Ce cours introduit trois composantes d'une administration Microsoft 365 en entreprise, soit la gestion de la sécurité, la gestion de la conformité et la gestion des appareils. Dans la première partie, vous allez examiner les vecteurs d'attaques courants, les brèches de données et comment MS365 avec ses solutions de sécurité peut atténuer les menaces incluant l'utilisation de Microsoft Secure Score, Azure Active Directory Identity Protection, Exchange Online Protection, Advanced Threat Protection, Safe Attachments et Safe Links. La seconde partie introduit les aspects les plus importants sur la gouvernance des données, incluant l'introduction du système Information Rights Management, la cryptographie des messages, DLP, la gestion des données, l'archivage, la rétention, les politiques DLP et les astuces et Azure and Windows Information Protection. La troisième partie introduit la cogestion des appareils Windows 10, mentionne comment transitionner des outils de Configuration Manager vers Intune et informe comment implémenter Windows Autopilot, Windows Analytics et Mobile Device Management.
In this module, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Active Directory Identity Protection.
This module examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. You will be introduced to the various reports that monitor your security health.
In this module, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
This module examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP).
This module delves deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center.
This module examines how to implement the key aspects of data governance, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips.
This module focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection.
This module conclude this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.
This module provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management.
This module focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Windows Analytics, and planning your Windows 10 subscription activation service.
This module focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.