Learn your way! Get started

Microsoft 365 Security Administration, Part 4 of 4: Manage Governance and Compliance Features

with expert Cristian Calinescu


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 10/16/2020
Level Advanced
Runtime 2h 27m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs Included
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Candidates for this (MS-500) exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. This course covers Domain 3 of the exam, which is 25-35% of the test. Knowledge covered includes: Compliance in Microsoft 365, Insider Risk Management and Discover and Respond.

Prerequisites

Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance.

Meet the expert

Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.

Course outline



Compliance in Microsoft 365

Compliance Center (19:54)
  • Introduction (00:08)
  • Compliance Center (02:06)
  • Demo: Compliance Center (08:28)
  • Compliance Score Componennts (03:44)
  • Compliance Score Assessments (05:19)
  • Summary (00:08)

Insider Risk Management

Insider Risk (19:57)
  • Introduction (00:08)
  • Insider Risk (01:19)
  • Insider Risk Management Explained (02:43)
  • Configure Insider Risk Management (05:28)
  • Risk Alerts (02:28)
  • Communications Compliance (02:57)
  • Data Protection Regulation (04:43)
  • Summary (00:08)
Privileged Access (07:30)
  • Introduction (00:08)
  • Privileged Access (00:29)
  • PAM in office 365 (03:38)
  • PAM Flow (00:18)
  • Customer Lockbox (02:48)
  • Summary (00:08)
Information Barriers (09:37)
  • Introduction (00:08)
  • Information Barriers (00:57)
  • Information Barrier Policies (04:58)
  • Innformation Barriers in Teams (03:25)
  • Summary (00:08)
Building Ethical Walls in Exchange Online (13:43)
  • Introduction (00:08)
  • Building Ethical Walls in Exchange Online (01:08)
  • Ethical Walls in Exchange Online (03:39)
  • Ethical Walls using Groups (00:55)
  • Demo: Walls (05:20)
  • Best Practices (02:22)
  • Summary (00:08)

Discover and Respond

Content Search (24:18)
  • Introduction (00:08)
  • Content Search (04:21)
  • Design Content Search (01:47)
  • Demo: Content Search (05:00)
  • Clone Content Search (03:46)
  • Configure Search Permissions (01:39)
  • Search Third Party Data (02:23)
  • Demo: Search Third Party (05:02)
  • Summary (00:08)
Audit Log Investigations (28:04)
  • Introduction (00:08)
  • Audit Log Investigations (01:23)
  • Audit Log Search Explained (02:17)
  • Demo: Auditing (24:08)
  • Summary (00:08)
Advanced eDiscovery (24:14)
  • Introduction (00:08)
  • Advanced eDiscovery (06:33)
  • eDiscovery Workflow (04:44)
  • Configure Advanced eDiscovery (06:35)
  • Analyze Data in Advanced eDiscovery (06:05)
  • Summary (00:08)