Microsoft 365 Mobility and Security: Governance and Compliance

Explore the broad range of Microsoft 365 technologies that facilitate addressing governance and compliance requirements in this course.
Course info
Level
Intermediate
Updated
Mar 25, 2021
Duration
2h 40m
Table of contents
Description
Course info
Level
Intermediate
Updated
Mar 25, 2021
Duration
2h 40m
Description

The topics of security on one side and governance and compliance on the other are similar in scope, but uniquely different in what they aim to accomplish. In a Microsoft 365 environment, you generally implement security controls to protect against bad behaviors from the outside. It's the bad behaviors from the inside that are generally the purview of governance and compliance controls. In this course, Microsoft 365 Mobility and Security: Governance and Compliance, the final course in this learning path, you'll learn about the quite broad range of tools Microsoft supplies to handle the compliance and governance issues in a Microsoft 365 tenant. First, you'll explore the compliance regulations themselves, down to the very specific configurations required by each regulatory control, and how Microsoft 365 Compliance Center surfaces an easy-to-use interface for identifying and resolving each requirement. Next, you'll dig into information governance by way of retention policies and retention labels. Then, you'll learn about the broad range of information protection solutions in Microsoft 365 that can extend across both cloud and on-premises infrastructure components, including the use of Data Loss Protection policies for, among other things, preventing the exfiltration of data. Finally, you'll discover the search, eDiscovery, and other investigation solutions Microsoft 365 surfaces for helping you, and others, find data wherever it might hide. By the end of this course, you'll have the skills and knowledge to be able to handle the governance and compliance issues in Microsoft 365.

About the author
About the author

Greg Shields is an Author Evangelist at Pluralsight.

More from the author
More courses by Greg Shields
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, this is Greg Shields, and you've found the fourth and final course in my learning path on the Microsoft 365 topics and technologies that comprise the MS‑101 exam. I am author evangelist and a full‑time author here, at Pluralsight, and I've been building Microsoft certification‑related courses since the original days of the first‑generation MSCE. The topics of security on one side and governance and compliance on the other are similar in scope, but uniquely different in what they aim to accomplish. We, in a Microsoft 365 environment, generally implement security controls to protect against bad behaviors from the outside. It's the bad behaviors from the inside that are generally the purview of governance and compliance controls. In this course, we'll explore the quite broad range of tools Microsoft supplies to handle the compliance and governance issues in an M365 tenet. In this fourth and final course, we'll start with a look at the compliance regulations themselves down to the very specific configurations required by each regulatory control and how Microsoft 365's compliance center surfaces an easy‑to‑use interface for identifying and resolving each requirement. Then, we'll dig into information governance by way of retention policies and retention labels. Next, we'll explore the broad range of information protection solutions in M365 that could extend across both cloud and on‑premises infrastructure components, including the use of data loss protection policies for, among other things, preventing the exfiltration of data. Finally, we'll explore the Search, eDiscovery, and other investigation Solutions M365 surfaces for helping you and others find data wherever it might hide. If you've just been tasked with managing a Microsoft 365 environment, this course is your final stop in brushing up on those skills for success. And then from here, you'll be ready to continue on the learning path as you begin to incorporate these mobility and security controls in your production environment. Let's get started.