MS-500: Microsoft 365 Security Admin, Part 4 of 4: Manage Governance & Compliance Features
with expert Cristian Calinescu
Course description
Candidates for this (MS-500) exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. This course covers Domain 3 of the exam, which is 25-35% of the test. Knowledge covered includes: Compliance in Microsoft 365, Insider Risk Management and Discover and Respond.
Prerequisites
Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance.
Meet the expert
Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.
Course outline
Compliance in Microsoft 365
Compliance Center (19:54)
- Introduction (00:08)
- Compliance Center (02:06)
- Demo: Compliance Center (08:28)
- Compliance Score Componennts (03:44)
- Compliance Score Assessments (05:19)
- Summary (00:08)
Insider Risk Management
Insider Risk (19:57)
- Introduction (00:08)
- Insider Risk (01:19)
- Insider Risk Management Explained (02:43)
- Configure Insider Risk Management (05:28)
- Risk Alerts (02:28)
- Communications Compliance (02:57)
- Data Protection Regulation (04:43)
- Summary (00:08)
Privileged Access (07:30)
- Introduction (00:08)
- Privileged Access (00:29)
- PAM in office 365 (03:38)
- PAM Flow (00:18)
- Customer Lockbox (02:48)
- Summary (00:08)
Information Barriers (09:37)
- Introduction (00:08)
- Information Barriers (00:57)
- Information Barrier Policies (04:58)
- Innformation Barriers in Teams (03:25)
- Summary (00:08)
Building Ethical Walls in Exchange Online (13:43)
- Introduction (00:08)
- Building Ethical Walls in Exchange Online (01:08)
- Ethical Walls in Exchange Online (03:39)
- Ethical Walls using Groups (00:55)
- Demo: Walls (05:20)
- Best Practices (02:22)
- Summary (00:08)
Discover and Respond
Content Search (24:18)
- Introduction (00:08)
- Content Search (04:21)
- Design Content Search (01:47)
- Demo: Content Search (05:00)
- Clone Content Search (03:46)
- Configure Search Permissions (01:39)
- Search Third Party Data (02:23)
- Demo: Search Third Party (05:02)
- Summary (00:08)
Audit Log Investigations (28:04)
- Introduction (00:08)
- Audit Log Investigations (01:23)
- Audit Log Search Explained (02:17)
- Demo: Auditing (24:08)
- Summary (00:08)
Advanced eDiscovery (24:14)
- Introduction (00:08)
- Advanced eDiscovery (06:33)
- eDiscovery Workflow (04:44)
- Configure Advanced eDiscovery (06:35)
- Analyze Data in Advanced eDiscovery (06:05)
- Summary (00:08)