0%

Book Description

Get up to speed with planning, deploying, and managing Microsoft Office 365 services and gain the skills you need to pass the MS-101 exam

Key Features

  • Explore everything from mobile device management and compliance,through to data governance and auditing
  • Get to grips with using Azure advanced threat protection and Azure information protection
  • Learn effectively through exam-focused practice exercises and mock tests

Book Description

Exam MS-101: Microsoft 365 Mobility and Security is a part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path designed to help users validate their skills in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. This book will help you implement modern device services, apply Microsoft 365 security and threat management, and manage Microsoft 365 governance and compliance. Written in a succinct way, you'll explore chapter-wise self-assessment questions, exam tips, and mock exams with answers.

You'll start by implementing mobile device management (MDM) and handling device compliance. You'll delve into threat detection and management, learning how to manage security reports and configure Microsoft 365 alerts. Later, you'll discover data loss prevention (DLP) tools to protect data as well as tools for configuring audit logs and policies. The book will also guide you through using Azure Information Protection (AIP) for deploying clients, applying policies, and configuring services and users to enhance data security. Finally, you'll cover best practices for configuring settings across your tenant to ensure compliance and security.

By the end of this book, you'll have learned to work with Microsoft 365 services and covered the concepts and techniques you need to know to pass the MS-101 exam.

What you will learn

  • Implement modern device services
  • Discover tools for configuring audit logs and policies
  • Plan, deploy, and manage Microsoft 365 services such as MDM and DLP
  • Get up to speed with configuring eDiscovery settings and features to enhance your organization's ability to mitigate and respond to issues
  • Implement Microsoft 365 security and threat management
  • Explore best practices for effectively configuring settings

Who this book is for

This book is for IT professionals looking to pass the Microsoft 365 Mobility and Security certification exam. System administrators and network engineers interested in mobility, security, compliance, and supporting technologies will also benefit from this book. Some experience with Microsoft 365, Exchange servers, and PowerShell is necessary.

Table of Contents

  1. Title Page
  2. Copyright and Credits
    1. Microsoft 365 Mobility and Security – Exam Guide MS-101
  3. Dedication
  4. About Packt
    1. Why subscribe?
  5. Contributors
    1. About the author
    2. About the reviewer
    3. Packt is searching for authors like you
  6. Preface
    1. Who this book is for
    2. What this book covers
    3. Book structure
    4. The exam
    5. Certification
    6. How to get the most out of this book
      1. Download the color images
      2. Conventions used
    7. Get in touch
      1. Reviews
  7. Section 1: Modern Device Services
  8. Implementing Mobile Device Management (MDM)
    1. Planning for MDM
      1. Device types and enrollment
    2. Configuring MDM integration with Azure AD
      1. Registered versus joined devices
      2. Setting up automatic enrollment
    3. Setting an MDM authority
    4. Setting device enrollment limits for users
      1. Device type restrictions
      2. Device limit restrictions
    5. Summary
    6. Questions
    7. Further reading
  9. Managing Device Compliance
    1. Planning for device compliance
    2. Configuring device compliance policies
      1. Policy options
      2. Creating a compliance policy
    3. Designing, creating, and managing conditional access policies
      1. Designing conditional access policies
        1. Assignments
          1. Users and groups
          2. Cloud apps or actions
          3. Conditions
        2. Access controls
          1. Grant
          2. Session
      2. Creating conditional access policies
      3. Managing conditional access policies
    4. Summary
    5. Questions
    6. Further reading
  10. Planning for Devices and Apps
    1. Creating and configuring Microsoft Store for Business
      1. Creating your private store
      2. Setting your MDM solution in Microsoft Store
      3. Configuring synchronization in Intune and synchronizing apps
    2. Planning app deployment
      1. Using a management tool
      2. Making apps available via your private store
      3. Assigning apps directly to employees
    3. Planning device co-management
    4. Planning device monitoring
    5. Planning for device profiles
      1. Assigning profiles
      2. Monitoring profiles
      3. Policy conflicts
    6. Planning for MAM
    7. Planning mobile device security
    8. Summary
    9. Questions
    10. Further reading
  11. Planning Windows 10 Deployment
    1. Planning for WaaS
      1. Building and deploying
      2. Servicing
        1. Servicing channels
        2. Servicing tools
    2. Planning for Windows 10 Enterprise deployment
      1. Windows Autopilot
      2. In-place upgrades
    3. Analyzing Upgrade Readiness for Windows 10
    4. Additional Windows 10 Enterprise security features
    5. Summary
    6. Questions
    7. Further reading
  12. Section 2: Microsoft 365 Security Threat Management
  13. Implementing Cloud App Security (CAS)
    1. Setting up CAS
      1. Integrating AIP with CAS
    2. Configuring CAS policies
      1. Policies
      2. Templates
    3. Configuring connected apps
    4. Designing a CAS solution
    5. Managing CAS alerts
    6. Uploading CAS traffic logs
      1. Manual uploads
      2. Automatic uploads
    7. Summary
    8. Questions
    9. Further reading
  14. Implementing Threat Management
    1. Planning a threat management solution
    2. Designing and configuring Azure ATP
      1. Setting up a sensor
    3. Designing and configuring Microsoft 365 ATP policies
      1. ATP Safe Attachments
      2. ATP Safe Links
      3. ATP for SharePoint, OneDrive, and Microsoft Teams
      4. ATP anti-phishing protection
    4. Monitoring ATA incidents
    5. Summary
    6. Questions
    7. Further reading
  15. Implementing Windows Defender ATP
    1. Planning our Windows Defender ATP solution
    2. Configuring our preferences
      1. Secure score dashboard security controls
      2. Microsoft Threat Experts capabilities
    3. Implementing Windows Defender ATP policies
    4. Enabling and configuring the security features of Windows 10 Enterprise
      1. Attack surface reduction
        1. Install application guard 
        2. Enable application control
        3. Exploit protection
        4. Network protection
        5. Controlled folder access
        6. Network firewall
      2. Next-generation protection
    5. Summary
    6. Questions
    7. Further reading
  16. Managing Security Reports and Alerts
    1. Managing the Service Assurance Dashboard
      1. Accessing the Service Assurance Dashboard
      2. Compliance Manager
      3. Granting access to others
    2. Microsoft Secure Score and Azure AD Identity Secure Score
    3. Tracing and reporting on Azure AD Identity Protection
      1. Investigating risk events and vulnerabilities
      2. Settings and alerts
    4. Microsoft 365 security alerts
    5. Azure AD Identity Protection dashboard and alerts
      1. Automatically closing or resolving risk events
      2. Manually closing risk events
    6. Summary
    7. Questions
    8. Further reading
  17. Section 3: Microsoft 365 Governance Compliance
  18. Configuring Data Loss Prevention (DLP)
    1. Configuring DLP policies
    2. Designing data retention policies in Microsoft 365
      1. Labels
      2. Label policies
    3. Monitoring and managing DLP policy matches
    4. Managing DLP exceptions
    5. Summary
    6. Questions
    7. Further reading
  19. Implementing Azure Information Protection (AIP)
    1. Planning an AIP solution
    2. Planning for classification labeling
    3. Deploying AIP clients
    4. Implementing an AIP tenant key
    5. Planning for WIP implementation
    6. Configuring IRM for workloads
    7. Planning for the deployment of an on-premises Rights Management connector
    8. Implementing AIP policies
    9. Configuring a super user
    10. Summary
    11. Questions
    12. Further reading
  20. Managing Data Governance
    1. Planning and configuring information retention
      1. Retention period and deletion
      2. Locations
      3. Creating a retention policy
    2. Planning for a Microsoft 365 backup
    3. Planning for restoring deleted content
      1. Exchange
      2. SharePoint
      3. OneDrive
    4. Summary
    5. Questions
    6. Further reading
  21. Managing Auditing
    1. Configuring audit log retention
      1. Enabling auditing of SharePoint site activities
      2. Enabling auditing of Exchange mailbox activities
    2. Configuring the audit policy
    3. Monitoring unified audit logs
    4. Azure AD audit and sign-in logs
    5. Summary
    6. Questions
    7. Further reading
  22. Managing eDiscovery
    1. Searching content using the Security & Compliance Center
    2. Planning for in-place and legal holds
    3. Configuring eDiscovery
    4. Summary
    5. Questions
    6. Further reading
  23. Section 4: Mock Exams
  24. Mock Exam 1
  25. Mock Exam 2
  26. Assessments
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
    6. Chapter 6
    7. Chapter 7
    8. Chapter 8
    9. Chapter 9
    10. Chapter 10
    11. Chapter 11
    12. Chapter 12
    13. Chapter 13
    14. Mock Exam 1
    15. Mock Exam 2
  27. Another Book You May Enjoy
    1. Leave a review - let other readers know what you think
18.224.31.50