Implementing and Monitoring Threat Management in Microsoft 365

This course introduces, discusses, and explores the planning, implementation, and monitoring of threat protection services in Microsoft 365. You’ll learn about the different services and tools available to secure and protect your identities and data.
Course info
Level
Intermediate
Updated
Apr 20, 2020
Duration
1h 11m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 20, 2020
Duration
1h 11m
Description

Planning the implementation of threat protection is one of the first steps to securing your user identities and your organization’s data stored in Microsoft 365. In this course, Implementing and Monitoring Threat Management in Microsoft 365, you'll learn foundational knowledge of the Microsoft 365 threat management services and products that can be used to protect your user identities and their data. First, you'll learn how to design and configure Advanced Threat Protection (ATP) policies to take full advantage of their capabilities. Next, you'll discover all the different considerations for deploying and configuring Windows Defender ATP, as well as the Windows 10 Enterprise security features. Finally, you'll explore the monitoring capabilities including Advanced Threat Analysis (ATA) incidents, the service assurance dashboard, monitoring with Azure AD Identity Protection, and how to configure and manage Azure Identity Protection dashboards and alerts, as well as how to configure and manage Microsoft 365 security alerts. When you're finished with this course, you'll have the skills and knowledge of Microsoft 365 threat management to successfully implement, configure, manage, and monitor the numerous types of Microsoft 365 threats.

About the author
About the author

Brian Alderman is a Microsoft MVP, and has his Master's in Computer Information Systems. Since 1995, he has held several Microsoft certifications that currently include; MCT, MCSE for SharePoint, MCSA for Office 365, MCITP for SQL Server(R), MCSA and MCSE for Windows Server(R), and also his PMP certification. Brian's publications include SQL Server 2000 Administration, SharePoint 2010 Administrator's Companion and Microsoft SharePoint 2013 Administration Inside Out, and he is an active speaker at SharePoint Industry conferences including SharePoint Saturday's, SPLive, DevIntersection, SharePoint Fest, and Microsoft Ignite.

More from the author
More courses by Brian Alderman
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello, everyone. My name is Brian Alderman and welcome to my cores on implementing and monitoring threat management in Microsoft. 3 65 I'm a Microsoft M V P. I'm also on M, C T and Microsoft certified Trainer for 23 consecutive years. So lots of training under my belt. I've authored four published Microsoft Technology Books, and I'm a speaker at several SharePoint in Microsoft 3 65 conferences around the world and in my spare time, I'm a trainer and consulted at my own company called Micro Tech Point, Microsoft 3 65 includes threat protection, service is and products To help secure your organization's data. It's important to plan for the deployment of threat protection, utilizing the service's and products, as well as understanding what each product provides, how they are implemented and how to configure them after implementation. We're gonna learn about a TA or advanced threat analytics a few flavors of 80 p, which has advanced threat protection as well as ways to monitor these threats to help you take the necessary actions. In this course, we're going to introduce Explorer and discuss planning considerations for a teepee configuring the different 80 p types planning and configuring a T A and monitoring of threat protection in Microsoft 3 65 By the end of this course, you'll know what needs to be carefully considered to successfully plan for implementing, configuring and monitoring threat protection to help protect your users identities and your organization's data. Before beginning this course, you should be familiar with your organization's planning policies. Have a general understanding of the common identity and data threats in your organization and be familiar with the type of monitoring required by your organization. I hope you'll join me on this journey to learn about threat protection with by implementing and monitoring Threat Management and Microsoft 3 65 course available here at Pluralsight.