0%

Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365

Key Features

  • Design, implement, and administer Microsoft Information Protection
  • Implement data loss prevention to minimize the risk of data exfiltration
  • Use Information Governance capabilities to ensure that data is stored in your environment for as long as necessary

Book Description

Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance.

Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam.

By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.

What you will learn

  • Understand core exam objectives to pass the SC-400 exam with ease
  • Find out how to create and manage sensitive information types for different types of data
  • Create and manage policies and learn how to apply these to Microsoft 365 SaaS applications
  • Broaden your knowledge of data protection on M365
  • Discover how to configure and manage the protection of your data in M365
  • Monitor activity regarding data access in M365
  • Understand and implement Data Governance in M365

Who this book is for

If you are a compliance administrator, Microsoft 365 Administrator, or Information Protection Administrator who wants to improve their knowledge of Microsoft Security & Compliance services, then this book is for you. This book is also ideal for anyone looking to achieve the SC-400 Information Protection Associate Administrator certification.

Table of Contents

  1. Microsoft Information Protection Administrator SC-400 Certification Guide
  2. Foreword
  3. Contributors
  4. About the authors
  5. About the reviewer
  6. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
    4. Download the color images
    5. Conventions used
    6. Get in touch
    7. Reviews
    8. Share Your Thoughts
  7. Section 1: Exam Overview and Introduction to Information Protection
  8. Chapter 1: Preparing for Your Microsoft Exam and SC-400 Exam Objectives
    1. Technical requirements
    2. Preparing for a Microsoft exam
    3. Accessing resources to prepare for the exam
    4. How to access a Microsoft 365 subscription
    5. Exam locations
    6. Microsoft exam format
    7. Accessing resources and Microsoft Learn
    8. Accessing Microsoft Learn
    9. Microsoft exam information pages
    10. Creating a Microsoft 365 trial account
    11. Microsoft 365 or Office 365 trial subscription
    12. Obtaining the relevant license
    13. Introducing the SC-400 exam objectives
    14. Why should I take this exam?
    15. Summary
  9. Chapter 2: Introduction to Information Protection
    1. Technical requirements
    2. What is Information Protection?
    3. Identify your data
    4. Provide protection for your data
    5. Govern your data
    6. Information protection use cases
    7. Understanding the scope of Information Protection
    8. Why is Information Protection important?
    9. What are the benefits of implementing Information Protection in your organization?
    10. Summary
  10. Section 2: Implementing Information Protection
  11. Chapter 3: Creating and Managing Sensitive Information Types
    1. Technical requirements
    2. Accessing the Microsoft 365 compliance center
    3. Selecting a sensitive information type based on an organization's requirements
    4. Sensitive information type components
    5. Custom sensitive information type features
    6. Creating and managing custom sensitive information types
    7. Testing a sensitive information type
    8. Modifying custom sensitive information types in the compliance center
    9. Removing custom sensitive information types in the compliance center
    10. Creating custom sensitive information types with exact data matches
    11. Saving sensitive data in .csv or .tsv file format
    12. Defining the schema for your database of sensitive information
    13. Setting up a rule package
    14. Modifying the schema for EDM-based classification
    15. Removing the schema for EDM-based classification
    16. Implementing document fingerprinting
    17. Creating a keyword dictionary
    18. Building a keyword dictionary using the Security & Compliance Center
    19. Creating a keyword dictionary from a file using PowerShell
    20. Summary
  12. Chapter 4: Creating and Managing Trainable Classifiers
    1. Technical requirements
    2. What are trainable classifiers?
    3. Pretrained classifiers
    4. Custom classifiers
    5. Identifying when to use trainable classifiers
    6. Creating a trainable classifier
    7. Verifying that a trainable classifier is performing properly
    8. Retraining a classifier
    9. Summary
  13. Chapter 5: Implementing and Managing Sensitivity Labels
    1. Technical requirements
    2. Identifying roles and permissions for administering sensitivity labels
    3. Security & Compliance Center permissions
    4. Relationship between roles, members, and role groups
    5. Role groups within the Security and Compliance Center
    6. Providing users with access to the Security and Compliance Center
    7. Utilizing the Security and Compliance Center PowerShell to grant another user permission to the Security and Compliance Center
    8. Creating and managing sensitivity labels and applying sensitivity labels to Microsoft SaaS applications
    9. Applying labels to SharePoint Online and Microsoft 365 Groups
    10. Configuring automatic labeling policies and monitoring label usage
    11. Creating an auto-labeling policy
    12. Monitoring information protection
    13. Applying bulk classification to on-premises data and managing protection settings
    14. Unified the labeling scanner
    15. Unified labeling best practice requirements
    16. Configuring on-premises labeling
    17. Utilizing label analytics to monitor label performance
    18. Applying and managing protections and restrictions
    19. Manual label application
    20. Utilizing auto-apply to apply labels by default
    21. Summary
  14. Chapter 6: Planning and Implementing Encryption for Email Messages
    1. Technical requirements
    2. Introduction to encryption in Microsoft 365
    3. BitLocker and how it encrypts data at rest
    4. Service encryption
    5. Defining requirements for implementing Office 365 Advanced Message Encryption
    6. Implementing Office 365 Advanced Message Encryption
    7. Using mail flow rules to apply OME templates
    8. Summary
  15. Section 3: Implementing Data Loss Prevention
  16. Chapter 7: Creating and Configuring Data Loss Prevention Policies
    1. Technical requirements
    2. Configuring data loss prevention for policy precedence
    3. Amending rule priority
    4. Amending policy priority
    5. Configuring policies for Exchange Online, SharePoint sites, OneDrive, and Microsoft Teams
    6. Custom DLP policy in Exchange Online
    7. Custom DLP policy with SharePoint sites, OneDrive, and Microsoft Teams
    8. Integrating Information Protection with, and configuring policies in Microsoft Defender for Cloud Apps
    9. Configuring file policies in Microsoft Defender for Cloud Apps
    10. Implementing data loss prevention policies in test mode
    11. Enabling test mode in an existing DLP policy
    12. DLP rule – user notifications
    13. DLP rule – incident reports
    14. Summary
  17. Chapter 8: Implementing and Monitoring Microsoft Endpoint Data Loss Prevention
    1. Technical requirements
    2. Onboarding devices to Endpoint DLP
    3. Configuring Endpoint DLP settings
    4. Configuring policies for endpoints
    5. Monitoring endpoint activities
    6. Summary
  18. Chapter 9: Managing and Monitoring Data Loss Prevention Policies and Activities
    1. Technical requirements
    2. Managing and responding to DLP policy violations
    3. Implementing DLP rule exclusion
    4. Reviewing and analyzing DLP reports
    5. Reviewing DLP policy matches
    6. Reviewing DLP incidents
    7. Reviewing DLP false positives and overrides
    8. Managing permissions for DLP reports
    9. Managing DLP violations in Microsoft Defender for Cloud Apps
    10. Summary
  19. Section 4: Implementing Information Governance
  20. Chapter 10: Configuring Retention Policies and Labels
    1. Technical requirements
    2. Creating and applying retention label policies
    3. Configuring retention policies
    4. Creating and applying retention labels
    5. Configuring and publishing auto-apply label policies
    6. Summary
  21. Chapter 11: Managing Data Retention in Microsoft 365
    1. Technical requirements
    2. Creating and applying retention policies in Microsoft SharePoint and OneDrive
    3. Preservation Hold Library functionality
    4. Retention with document versioning – how it works
    5. Configuring a retention policy for SharePoint Online and OneDrive for Business
    6. Creating and applying retention policies in Microsoft Teams
    7. Retention functionality with Teams
    8. Recovering content in SharePoint and OneDrive
    9. OneDrive for Business
    10. SharePoint Online
    11. Previous versions
    12. Implementing retention policies and tags in Microsoft Exchange
    13. How to create a new retention tag
    14. Modifying the default retention policy
    15. Applying mailbox holds in Microsoft Exchange
    16. Applying a litigation hold
    17. Implementing Microsoft Exchange Online archiving policies
    18. Summary
  22. Chapter 12: Implementing Records Management in Microsoft 365
    1. Technical requirements
    2. Configuring labels for records management
    3. Managing and migrating retention requirements with a file plan
    4. Configuring automatic retention using file plan descriptors
    5. Implementing in-place records management in Microsoft SharePoint
    6. Configuring event-based retention
    7. Managing the disposition of records
    8. Viewing and disposing of content
    9. Summary
  23. Practice Exam
    1. Test questions
    2. Answer key
    3. Why subscribe?
  24. Other Books You May Enjoy
    1. Packt is searching for authors like you
    2. Share Your Thoughts
18.219.224.103