Defender for Business.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
Microsoft Purview.pdf
ContentID ContentName
48
Implement and manage identity and access in Azure AD
(25–30%)
49 Implement and manage identity synchronization with Azure AD
50 Prepare for identity synchronization by using IdFix
51 Query and fix invalid object attributes with the IdFix tool (Microsoft.Github.io)
52 Implement and manage directory synchronization by using Azure AD Connect cloud sync
53 Create a new configuration for Azure AD Connect cloud sync (Ms doc)
54 How To Migrate To Azure AD Connect Cloud Sync (Blog)
55 Implement and manage directory synchronization by using Azure AD Connect
56 Custom installation of Azure Active Directory Connect (Ms doc)
57 Monitor synchronization by using Azure AD Connect Health
58 What is Azure AD Connect Health? (Ms doc)
59 Azure Active Directory Connect Health operations (Ms doc)
Troubleshoot synchronization, including Azure AD Connect and Azure AD Connect cloud
60
sync
61 Troubleshoot object synchronization with Azure AD Connect sync (Ms doc)
62 Azure AD Connect Cloud Sync troubleshooting (Ms doc)
63 Implement and manage authentication
Implement and manage authentication methods, including Windows Hello for Business,
64
passwordless, tokens, and the Microsoft Authenticator app
65 Windows Hello for Business Overview (Ms doc)
66 Password-less strategy (Ms doc)
67 Password-less authentication options for Azure Active Directory (Ms doc)
68 Authentication methods in Azure Active Directory – OATH tokens (MS doc)
69 Authentication methods in Azure Active Directory – Microsoft Authenticator app (Ms doc)
70 Implement and manage self-service password reset (SSPR)
71 Enable users to unlock their account or reset passwords using Azure Active Directory self-service password reset (Ms doc)
72 Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog)
73 Implement and manage Azure AD Password Protection
74 Combined password policy and check for weak passwords in Azure Active Directory (Ms doc)
75 Eliminate bad passwords using Azure Active Directory Password Protection (Ms doc)
76 Enforce on-premises Azure AD Password Protection for Active Directory Domain Services (Ms doc)
77 Implement and manage multi-factor authentication (MFA)
78 Secure user sign-in events with Azure AD Multi-Factor Authentication
79 Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog)
80 Investigate and resolve authentication issues
81 Azure AD Authentication and authorization error codes (Ms doc)
82 Sign-in logs in Azure Active Directory (Ms doc)
83 Implement and manage secure access
84 Plan for identity protection
85 What is Identity Protection? (Ms doc)
86 Azure AD Identity Protection overview (Microsoft Learn)
87 Implement and manage Azure AD Identity Protection
88 Protect your identities with Azure AD Identity Protection (Microsoft Learn)
89 Plan Conditional Access policies
90 Plan a Conditional Access deployment (Ms doc)
91 Implement and manage Conditional Access policies
92 How to create a Conditional Access policy in Azure Active Directory (Blog)
93 How to create a Azure AD Conditional Access Policy using PowerShell (Blog)
94
Manage security and threats by using Microsoft 365
Defender (25–30%)
95
Manage security reports and alerts by using the Microsoft 365 Defender
96
portal
Review and take actions to improve the Microsoft Secure Score in the Microsoft 365
Defender portal
97 Assess your security posture with Microsoft Secure Score (Ms doc)
98 Track your Microsoft Secure Score history and meet goals (Ms doc)
99 Review and respond to security incidents and alerts in Microsoft 365 Defender
100 Prioritize incidents in Microsoft 365 Defender (Ms doc)
101 Incident response with Microsoft 365 Defender (Ms doc)
Review and respond to issues identified in security and compliance reports in Microsoft
102
365 Defender
103 Use and review reports in Microsoft Defender for Business (Ms doc)
104 Review and respond to threats identified in threat analytics
105 Track and respond to emerging threats through threat analytics (Ms doc)
106
Implement and manage email and collaboration protection by using
Microsoft Defender for Office 365
107 Implement policies and rules in Defender for Office 365
108 Configure anti-phishing policies in Microsoft Defender for Office 365 (Ms doc)
109 Set up Safe Attachments policies in Microsoft Defender for Office 365 (Ms doc)
110 Set up Safe Links policies in Microsoft Defender for Office 365 (Ms doc)
Review and respond to threats identified in Defender for Office 365, including threats and
111
investigations
112 Microsoft Defender for Office 365 Security Operations Guide (Ms doc)
113 Manage incidents and alerts from Microsoft Defender for Office 365 in Microsoft 365 Defender (Ms doc)
114 Responding to a Compromised Email Account (Ms doc)
115 Create and run campaigns, such as attack simulation
116 How To Run Attack Simulation Training in Microsoft 365 (Blog)
117 Unblock users
118 Remove blocked users from the Restricted users portal in Microsoft 365 (Ms doc)
119
Implement and manage endpoint protection by using Microsoft
Defender for Endpoint
120 Onboard devices to Defender for Endpoint
121 Defender for Endpoint onboarding Windows Client (Ms doc)
122 Defender for Endpoint onboarding Windows Server (MS doc)
123 Onboard non-Windows devices (Ms doc)
124 Configure Defender for Endpoint settings
125 Configure Microsoft Defender for Endpoint in Intune (Ms doc)
126 Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager (Ms doc)
127 Review and respond to endpoint vulnerabilities
128 Overview of endpoint detection and response (Ms doc)
129 Take response actions on a device (Ms doc)
Review and respond to risks identified in the Microsoft Defender Vulnerability Management
130
dashboard
131 Use your vulnerability management dashboard in Microsoft Defender for Business (Ms doc)
132 View and manage incidents in Microsoft Defender for Business (Ms doc)
133 Respond to and mitigate threats in Microsoft Defender for Business (Ms doc)
134
Manage compliance by using Microsoft Purview (15–
20%)
Implement Microsoft Purview information protection and data lifecycle
135
management
Implement and manage sensitive info types by using keywords, keyword lists, or regular
136
expressions
137 Create custom sensitive information types in the Compliance center (Ms doc)
138 Implement retention labels, retention label policies, and retention policies
139 Publish retention labels and apply them in apps (Ms doc)
140 Automatically apply a retention label to retain or delete content (Ms doc)
141 Create and configure retention policies (Ms doc)
142 Implement sensitivity labels and sensitivity label policies
143 Create and configure sensitivity labels and their policies (Ms doc)
144 Apply a sensitivity label to content automatically (Ms doc)
145 Implement Microsoft Purview data loss prevention (DLP)
146 Implement DLP for workloads
147 Create and Deploy data loss prevention policies (Ms doc)
148 Implement Endpoint DLP
149 Get started with Endpoint data loss prevention (Ms doc)
150 Configure endpoint data loss prevention settings (Ms doc)
151 Review and respond to DLP alerts, events, and reports
152 Get started with the data loss prevention Alerts dashboard (Ms doc)
ContentLi
ContentRemoteLink ContentLocalLink nkedID
ContentLinked-doc-href2
#N/A
#N/A
#N/A
https://www.youtube.com/watch?v=PW3ZTTEM2wk&t=22s 4 1-How to get a free Microsoft 365 E5 developer account (Video).mp4
https://learn.microsoft.com/en-us/microsoft-365/education/deploy/c 5 Microsoft 365 Education deployment overview.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/setup/add 7 Microsoft 365 admin center help.pdf
https://learn.microsoft.com/en-us/microsoft-365/admin/get-help- 8 Microsoft 365 admin center help.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/manage/ch 10 Microsoft 365 admin center help.pdf
https://learn.microsoft.com/en-us/microsoft-365/community/basic-se 11 Microsoft 365 Community Content.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/enterprise/view-s 13 Microsoft 365 for enterprise documentation and resources.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/enterprise/view-s 15 Microsoft 365 for enterprise documentation and resources.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/activity-rep 17 Microsoft 365 admin center help.pdf
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/ 20 Microsoft 365 admin center help.pdf
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/ 21 Microsoft 365 admin center help.pdf
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users 22 Microsoft 365 admin center help.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/ 24 Microsoft 365 admin center help.pdf
#N/A
https://learn.microsoft.com/en-us/exchange/recipients-in-exchange- 26 Exchange Online.pdf
#N/A
https://www.youtube.com/watch?v=SgTOu4ev18c&t=14s 28 15-Creating and understanding Microsoft 365 groups (Video).mp4
https://learn.microsoft.com/en-us/microsoft-365/admin/create-gro 29 Microsoft 365 admin center help.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/admin/manage/assi 31 Microsoft 365 admin center help.pdf
https://learn.microsoft.com/en-us/microsoft-365/admin/manage/re 32 Microsoft 365 admin center help.pdf
#N/A
https://ourcloudnetwork.com/how-to-use-new-mguser-to-create-user 34 19-How To Use New-MgUser To Create Users With Microsoft Graph PowerShell (Blog).pdf
https://ourcloudnetwork.com/how-to-assign-user-licenses-with-micro 35 20-How To Assign User Licenses With Microsoft Graph PowerShell (Blog).pdf
#N/A
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/fundamental 38 21-Assign user roles with Azure Active Directory (Ms doc).pdf
https://learn.microsoft.com/en-us/azure/active-directory/roles/manag 39 Microsoft Entra RBAC documentation.pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/roles/groups 41 Microsoft Entra RBAC documentation.pdf
https://learn.microsoft.com/en-us/defender-for-identity/role-groups 42 Microsoft Defender for Identity Documentation.pdf
https://learn.microsoft.com/en-us/azure/purview/catalog-permission 43 Microsoft Purview.pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/roles/adm 45 Microsoft Entra RBAC documentation.pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/privilege 47 Privileged Identity Management documentation.pdf
#N/A
#N/A
#N/A
https://microsoft.github.io/idfix/ 51 28-Query and fix invalid object attributes with the IdFix tool (Microsoft.Github.io).pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/cloud-sync 53 Hybrid identity.pdf
https://ourcloudnetwork.com/how-to-migrate-to-azure-ad-connect-c 54 30-How To Migrate To Azure AD Connect Cloud Sync (Blog).pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how 56 Hybrid identity.pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/wha 58 Hybrid identity.pdf
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/h 59 Hybrid identity.pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/tsh 61 Hybrid identity.pdf
https://learn.microsoft.com/en-us/azure/active-directory/cloud-sync 62 Hybrid identity.pdf
#N/A
#N/A
https://learn.microsoft.com/en-us/windows/security/identity-protect 65 Windows 11 security book 🔗.pdf
https://learn.microsoft.com/en-us/windows/security/identity-protect 66 Windows 11 security book 🔗.pdf
https://learn.microsoft.com/en-us/azure/active-directory/authentica 67 Authentication Documentation.pdf
https://learn.microsoft.com/en-us/azure/active-directory/authentica 68 Authentication Documentation.pdf
https://learn.microsoft.com/en-us/azure/active-directory/authentica 69 Authentication Documentation.pdf
#N/A
71
https://learn.microsoft.com/en-us/azure/active-directory/authenticat Authentication Documentation.pdf
https://ourcloudnetwork.com/migrate-legacy-mfa-and-sspr-policies-t 72 42-Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog).pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/authentic 74 Authentication Documentation.pdf
https://learn.microsoft.com/en-us/azure/active-directory/authentic 75 Authentication Documentation.pdf
76
https://learn.microsoft.com/en-us/azure/active-directory/authentic Authentication Documentation.pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/authenticat 78 Authentication Documentation.pdf
https://ourcloudnetwork.com/migrate-legacy-mfa-and-sspr-policies-t 72 47-Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog).pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/develop/re 81 Microsoft identity platform.pdf
https://learn.microsoft.com/en-us/azure/active-directory/reports-mon 82 Monitoring and health documentation.pdf
#N/A
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/identity-pr 85 Microsoft Entra ID Protection Documentation.pdf
https://learn.microsoft.com/en-us/training/modules/protect-identiti 86 Microsoft Entra ID Protection Documentation.pdf
#N/A
https://learn.microsoft.com/en-us/training/modules/protect-identitie 88 Microsoft Entra ID Protection Documentation.pdf
#N/A
https://learn.microsoft.com/en-us/azure/active-directory/conditional 90 Conditional Access Documentation.pdf
#N/A
https://ourcloudnetwork.com/how-to-create-a-conditional-access-poli 92 54-How to create a Conditional Access policy in Azure Active Directory (Blog).pdf
https://ourcloudnetwork.com/create-a-azure-ad-conditional-access-po 93 55-How to create a Azure AD Conditional Access Policy using PowerShell (Blog).pdf
#N/A
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender 97 Microsoft Defender XDR.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/defender/ 98 Microsoft Defender XDR.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender 100 Microsoft Defender XDR.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/defender 101 Microsoft Defender XDR.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender 103 Microsoft Defender for Business.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender- 105 Microsoft Defender XDR.pdf
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/office-365 108 Office 365 security.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/office-365 109 Office 365 security.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/office-365- 110 Office 365 security.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/office-36 112 Office 365 security.pdf
113
https://learn.microsoft.com/en-us/microsoft-365/security/office-36 Office 365 security.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/office-3 114 Office 365 security.pdf
#N/A
https://ourcloudnetwork.com/how-to-run-attack-simulation-training- 116 68-How To Run Attack Simulation Training in Microsoft 365 (Blog).pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/office-36 118 Office 365 security.pdf
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defende 121 Microsoft Defender for Endpoint.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/defende 122 Microsoft Defender for Endpoint.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/defende 123 Microsoft Defender for Endpoint.pdf
#N/A
https://learn.microsoft.com/en-us/mem/intune/protect/advanced-thr 125 Microsoft Intune documentation.pdf
126
https://learn.microsoft.com/en-us/mem/intune/protect/mde-securit Microsoft Intune documentation.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defender 128 Microsoft Defender for Endpoint.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/defender 129 Microsoft Defender for Endpoint.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/security/defende 131 Microsoft Defender for Business.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/defende 132 Microsoft Defender for Business.pdf
https://learn.microsoft.com/en-us/microsoft-365/security/defender 133 Microsoft Defender for Business.pdf
#N/A
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/create 137 Microsoft Purview.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/create 139 Microsoft Purview.pdf
https://learn.microsoft.com/en-gb/microsoft-365/compliance/apply- 140 Microsoft Purview.pdf
https://learn.microsoft.com/en-us/microsoft-365/compliance/create 141 Microsoft Purview.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/create- 143 Microsoft Purview.pdf
https://learn.microsoft.com/en-us/microsoft-365/compliance/apply-s 144 Microsoft Purview.pdf
#N/A
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-cr 147 Microsoft Purview.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/endpoi 149 Microsoft Purview.pdf
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-co 150 Microsoft Purview.pdf
#N/A
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-al 152 Microsoft Purview.pdf
ft Graph PowerShell (Blog).pdf
erShell (Blog).pdf
(Microsoft.Github.io).pdf
Methods (Blog).pdf
Methods (Blog).pdf
e Directory (Blog).pdf
g PowerShell (Blog).pdf
Conte ContentLi
ContentName ContentLinked-doc-href2
ntID nkedID
1
Deploy and manage a Microsoft 365 tenant
(25–30%)
2 Implement and manage a Microsoft 365 tenant
3 Create a tenant
4 How to get a free Microsoft 365 E5 developer account (Video) 4 1-How to get a free Microsoft 365 E5 developer account (Video).mp4
5 Create your Office 365 tenant account (Ms doc) 5 Microsoft 365 Education deployment overview.pdf
6 Implement and manage domains
7 Add a domain (Ms doc) 7 Microsoft 365 admin center help.pdf
8 Remove a domain (Ms doc) 8 Microsoft 365 admin center help.pdf
Configure organizational settings, including security, privacy, and
9
profile
10 Change your organization’s address, technical contact, and more (Ms doc) 10 Microsoft 365 admin center help.pdf
11 Basic Security Set Up for Microsoft 365 (Ms doc) 11 Microsoft 365 Community Content.pdf
12 Identify and respond to service health issues
13 How to check Microsoft 365 service health (Ms doc) 13 Microsoft 365 for enterprise documentation and resources.pdf
14 Configure notifications in service health
15 How to check Microsoft 365 service health (Ms doc) – about half way down the page.
15 Microsoft 365 for enterprise documentation and resources.pdf
34 How To Use New-MgUser To Create Users With Microsoft Graph PowerShell (Blog)34 19-How To Use New-MgUser To Create Users With Microsoft Graph PowerShe
35 How To Assign User Licenses With Microsoft Graph PowerShell (Blog) 35 20-How To Assign User Licenses With Microsoft Graph PowerShell (Blog).pdf
48
Implement and manage identity and
access in Azure AD (25–30%)
49
Implement and manage identity synchronization with
50
Azure AD
Prepare for identity synchronization by using IdFix
51 Query and fix invalid object attributes with the IdFix tool (Microsoft.Github.io) 51 28-Query and fix invalid object attributes with the IdFix tool (Microsoft.Github
Implement and manage directory synchronization by using Azure AD
52
Connect cloud sync
53 Create a new configuration for Azure AD Connect cloud sync (Ms doc) 53 Hybrid identity.pdf
54 How To Migrate To Azure AD Connect Cloud Sync (Blog) 54 30-How To Migrate To Azure AD Connect Cloud Sync (Blog).pdf
Implement and manage directory synchronization by using Azure AD
55
Connect
56 Custom installation of Azure Active Directory Connect (Ms doc) 56 Hybrid identity.pdf
57 Monitor synchronization by using Azure AD Connect Health
58 What is Azure AD Connect Health? (Ms doc) 58 Hybrid identity.pdf
59 Azure Active Directory Connect Health operations (Ms doc) 59 Hybrid identity.pdf
Troubleshoot synchronization, including Azure AD Connect and Azure
60
AD Connect cloud sync
61 Troubleshoot object synchronization with Azure AD Connect sync (Ms doc) 61 Hybrid identity.pdf
67 Password-less authentication options for Azure Active Directory (Ms doc) 67 Authentication Documentation.pdf
68 Authentication methods in Azure Active Directory – OATH tokens (MS doc) 68 Authentication Documentation.pdf
71 Enable users to unlock their account or reset passwords using Azure Active Directory
71 self-service password
Authentication reset (Ms doc)
Documentation.pdf
72 Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog) 72 42-Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog).p
75 Eliminate bad passwords using Azure Active Directory Password Protection (Ms doc)
75 Authentication Documentation.pdf
76 Enforce on-premises Azure AD Password Protection for Active Directory Domain Services
76 (Ms doc)
Authentication Documentation.pdf
79 Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog) 72 47-Migrate Legacy MFA and SSPR Policies to Authentication Methods (Blog).p
88 Protect your identities with Azure AD Identity Protection (Microsoft Learn) 88 Microsoft Entra ID Protection Documentation.pdf
92 How to create a Conditional Access policy in Azure Active Directory (Blog) 92 54-How to create a Conditional Access policy in Azure Active Directory (Blog).p
93 How to create a Azure AD Conditional Access Policy using PowerShell (Blog) 93 55-How to create a Azure AD Conditional Access Policy using PowerShell (Blog
94
Manage security and threats by using
Microsoft 365 Defender (25–30%)
95
Manage security reports and alerts by using the
Microsoft 365 Defender portal
Review and take actions to improve the Microsoft Secure Score in the
96
Microsoft 365 Defender portal
97 Assess your security posture with Microsoft Secure Score (Ms doc) 97 Microsoft Defender XDR.pdf
98 Track your Microsoft Secure Score history and meet goals (Ms doc) 98 Microsoft Defender XDR.pdf
Review and respond to security incidents and alerts in Microsoft 365
99
Defender
100 Prioritize incidents in Microsoft 365 Defender (Ms doc) 100 Microsoft Defender XDR.pdf
101 Incident response with Microsoft 365 Defender (Ms doc) 101 Microsoft Defender XDR.pdf
Review and respond to issues identified in security and compliance
102
reports in Microsoft 365 Defender
103 Use and review reports in Microsoft Defender for Business (Ms doc) 103 Microsoft Defender for Business.pdf
104 Review and respond to threats identified in threat analytics
105 Track and respond to emerging threats through threat analytics (Ms doc) 105 Microsoft Defender XDR.pdf
106
Implement and manage email and collaboration
protection by using Microsoft Defender for Office 365
107 Implement policies and rules in Defender for Office 365
108 Configure anti-phishing policies in Microsoft Defender for Office 365 (Ms doc) 108 Office 365 security.pdf
109 Set up Safe Attachments policies in Microsoft Defender for Office 365 (Ms doc) 109 Office 365 security.pdf
110 Set up Safe Links policies in Microsoft Defender for Office 365 (Ms doc) 110 Office 365 security.pdf
Review and respond to threats identified in Defender for Office 365,
111
including threats and investigations
112 Microsoft Defender for Office 365 Security Operations Guide (Ms doc) 112 Office 365 security.pdf
113 Manage incidents and alerts from Microsoft Defender for Office 365 in Microsoft 113
365 Defender (Ms
Office 365 doc)
security.pdf
114 Responding to a Compromised Email Account (Ms doc) 114 Office 365 security.pdf
115 Create and run campaigns, such as attack simulation
116 How To Run Attack Simulation Training in Microsoft 365 (Blog) 116 68-How To Run Attack Simulation Training in Microsoft 365 (Blog).pdf
117 Unblock users
118 Remove blocked users from the Restricted users portal in Microsoft 365 (Ms doc)118 Office 365 security.pdf
119
Implement and manage endpoint protection by using
Microsoft Defender for Endpoint
120 Onboard devices to Defender for Endpoint
121 Defender for Endpoint onboarding Windows Client (Ms doc) 121 Microsoft Defender for Endpoint.pdf
122 Defender for Endpoint onboarding Windows Server (MS doc) 122 Microsoft Defender for Endpoint.pdf
123 Onboard non-Windows devices (Ms doc) 123 Microsoft Defender for Endpoint.pdf
124 Configure Defender for Endpoint settings
125 Configure Microsoft Defender for Endpoint in Intune (Ms doc) 125 Microsoft Intune documentation.pdf
126 Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager
126 (Ms doc) Intune documentation.pdf
Microsoft
132 View and manage incidents in Microsoft Defender for Business (Ms doc) 132 Microsoft Defender for Business.pdf
133 Respond to and mitigate threats in Microsoft Defender for Business (Ms doc) 133 Microsoft Defender for Business.pdf
134
Manage compliance by using Microsoft
Purview (15–20%)
135
Implement Microsoft Purview information protection
and data lifecycle management
Implement and manage sensitive info types by using keywords,
136
keyword lists, or regular expressions
137 Create custom sensitive information types in the Compliance center (Ms doc) 137 Microsoft Purview.pdf
Implement retention labels, retention label policies, and retention
138
policies
139 Publish retention labels and apply them in apps (Ms doc) 139 Microsoft Purview.pdf
140 Automatically apply a retention label to retain or delete content (Ms doc) 140 Microsoft Purview.pdf
141 Create and configure retention policies (Ms doc) 141 Microsoft Purview.pdf
142 Implement sensitivity labels and sensitivity label policies
143 Create and configure sensitivity labels and their policies (Ms doc) 143 Microsoft Purview.pdf
144 Apply a sensitivity label to content automatically (Ms doc) 144 Microsoft Purview.pdf
145
Implement Microsoft Purview data loss prevention
(DLP)
146 Implement DLP for workloads
147 Create and Deploy data loss prevention policies (Ms doc) 147 Microsoft Purview.pdf
148 Implement Endpoint DLP
149 Get started with Endpoint data loss prevention (Ms doc) 149 Microsoft Purview.pdf
150 Configure endpoint data loss prevention settings (Ms doc) 150 Microsoft Purview.pdf
151 Review and respond to DLP alerts, events, and reports
152 Get started with the data loss prevention Alerts dashboard (Ms doc) 152 Microsoft Purview.pdf
Status
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK
OK