Description
Course info
Level
Intermediate
Updated
Mar 25, 2021
Duration
1h 40m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

Microsoft 365 comes equipped with a broad array of security and threat management solutions. So many, in fact, that the most difficult part of using them is first understanding them, and knowing where one feature set ends and the others begin.

In this course, Microsoft 365 Mobility and Security: Security and Threat Management, the third course of four in this learning path, you'll start with a broad exploration of the threat protection solutions with Microsoft Defender. First, you'll implement Defender for Office 365 policies, integrate Defender for Identity, and then Defender for Endpoint to aggregate security signals across your cloud, server, and device components. Next, you'll plan and implement Microsoft Cloud App Security to discover and control the cloud applications used by our users. Finally, you'll explore, once integrated, the visualizations and dashboards these solutions surface that provide deep-level access to bad behaviors, malware activities, and inappropriate application accesses. By the end of this course, you'll have an understanding of the features and integrations between the threat management solutions spanning from Office 365 security policies, to Azure identity security, to Cloud App Security, and even down to the individual device with Defender for Endpoint.

About the author
About the author

Greg Shields is an Author Evangelist at Pluralsight.

More from the author
More courses by Greg Shields
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, this is Greg Shields. And you've found the third course in the learning path on the Microsoft 365 topics and technologies that comprise the MS‑101 exam. I am author evangelist and a full‑time author here, at Pluralsight, and I've been building Microsoft certification‑related courses since the original days of the first generation MSCE. Microsoft 365 comes equipped with a broad array of security and threat management solutions, so many, in fact, that the most difficult part of using them is first understanding them and knowing where one feature set ends and the others begin. Spanning across Office 365 security policies to Azure Identity security to Cloud App security and even down to the individual device with Defender for Endpoint, this course explores not only the features, but also the integration between these solutions to create a comprehensive whole. In this third course out of four, we'll start with a broad exploration of the threat protection solutions with Microsoft Defender. We'll implement Defender for Office 365 policies, integrate Defender for Identity and then Defender for Endpoint to aggregate security signals across our cloud, server, and device components. Next, we'll plan and implement Microsoft Cloud App security to discover and control the cloud applications used by our users. Then, once integrated, we'll explore the visualizations and dashboards these solutions surface that provide deep‑level access to bad behaviors, malware activities, and inappropriate application accesses. If you've just been tasked with managing a Microsoft 365 environment, this course is your next stop in brushing up on those skills for success. And then from here, you'll be ready to continue on the learning path as we understand the topics in governance and compliance. Let's get started.