MS-4002: Prepare security and compliance to support Microsoft 365 Copilot

Duration
1 Day
Price
1.00 ج.م.‏
Course Type
No Location

Learning Objectives

 

        • Manage secure user access with multifactor authentication and Conditional Access policies.
        • Implement app protection using Microsoft Defender for Cloud Apps and manage cloud security policies.
        • Utilize Microsoft Defender for Endpoint to detect and respond to advanced threats on devices.
        • Deploy Microsoft Defender for Office 365 to safeguard against email and collaboration threats.
        • Apply retention policies and labels to ensure compliance and protect sensitive data.
        • Establish Data Loss Prevention (DLP) strategies to prevent data exposure and misuse.

Course Outline

1 - Manage secure user access in Microsoft 365
  • Manage user passwords.
  • Create Conditional Access policies.
  • Enable security defaults.
  • Describe pass-through authentication.
  • Enable multifactor authentication.
  • Describe self-service password management.
  • Implement Microsoft Entra Smart Lockout.
1 - Manage secure user access in Microsoft 365
  • Manage user passwords.
  • Create Conditional Access policies.
  • Enable security defaults.
  • Describe pass-through authentication.
  • Enable multifactor authentication.
  • Describe self-service password management.
  • Implement Microsoft Entra Smart Lockout.
2 - Implement app protection by using Microsoft Defender for Cloud Apps
  • Describe how Microsoft Defender for Cloud Apps provides improved visibility into network cloud activity and increases the protection of critical data across cloud applications.
  • Explain how to deploy Microsoft Defender for Cloud Apps.
  • Control your cloud apps with file policies.
  • Manage and respond to alerts generated by those policies.
  • Configure and troubleshoot Cloud Discovery.
2 - Implement app protection by using Microsoft Defender for Cloud Apps
  • Describe how Microsoft Defender for Cloud Apps provides improved visibility into network cloud activity and increases the protection of critical data across cloud applications.
  • Explain how to deploy Microsoft Defender for Cloud Apps.
  • Control your cloud apps with file policies.
  • Manage and respond to alerts generated by those policies.
  • Configure and troubleshoot Cloud Discovery.
3 - Implement threat protection by using Microsoft Defender for Office 365
  • Describe the protection stack provided by Microsoft Defender for Office 365.
  • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant.
  • Describe the Threat Tracker widgets and views that provide you with intelligence on different cybersecurity issues that might affect your company.
  • Run realistic attack scenarios using Attack Simulator to help identify vulnerable users before a real attack impacts your organization.
3 - Implement threat protection by using Microsoft Defender for Office 365
  • Describe the protection stack provided by Microsoft Defender for Office 365.
  • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant.
  • Describe the Threat Tracker widgets and views that provide you with intelligence on different cybersecurity issues that might affect your company.
  • Run realistic attack scenarios using Attack Simulator to help identify vulnerable users before a real attack impacts your organization.
4 - Explore retention in Microsoft 365
  • Explain how a retention policies and retention labels work.
  • Identify the capabilities of both retention policies and retention labels.
  • Select the appropriate scope for a policy depending on business requirements.
  • Explain the principles of retention.
  • Identify the differences between retention settings and eDiscovery holds.
  • Restrict retention changes by using preservation lock.
4 - Explore retention in Microsoft 365
  • Explain how a retention policies and retention labels work.
  • Identify the capabilities of both retention policies and retention labels.
  • Select the appropriate scope for a policy depending on business requirements.
  • Explain the principles of retention.
  • Identify the differences between retention settings and eDiscovery holds.
  • Restrict retention changes by using preservation lock.

Target Audience

 

Upcoming Class Dates and Times
Login