Learn your way! Get started

Microsoft 365 Security Administration, Part 2 of 4: Implement and Manage Threat Protection

with expert Cristian Calinescu


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 10/16/2020
Level Beginner
Runtime 5h 32m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs Included
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Candidates for this (MS-500) exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. This course covers Domain 2 of the exam, which is 20-25% of the test. The knowledge covered include: Security in Microsoft 365, Threat Protection, Threat Management and Mobility.

Prerequisites

Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance.

Meet the expert

Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.

Course outline



Security in Microsoft 365

Threat Vectors and Data Breaches (37:06)
  • Introduction (00:08)
  • Threat Vectors and Data Breaches (01:03)
  • The Workplace and Threat Landscape (07:13)
  • Phishing (03:56)
  • Spoofing (03:00)
  • Spam and Malware (01:53)
  • Account Breach (05:40)
  • Data Exfiltration (03:53)
  • Data Deletion (03:38)
  • Coin Mining (01:49)
  • Other Attacks (04:41)
  • Summary (00:08)
Security Strategy and Principles (25:45)
  • Introduction (00:08)
  • Security Strategy and Principles (00:36)
  • Security Principles (00:56)
  • Measuring Security Success (03:13)
  • Defenders Dilemma (03:10)
  • Raise Attackers Cost (02:37)
  • Microsoft Security Solutions (00:50)
  • Security Center (01:07)
  • Demo: Security Center (03:57)
  • Exchange Online Protection (04:59)
  • Cloud Application Security (03:58)
  • Summary (00:08)
Secure Score (18:38)
  • Introduction (00:08)
  • Secure Score (01:02)
  • Secure Score Explained (05:47)
  • Demo: Secure Score Dashboard (05:41)
  • Secure Score API (01:20)
  • Improve Scurity Posture (04:30)
  • Summary (00:08)

Threat Protection

Exchange Online Protection (EOP) (24:41)
  • Introduction (00:08)
  • Exchange Online Protection (EOP) (02:05)
  • Anti-Malware Pipeline (05:21)
  • Zero-Hour Auto Purge (10:52)
  • Spoof Intelligence (01:30)
  • Manage Spoof Intelligence (00:49)
  • Demo: Spoof (03:45)
  • Summary (00:08)
Office 365 Advanced Threat Protection (34:21)
  • Introduction (00:08)
  • Office 365 Advanced Threat Protection (01:27)
  • ATP Expands on Exchange Online Protection (01:28)
  • Safe Attachments (04:08)
  • Safe Links (04:13)
  • ATP for SharePoint and OneDrive (03:55)
  • Manage Safe Attachments (00:39)
  • Safe Attachment Policies (01:15)
  • Demo: Create Safe Attachment Policy (05:07)
  • Create with PowerShell (03:35)
  • Demo: Modify policy (05:19)
  • End-user Experience with Safe Attachments (02:53)
  • Summary (00:08)
Manage Safe Links (17:38)
  • Introduction (00:08)
  • Manage Safe Links (01:52)
  • Demo: Create Safe Links (05:27)
  • Create Safe Link Policies with PowerShell (01:50)
  • Demo: Modify Safe Links (03:38)
  • End-User Experience with Safe Links (04:33)
  • Summary (00:08)
Azure Advanced Threat Protection (25:26)
  • Introduction (00:08)
  • Azure Advanced Threat Protection (00:47)
  • Azure ATP Explained (06:05)
  • Demo: Azure ATP (18:18)
  • Summary (00:08)
Microsoft Defender Advanced Threat Protection (33:22)
  • Introduction (00:08)
  • Microsoft Defender Advanced Threat Protection (00:39)
  • Defender ATP Explained (05:12)
  • Configure Defender ATP (05:45)
  • Defender ATP with security Center (05:49)
  • Defender Application Control (06:28)
  • Demo: Windows Defender (02:54)
  • Security Configuration Framework (06:17)
  • Summary (00:08)

Threat Management

Security Dashboard (35:55)
  • Introduction (00:08)
  • Security Dashboard (01:43)
  • Threat Dashboard (04:11)
  • Demo: Threats (03:41)
  • More Insights (01:01)
  • Demo: Alert (02:51)
  • Threat Investigation and Response (01:06)
  • Threat Explorer (02:01)
  • Demo: threat Explorer (04:32)
  • Automated Investigation Response (04:55)
  • Demo: Automated Investigation Response (04:26)
  • Graph Security API (05:07)
  • Summary (00:08)
Azure Sentinel (23:54)
  • Introduction (00:08)
  • Azure Sentinel (01:03)
  • Sentinel Overview (06:06)
  • Connect Data Sources (01:15)
  • Analytics (07:36)
  • Demo: Sentinel (07:36)
  • Summary (00:08)

Mobility

Mobile Application Management (MAM) (30:34)
  • Introduction (00:08)
  • Mobile Application Management (MAM) (00:33)
  • Mobile Application Management (04:58)
  • Using Configuration Manager (05:57)
  • Application Considerations (03:19)
  • Mobile Device Management (MDM) (05:56)
  • Compare MDM and Intune (02:03)
  • Policy Settings for Mobile Devices (02:32)
  • Control Email and Document Access (02:11)
  • Demo: Control Access (02:45)
  • Summary (00:08)
Deploy Mobile Device Services (25:23)
  • Introduction (00:08)
  • Deploy Mobile Device Services (00:30)
  • Activate MDM Services (02:33)
  • Deploy MDM (03:42)
  • Configure APN Certificate for IOS (05:08)
  • Define Corporate Device Enrollment Policy (01:41)
  • Enroll Devices to MDM (01:05)
  • Enroll Windows 10 and Android Devices (04:34)
  • Demo: Enrollment (02:30)
  • Enrollment Rules (01:42)
  • Multi-Factor Authentication Considerations (01:37)
  • Summary (00:08)