Learn your way! Get started

Microsoft 365 Security Administration, Part 3 of 4: Implement and Manage Information Protection

with expert Cristian Calinescu


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 10/16/2020
Level Intermediate
Runtime 5h 4m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs Included
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Candidates for this (MS-500) exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. This course covers Domain 3 of the exam, which is 15-20% of the test. Knowledge covered includes: Cloud Application Security, Information Protection, Rights Management and Encryption, Data Loss Prevention.

Prerequisites

Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance.

Meet the expert

Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.

Course outline



Cloud Application Security

Deploy Cloud Application Security (38:17)
  • Introduction (00:08)
  • Deploy Cloud Application Security (00:46)
  • Cloud App Security (08:52)
  • Deploy Cloud App Security (02:28)
  • Control Cloud Apps with Policies (07:23)
  • App Connectors (04:04)
  • Use Cloud App Security Information (04:17)
  • Risk Score (06:46)
  • Manage Alerts (03:23)
  • Summary (00:08)

Information Protection

Information Protection Concepts (29:32)
  • Introduction (00:08)
  • Information Protection Concepts (01:17)
  • Information Protection Lifecycle (02:49)
  • Digital Estate (02:14)
  • Classification Journey (02:46)
  • Sensitivity Labels (05:58)
  • Sensitivity Label Policies (03:14)
  • Create Sensitivity Labels and Policies (04:13)
  • Demo: Classification (03:41)
  • Sensitivity labels and Information Protection (03:01)
  • Summary (00:08)
Archiving in Microsoft 365 (18:33)
  • Introduction (00:08)
  • Archiving in Microsoft 365 (01:33)
  • Archiving in 365 (03:33)
  • Archiving in Exchange (06:23)
  • Records Management (06:46)
  • Summary (00:08)
Retention in Microsoft 365 (21:24)
  • Introduction (00:08)
  • Retention in Microsoft 365 (05:29)
  • Retention Policies (02:50)
  • Messaging Records Management in Exchange (04:48)
  • Retention Tags (04:49)
  • Calculate Retention (03:10)
  • Summary (00:08)
Retention Policies in Compliance Center (27:45)
  • Introduction (00:08)
  • Retention Policies in Compliance Center (01:01)
  • Retention Explained (08:42)
  • Retention Labels with Policies (06:10)
  • Demo: Retention (06:20)
  • Event Driven Retention (05:14)
  • Summary (00:08)
Archiving and Retention in Exchange (43:12)
  • Introduction (00:08)
  • Archiving and Retention in Exchange (00:45)
  • Create Retention Tags (01:55)
  • Demo: Create Retention tags (17:09)
  • In-place Records Management in SharePoint (01:07)
  • Records Management (09:54)
  • Benefits of Record Management (02:43)
  • Demo: Records Management (09:20)
  • Summary (00:08)

Rights Management and Encryption

Information Rights Management (IRM) (21:50)
  • Introduction (00:08)
  • Information Rights Management (IRM) (00:39)
  • Information Rights Management (02:43)
  • Encryption Options (04:28)
  • Rights Management in Exchange (04:27)
  • Applying IRM Protection to Email (02:43)
  • Rights Management in Sharepoint (03:17)
  • Applying IRM Protection (03:15)
  • Summary (00:08)
Secure Multi-purpose Internet Mail Extension (23:27)
  • Introduction (00:08)
  • Secure Multi-purpose Internet Mail Extension (01:11)
  • S-MIME Explained (06:54)
  • Applying Digital Signatures (04:10)
  • S-MIME Messages (06:21)
  • Digital Signatures and Encryption (02:49)
  • Triple Wrapped Messages (01:44)
  • Summary (00:08)
Office 365 Message Encryption (17:06)
  • Introduction (00:08)
  • Office 365 Message Encryption (01:28)
  • Message Encryption Explained (04:36)
  • How Encryption Works (03:44)
  • Working with Encrypted Emails (07:00)
  • Summary (00:08)

Data Loss Prevention

DLP Fundamentals (29:35)
  • Introduction (00:08)
  • DLP Fundamentals (02:01)
  • DLP Capabilities (02:49)
  • Sensitve Information (10:08)
  • Conditions and Actions (04:32)
  • Policy Tips (03:22)
  • Policy Templates (03:48)
  • Use DLP Policies (02:35)
  • Summary (00:08)
Create a DLP Policy (20:11)
  • Introduction (00:08)
  • Create a DLP Policy (00:23)
  • Demo: DLP (07:23)
  • Customize a DLP policy (00:24)
  • Demo: Customize DLP (11:44)
  • Summary (00:08)
Create a DLP Policy to protect documents (13:35)
  • Introduction (00:08)
  • Create a DLP Policy to protect documents (02:40)
  • Demo: Create Managed Property (03:39)
  • Policy Tips (00:53)
  • Policy Tips in Email (03:15)
  • Policy Tips in Office (02:50)
  • Summary (00:08)