Implementing and Monitoring Threat Management in Microsoft 365
Course info



Course info



Description
Planning the implementation of threat protection is one of the first steps to securing your user identities and your organization’s data stored in Microsoft 365. In this course, Implementing and Monitoring Threat Management in Microsoft 365, you'll learn foundational knowledge of the Microsoft 365 threat management services and products that can be used to protect your user identities and their data. First, you'll learn how to design and configure Advanced Threat Protection (ATP) policies to take full advantage of their capabilities. Next, you'll discover all the different considerations for deploying and configuring Windows Defender ATP, as well as the Windows 10 Enterprise security features. Finally, you'll explore the monitoring capabilities including Advanced Threat Analysis (ATA) incidents, the service assurance dashboard, monitoring with Azure AD Identity Protection, and how to configure and manage Azure Identity Protection dashboards and alerts, as well as how to configure and manage Microsoft 365 security alerts. When you're finished with this course, you'll have the skills and knowledge of Microsoft 365 threat management to successfully implement, configure, manage, and monitor the numerous types of Microsoft 365 threats.
Section Introduction Transcripts
Course Overview
[Autogenerated] Hello, everyone. My name is Brian Alderman and welcome to my course on implementing and monitoring threat management and Microsoft 365. I'm a Microsoft envy P. I'm also on M, C, T and Microsoft Certified Training for 23 consecutive years. So lots of training under my belt. I've authored four published Microsoft Technology Books, and I'm a speaker at several SharePoint and Microsoft 365 conferences around the world. And in my spare time, I'm a trainer and consultant at my own company called Micro Tech Point, Microsoft 365 includes threat protection, services and products. To help secure your organization's data. It's important to plan for the deployment of threat protection. Utilizing these services and products as well was understanding what each product provides, how they are implemented and how to configure them after implementation. We're gonna learn about 80 a or advanced threat analytics a few flavors of 80 p, which has advanced threat protection as well as ways to monitor these threats to help you take the necessary actions. In this course, we're going to introduce, explore and discuss planning considerations for HTTP. Configuring the different HTTP types. Planning and configuring 80 a and monitoring a threat protection in Microsoft 365 by the end of this course, you'll know what needs to be carefully considered to successfully plan for implementing, configuring and monitoring threat protection to help protect your users identities and your organization's data. Before beginning this course, you should be familiar with your organization's planning policies. Have a general understanding of the common identity and data threats in your organization and be familiar with the type of monitoring required by your organization. I hope you'll join me on this journey to learn about threat protection with my implementing and monitoring threat management and Microsoft 365 course available here at Pluralsight.