MS-101T00-AC: Microsoft 365 Mobility and Security

Este curso cubre tres elementos centrales de la administración empresarial de Microsoft 365: administración de seguridad de Microsoft 365, administración de cumplimiento de Microsoft 365 y administración de dispositivos de Microsoft 365. En la administración de seguridad de Microsoft 365, examinará todos los tipos comunes de vectores de amenazas y violaciones de datos que enfrentan las organizaciones en la actualidad y aprenderá cómo las soluciones de seguridad de Microsoft 365 abordan estas amenazas de seguridad. Se le presentará a Microsoft Secure Score, así como a Azure Active Directory Identity Protection. A continuación, aprenderá a administrar los servicios de seguridad de Microsoft 365, incluidos Exchange Online Protection, Advanced Threat Protection, Safe Attachments y Safe Links. Finalmente, se le presentarán los diversos informes que controlan el estado de su seguridad. Luego, pasará de los servicios de seguridad a la inteligencia de amenazas; específicamente, utilizando el panel de seguridad y el análisis de amenazas avanzado para adelantarse a posibles brechas de seguridad.

Plan de Estudio

Module 1: Introduction to Microsoft 365 Security Metrics

In this module, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365's security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Active Directory Identity Protection.
Lessons

    Threat Vectors and Data Breaches
    The Zero Trust Model
    Security Solutions in Microsoft 365
    Introduction to Microsoft Secure Score
    Privileged Identity Management
    Introduction to Azure Active Directory Identity Protection

Lab : Tenant Setup and PIM

    Initialize your Microsoft 365 Tenant
    PIM Resource Workflows

After completing this module, students will be able to:

    Describe several techniques hackers use to compromise user accounts through email
    Describe techniques hackers use to gain control over resources
    Describe techniques hackers use to compromise data
    Describe the Zero Trust approach to security in Microsoft 365.
    Describe the components of Zero Trust security.
    Describe and five steps to implementing a Zero Trust model in your organization.
    Explain Zero Trust networking
    List the types of threats that can be avoided by using EOP and Office 365 ATP
    Describe how Microsoft 365 Threat Intelligence can be benefit your organization
    Monitor your organization through auditing and alerts
    Describe how ASM enhances visibility and control over your tenant through three core areas
    Describe the benefits of Secure Score and what kind of services can be analyzed
    Describe how to collect data using the Secure Score API
    Know where to identify actions that will increase your security by mitigating risks
    Explain how to determine the threats each action will mitigate and the impact it has on use
    Explain Privileged Identity Management (PIM) in Azure administration
    Configure PIM for use in your organization
    Audit PIM roles
    Explain Microsoft Identity Manager
    Explain Privileged Access Management in Microsoft 365
    Describe Azure Identity Protection and what kind of identities can be protected
    Understand how to enable Azure Identity Protection
    Know how to identify vulnerabilities and risk events
    Plan your investigation in protecting cloud-based identities
    Plan how to protect your Azure Active Directory environment from security breaches

Module 2: Managing Your Microsoft 365 Security Services

This module examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. You will be introduced to the various reports that monitor your security health.
Lessons

    Introduction to Exchange Online Protection
    Introduction to Advanced Threat Protection
    Managing Safe Attachments
    Managing Safe Links
    Monitoring and Reports

Lab : Manage Microsoft 365 Security Services

    Implement a Safe Attachments policy
    Implement a Safe Links policy

After completing this module, students will be able to:

    Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection
    List several mechanisms used to filter spam and malware
    Describe additional solutions to protect against phishing and spoofing
    Describe the benefits of the Spoof Intelligence feature
    Describe how Safe Attachments is used to block zero-day malware in email attachments and documents
    Describe how Safe Links protect users from malicious URLs embedded in email and documents
    Create and modify a Safe Attachments policy in the Security & Compliance Center
    Create a Safe Attachments policy by using Windows PowerShell
    Configure a Safe Attachments policy to take certain actions
    Understand how a transport rule can be used to disable the Safe Attachments functionality
    Describe the end-user experience when an email attachment is scanned and found to be malicious
    Create and modify a Safe Links policy in the Security & Compliance Center
    Create a Safe Links policy by using Windows PowerShell
    Understand how a transport rule can be used to disable the Safe Links functionality
    Describe the end-user experience when Safe Links identifies a link to a malicious website or file
    Describe how reports provide visibility into how EOP and ATP is protecting your organization
    Understand where to access reports generated by EOP and ATP
    Understand how to access detailed information from reports generated by EOP and ATP

Module 3: Microsoft 365 Threat Intelligence

In this module, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
Lessons

    Overview of Microsoft 365 Threat Intelligence
    Using the Security Dashboard
    Configuring Advanced Threat Analytics
    Implementing Your Cloud Application Security

Lab : Implement Threat Intelligence

    Conduct a Spear Phishing attack using the Attack Simulator
    Conduct Password attacks using the Attack Simulator
    Prepare for Alert Policies
    Implement a Mailbox Permission Alert
    Implement a SharePoint Permission Alert
    Test the Default eDiscovery Alert

After completing this module, students will be able to:

    Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph
    Describe how the threat dashboard can benefit C-level security officers
    Understand how Threat Explorer can be used to investigate threats and help to protect your tenant
    Describe how the Security Dashboard displays top risks, global trends, and protection quality
    Describe what Advanced Thread Analytics (ATA) is and what requirements are needed to deploy it
    Configure Advanced Threat Analytics
    Manage the ATA services
    Describe Cloud App Security
    Explain how to deploy Cloud App Security
    Control your Cloud Apps with Policies
    Troubleshoot Cloud App Security

Module 4: Introduction to Data Governance in Microsoft 365

This module examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP).
Lessons

    Introduction to Archiving in Microsoft 365
    Introduction to Retention in Microsoft 365
    Introduction to Information Rights Management
    Introduction to Secure Multipurpose Internet Mail Extension
    Introduction to Office 365 Message Encryption
    Introduction to Data Loss Prevention

Lab : Implement Message Encryption and IRM

    Configure Microsoft 365 Message Encryption
    Validate Information Rights Management

After completing this module, students will be able to:

    Understand Data Governance in Microsoft 365
    Describe the difference between In-Place Archive and Records Management
    Explain how data is archived in Exchange
    Recognize the benefits of In Place Records Management in SharePoint
    Explain the difference between Message Records Management (MRM) in Exchange and Retention in SCC.
    Understand how MRM works in Exchange
    List the types of retention tags that can be applied to mailboxes
    Know the different Microsoft 365 Encryption Options
    Understand how IRM can be used in Exchange
    Configure IRM protection for Exchange mails
    Explain how IRM can be used in SharePoint
    Apply IRM protection to SharePoint documents
    Tell the differences between IRM protection and AIP classification
    Describe the use of S/MIME
    Explain what digital signatures are
    Apply a digital signature to a message
    Understand how message encryption works
    Perform encryption on a message
    Accomplish decryption of a message
    Understand the co-operation of signing and encryption simultaneously
    Tell what triple-wrapped messages are
    Describe when you can use Office 365 Message Encryption
    Explain how Office 365 Message Encryption works
    Describe Data Loss Prevention (DLP)
    Understand what sensitive information and search patterns are that DLP is using
    Know what a DLP policy is and what it contains
    Recognize how actions and conditions work together for DLP
    Express how actions contain functions to send emails on matches
    Show policy tips to the users if a DLP rule applies
    Use policy templates to implement DLP policies for commonly used information
    Explain document finger
    Understand how to use DLP to protect documents in Windows Server FCI

Module 5: Archiving and Retention in Microsoft 365

This module delves deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center.
Lessons

    In-Place Records Management in SharePoint
    Archiving and Retention in Exchange
    Retention Policies in the SCC

Lab : Implement Archiving and Retention

    Initialize Compliance
    Configure Retention Tags and Policies

After completing this module, students will be able to:

    Understand the process of records management
    Create a file plan for your organization
    Describe two methods for converting active docs to records
    Describe the benefits of In-Place Records Management
    Configure of In-Place Records Management for your organization
    Enable and disable In-Place Archiving
    Create useful retention tags
    Create retention policies to group retention tags
    Assign retention policies to mailboxes
    Allocate permissions and scripts to export and import retention tags
    Export all retention policies and tags from an organization
    Import all retention policies and tags to an organization
    Explain how a retention policy works
    Create a retention policy
    Manage retention policy settings

Module 6: Implementing Data Governance in Microsoft 365 Intelligence

This module examines how to implement the key aspects of data governance, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips.
Lessons

    Evaluating Your Compliance Readiness
    Implementing Compliance Center Solutions
    Building Ethical Walls in Exchange Online
    Creating a Simple DLP Policy from a Built-in Template
    Creating a Custom DLP Policy
    Creating a DLP Policy to Protect Documents
    Working with Policy Tips

Lab : Implement DLP Policies

    Manage DLP Policies
    Test MRM and DLP Policies

After completing this module, students will be able to:

    Describe the Microsoft 365 Compliance Center and how to access it
    Describe the purpose and function of Compliance score
    Explain the components of of how an organization's Compliance score is determined
    Explain how assessments are used to formulate compliance scores
    Explain how Microsoft 365 helps address Global Data Protection Regulation
    Describe insider risk management functionality in Microsoft 365
    Configure insider risk management policies
    Configure insider risk management policies
    Explain the communication compliance capabilities in Microsoft 365
    Describe what an ethical wall in Exchange is and how it works
    Explain how to create an ethical wall in Exchange
    Identify best practices for building and working with ethical walls in Exchange
    Understand the different built-in templates for a DLP policies
    Determine how to choose the correct locations for a DLP policy
    Configure the correct rules for protecting content
    Enable and review the DLP policy correctly
    Describe how to modify existing rules of DLP policies
    Explain how to add and modify custom conditions and action to a DLP rule
    Describe how to change user notifications and policy tips
    Configure the user override option to a DLP rule
    Explain how incident reports are sent by a DLP rule violation
    Describe how to work with managed properties for DLP policies
    Explain how SharePoint Online creates crawled properties from documents
    Describe how to create a managed property from a crawled property in SharePoint Online
    Explain how to create a DLP policy with rules that apply to managed properties via PowerShell
    Describe the user experience when a user creates an email or site containing sensitive information
    Explain the behavior in Office apps when a user enters sensitive information

Module 7: Managing Data Governance in Microsoft 365

This module focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection.
Lessons

    Managing Retention in Email
    Troubleshooting Data Governance
    Implementing Azure Information Protection
    Implementing Advanced Features of AIP
    Implementing Windows Information Protection

Lab : Implement AIP and WIP

    Implement Azure Information Protection
    Implement Windows Information Protection

After completing this module, students will be able to:

    Determine when and how to use retention tags in mailboxes
    Assign retention policy to an email folder
    Add optional retention policies to email messages and folders
    Remove a retention policy from an email message
    Explain how the retention age of elements is calculated
    Repair retention policies that do not run as expected
    Understand how to systematically troubleshoot when a retention policy appears to fail
    Perform policy tests in test mode with policy tips
    Describe how to monitor DLP policies through message tracking
    Describe the required planning steps to use AIP in your company
    Configure and customize labels
    Create policies to publish labels
    Plan a Deployment of the Azure Information Protection client
    Configure the advance AIP service settings for Rights Management Services (RMS) templates
    Implement automatic and recommended labeling
    Activate the Super User feature for administrative tasks
    Create your tenant key for encryption
    Deploy the AIP scanner for on-premises labeling
    Plan RMS connector deployment to connect on-premises servers
    Describe WIP and what it is used for
    Plan a deployment of WIP policies
    Implement WIP policies with Intune and SCCM
    Implement WIP policies in Windows desktop apps

Module 8: Managing Search and Investigations

This module conclude this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.
Lessons

    Searching for Content in the Security and Compliance Center
    Auditing Log Investigations
    Managing Advanced eDiscovery

Lab : Manage Search and Investigations

    Implement a Data Subject Request
    Investigate Your Microsoft 365 Data

After completing this module, students will be able to:

    Describe how to use content search
    Design your content search
    Configure search permission filtering
    Explain how to search for third-party data
    Describe when to use scripts for advanced searches
    Describe what the audit log is and the permissions that are necessary to search the Office 365 audit
    Configure Audit Policies
    Enter criteria for searching the audit log
    View, sort, and filter search results
    Export search results to a CSV file
    Search the unified audit log by using Windows PowerShell
    Describe Advanced eDiscovery
    Configure permissions for users in Advanced eDiscovery
    Create Cases in Advanced eDiscovery
    Search and prepare data for Advanced eDiscovery

Module 9: Planning for Device Management

This module provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management.
Lessons

    Introduction to Co-management
    Preparing Your Windows 10 Devices for Co-management
    Transitioning from Configuration Manager to Intune
    Introduction to Microsoft Store for Business
    Planning for Mobile Application Management

Lab : Implement the Microsoft Store for Business

    Configure the Microsoft Store for Business
    Manage the Microsoft Store for Business

After completing this module, students will be able to:

    Describe the benefits of Co-management
    Plan your organization's Co-management Strategy
    Describe the main features of Configuration Manager
    Describe how Azure Active Directory enables co-management
    Identify the prerequisites for using Co-management
    Configure Configuration Manager for Co-management
    Enroll Windows 10 Devices to Intune
    Modify your co-management settings
    Transfer workloads to Intune
    Monitor your co-management solution
    Check compliance for co-managed devices
    Describe the feature and benefits of the Microsoft Store for Business
    Configure the Microsoft Store for Business
    Manage settings for the Microsoft Store for Business

Module 10: Planning Your Windows 10 Deployment Strategy

This module focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Windows Analytics, and planning your Windows 10 subscription activation service.,
Lessons

    Windows 10 Deployment Scenarios
    Implementing and Managing Windows Autopilot
    Planning Your Windows 10 Subscription Activation Strategy
    Resolving Windows 10 Upgrade Errors
    Introduction to Windows Analytics

After completing this module, students will be able to:

    Plan for Windows as a Service
    Plan a Modern Deployment
    Plan a Dynamic Deployment
    Plan a Traditional Deployment
    Describe Windows Autopilot requirements
    Configure Autopilot
    Create and Assign an Autopilot profile
    Deploy and validate Autopilot
    Describe Autopilot Self-deployments, White Glove deployments, and User-drive deployments
    Deploy BitLocker Encryption for Autopiloted Devices
    Understand Windows 10 Enterprise E3 in CSP
    Configure VDA for Subscription Activation
    Deploy Windows 10 Enterprise licenses
    Describe common fixes for Windows 10 upgrade errors
    Use SetupDiag
    Troubleshooting upgrade errors
    Describe Windows error reporting
    Understand the upgrade error codes and resolution procedure
    Describe Windows Analytics
    Describe Device Health
    Describe Update Compliance
    Determine Upgrade Readiness

Module 11: Implementing Mobile Device Management

This module focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.
Lessons

    Planning Mobile Device Management
    Deploying Mobile Device Management
    Enrolling Devices to MDM
    Managing Device Compliance

Lab : Manage Devices with Intune

    Enable Device Management
    Configure Azure AD for Intune
    Create Intune Policies
    Enroll a Windows 10 Device
    Manage and Monitor a Device in Intune

After completing this module, students will be able to:

    Manage devices with MDM
    Compare MDM for Office 365 and Intune
    Understand policy settings for mobile devices
    Control Email and Document Access
    Activate Mobile Device Management Services
    Deploy Mobile Device Management
    Configure Domains for MDM
    Configure an APNs Certificate for iOS devices
    Manage Device Security Policies
    Define a Corporate Device Enrollment Policy
    Enroll devices to MDM
    Understand the Apple Device Enrollment Program
    Understand Enrollment Rules
    Configure a Device Enrollment Manager Role
    Describe Multi-factor Authentication considerations
    Plan for device compliance
    Configure conditional users and groups
    Create Conditional Access policies
    Monitor enrolled devices

Calendario

Días y horarios disponibles para "MS-101T00-AC: Microsoft 365 Mobility and Security"

Modalidad Sede Días Horarios Fecha de Inicio Fecha de Finalización
Online Distrito Tecnologico Lunes, Martes, Miércoles, Jueves, Viernes 09:00 a 13:00 27 Enero 2025 7 Febrero 2025
Online Distrito Tecnologico Lunes, Martes, Miércoles, Jueves, Viernes 09:00 a 13:00 14 Abril 2025 28 Abril 2025
Online Distrito Tecnologico Lunes, Martes, Miércoles, Jueves, Viernes 09:00 a 13:00 28 Julio 2025 8 Agosto 2025
Online Distrito Tecnologico Lunes, Martes, Miércoles, Jueves, Viernes 09:00 a 13:00 27 Octubre 2025 7 Noviembre 2025
Modalidades

En Aula y Online

Los cursos se dictan con alumnos en forma presencial en nuestras aulas y con otros alumnos conectados en forma presencial On Line vía WEBEX. Esta modalidad permite el acceso a la clase como si estuvieras presente, viendo las demostraciones en la pantalla del instructor, pudiendo interactuar con él a través del chat en tiempo real. El curso incluye un manual de uso de la aplicación y una guía de ejercitación paso a paso para cada clase.
Formas de Pago

Formas de Pago

  • Paypal
  • |
  • Mercado pago
  • |
  • Venta telefónica con tarjetas de crédito
  • |
  • Tarjetas de Crédito y débito
  • |
  • Pago en efectivo en nuestras sedes habilitadas
  • |
  • Cheques personales
  • |
  • Depósito y/o transferencia

Beneficios

  • Somos un Centro de Capacitación inscripto en SEPYME y REGICE por lo que las empresas pueden recibir importantes reintegros por crédito fiscal
  • Ver otros beneficios https://www.exotraining.com/int_es/beneficios.html
  • Coffee break sin cargo en todos los cursos presenciales