Microsoft 365 Security Administration (MS-500)
Security and Compliance for Microsoft 365 and hybrid environments37 H 9 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Secure Microsoft 365 hybrid environments
- Overview
- Plan Azure AD authentication options
- Plan Azure AD synchronization options
- Monitor and troubleshoot Azure AD Connect events
- Spotlight on Azure AD Connect Upgrades
- Secure Identities
- Implement Azure AD group membership
- Implement password management
- Manage external identities in workloads
- Implement authentication methods
- Plan sign-on security
- Implement multi-factor authentication (MFA)
- Manage and monitor MFA
- Plan and implement device authentication methods
- Implement conditional access
- Plan compliance and conditional access policies
- Configure, manage compliance endpoint security
- Implement and manage conditional access
- Test and troubleshoot conditional access policies
- Implement roles and role groups
- Plan for roles
- Configure roles
- Audit roles
- Configure and manage identity governance
- Plan for Azure PIM
- Assign eligibility and activate admin roles
- Manage Azure PIM role requests and assignments
- Monitor PIM history and alerts
- Implement and manage entitlement management
- Implement and manage access reviews
- Implement Azure AD Identity Protection
- Implement user risk policy
- Implement sign-in risk policy
- Configure Identity Protection alerts
- Review and respond to risk events
- Implement enterprise hybrid threat protection solution
- Plan a Microsoft Defender for Identity solution
- Install, configure Microsoft Defender for Identity
- Monitor, manage Microsoft Defender for Identity
- Implement device threat protection
- Plan a Microsoft Defender for Endpoint solution
- Implement Microsoft Defender for Endpoint
- Manage, monitor Microsoft Defender For Endpoint
- Implement and manage device and application protection
- Plan for device and application protection
- Configure & manage Defender App Guard
- Microsoft Defender Application Control
- Configure and manage exploit protection
- Configure and manage Windows device encryption
- Configure and manage non-Windows device encryption
- Implement application protection policies
- Device compliance for endpoint security
- Implement and manage Microsoft Defender for Office 365
- Configure Microsoft Defender for Office 365
- Monitor Microsoft Defender for Office 365
- Conduct simulated attacks using Attack Simulator
- Monitor Microsoft 365 Security with Azure Sentinel
- Plan and implement Azure Sentinel
- Configure playbooks in Azure Sentinel
- Manage and monitor Azure Sentinel
- Respond to threats in Azure Sentinel
- Manage insider risk solutions in Microsoft 365
- Implement and manage Customer Lockbox
- Implement, manage Insider risk management policies
- Implement and manage information barrier policies
- Implement and manage privileged access management
- Manage sensitive information
- Plan a sensitivity label solution
- Configure sensitivity labels and policies
- Configure and use label analytics
- Use sensitivity labels with Office apps
- Manage Data Loss Prevention (DLP)
- Plan a DLP solution
- Create and manage DLP policies
- Create and manage sensitive information types
- Monitor DLP reports
- Manage DLP notifications
- Implement Endpoint DLP
- Implement and manage Microsoft Cloud App Security
- Plan Cloud App Security implementation
- Configure Microsoft Cloud App Security
- Manage cloud app discovery
- Manage entries in the Cloud app catalog
- Manage apps in Cloud App Security
- Config Cloud App Security connectors, Oauth apps
- Configure Cloud App Security policies, templates
- Cloud App Sec. alerts, reports, dashboards, logs
- Configure and analyze security reporting
- Using Microsoft Endpoint Manager Admin Center
- Security, dashboards in Microsoft 365 Sec. Center
- Custom security reporting with Graph Security API
- Using secure score dashboards
- Configure alert policies
- Manage and analyze audit logs and reports
- Plan for auditing and reporting
- Perform audit log search
- Review, interpret compliance reports, dashboards
- Configure audit alert policy
- Manage data governance and retention
- Plan for data governance and retention
- Review, interpret data gov. reports, dashboards
- Configure retention labels and policies
- Define, manage communication compliance policies
- Find and recover deleted Office 365 data
- Configure and use Microsoft 365 Records Mgmt.
- Configure retention in Microsoft 365 workloads
- Discover and respond to compliance queries in Microsoft 365
- Plan for content search and eDiscovery
- Delegate permissions for search, discovery tools
- Use search and investigation tools
- Export content search results
- Manage eDiscovery cases
- Manage regulatory compliance
- Plan for regulatory compliance in Microsoft 365
- Manage Data Subject Requests (DSRs)
- Administer Compliance Manager in Microsoft 365
- Review Compliance Manager reports
- Create and perform Compliance Manager assessments
Overview
4 M



- Episode Description
- Transcript
This course is designed for Microsoft Administrators who implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. The Microsoft 365 Security Administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders, and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization.