Microsoft 365 Mobility and Security (MS-101)

Paths

Microsoft 365 Mobility and Security (MS-101)

Author: Brian Alderman

These courses cover the knowledge needed to take your Microsoft 365 administration skills to the next level. You will dive into the intricacies surrounding implementing modern... Read more

What you will learn

  • Implementing MDM
  • Managing device and app compliance
  • Planning for Windows 10 deployment
  • Implementing cloud app security
  • Implementing and monitoring threat management
  • Managing data protection
  • Managing data

Pre-requisites

Viewers should be well versed in Microsoft 365 administration from one of Microsoft’s designated workload silos (Exchange, SharePoint, Skype for Business, or Windows as a Service).

MS-101: Microsoft 365 Mobility and Security

These courses cover the knowledge needed to take your Microsoft 365 administration skills to the next level. You will dive into the intricacies surrounding implementing modern device services, implementing Microsoft 365 security and threat management, and Managing governance and compliance. You’ll round out your skills needed to establish yourself as an enterprise administration expert.

In addition, these courses align with the objectives for the MS-101 exam and can help you prepare for certification. MS-101 pairs with MS100 for the Microsoft 365 Enterprise Administrator Expert certification.

Implementing Mobile Device Management for Microsoft 365

by Brian Alderman

Feb 26, 2020 / 49m

49m

Start Course
Description

Managing the devices used to access your company resources can be an overwhelming task, and if the planning process doesn’t take all the right things into consideration it can quickly become very challenging. In this course, Implementing Mobile Device Management for Microsoft 365, we are going to introduce, discuss, and explore Microsoft Intune, Mobile Device Management (MDM), and Mobile Application Management (MAM). First, you'll learn implementation configurations including MDM integration with Azure AD. Next, you'll discover how to set an MDM authority. Finally, you'll explore configuring device enrollment limits for the different types of devices accessing your company resources. The planning process should include the three P’s (Planning, Planning, and Planning) and the three D’s (Document, Document, Document) to ensure everything that needs to be planned for is in fact planned for, the decisions made in the planning process are well documented, and all the key stakeholders sign off on the plan that will be used to enroll, control, and configure the different mobile devices being used to access your company resources. By the end of this course, you'll have a better grasp on the implementation of MDM and how you can effectively utilize it.

Table of contents
  1. Course Overview
  2. Course and Module Introduction
  3. Planning for Mobile Device Management
  4. Managing Mobile Device Management in Microsoft 365
  5. Implementing Mobile Device Management for Microsoft 365 Course Review

Planning and Managing Device and Application Compliance in Microsoft 365

by Brian Alderman

Mar 9, 2020 / 57m

57m

Start Course
Description

Managing the devices used to access your company resources, and the applications running on those devices can be overwhelming. If the planning process doesn’t include the key considerations it can quickly become very challenging. In this course, Planning and Managing Device and Application Compliance in Microsoft 365, you will learn considerations for managing and monitoring devices and the applications on those devices. First, you will explore the management differences between Company Owned Devices (CODs) and Bring Your Own Devices (BYODs) that can be used to access your company resources. Next, you will discover the management and monitoring of the devices can be achieved using device co-management, Mobile Application Management (MAM), device profiles, and conditional access policies. Finally, you will learn about planning for profiles used to manage devices. When you are finished with this course, you will have the knowledge necessary to obtain a sign off from devices and applications that are going to be managed, controlled, configured, and monitored when accessing your company resources.

Table of contents
  1. Course Overview
  2. Course and Module Introduction
  3. Planning Device and Device Application Management
  4. Managing Devices Using Policies
  5. Planning and Managing Device and Application Compliance in Microsoft 365 Course Review

Planning for Microsoft 365 Windows 10 Deployment

by Brian Alderman

Mar 24, 2020 / 48m

48m

Start Course
Description

Planning the deployment of the Windows 10 operating system is one of the first steps to deploying a Windows 10 Enterprise. In this course, Planning for Microsoft 365 Windows 10 Deployment, you'll learn foundational knowledge of the Windows 10 Enterprise operating system that can be deployed to all your tenant users. First, you'll learn how to determine whether the computer is compatible with Windows 10, and also secure the computer after Windows 10 has been deployed. Next, you'll discover all the necessary considerations for deploying Windows 10. Finally you'll explore all the deployment methods available for the deployment, in addition to the tools used to troubleshoot a failed deployment, and the tools needed to minimize the failure of the deployment of Windows 10. When you're finished with this course, you'll have the skills and knowledge of Windows 10 needed for the operating system to be deployed, managed, controlled, configured, and monitored.

Table of contents
  1. Course Overview
  2. Course Introduction Module
  3. Planning for Windows 10 Deployment
  4. Upgrading and Updating Windows 10
  5. Planning for Microsoft 365 Windows 10 Deployment Course Review

Implementing Cloud App Security in Microsoft 365

by Brian Alderman

Mar 31, 2020 / 44m

44m

Start Course
Description

Microsoft 365 includes Cloud App Security (CAS) that is used to help with securing your cloud data. CAS provides configuration tools including CAS policies, and Connected Apps to provide access and protect your cloud data. In this course, Implementing Cloud App Security in Microsoft 365, you will learn foundational knowledge of/gain the ability to planning considerations for implementing, configuring, and monitoring CAS. First, you will learn the implementation of CAS. Next, you will discover how to configure CAS using policies and connected apps. Finally, you will explore how to third skill. When you’re finished with this course, you will have the skills and knowledge of monitor CAS using both alerts and logs needed to end product/overall skill.

Table of contents
  1. Course Overview
  2. Course Introduction Module
  3. Configuring Cloud App Security
  4. Monitoring Cloud App Security
  5. Implementing Cloud App Security in Microsoft 365 Course Review

Implementing and Monitoring Threat Management in Microsoft 365

by Brian Alderman

Apr 20, 2020 / 1h 11m

1h 11m

Start Course
Description

Planning the implementation of threat protection is one of the first steps to securing your user identities and your organization’s data stored in Microsoft 365. In this course, Implementing and Monitoring Threat Management in Microsoft 365, you'll learn foundational knowledge of the Microsoft 365 threat management services and products that can be used to protect your user identities and their data. First, you'll learn how to design and configure Advanced Threat Protection (ATP) policies to take full advantage of their capabilities. Next, you'll discover all the different considerations for deploying and configuring Windows Defender ATP, as well as the Windows 10 Enterprise security features. Finally, you'll explore the monitoring capabilities including Advanced Threat Analysis (ATA) incidents, the service assurance dashboard, monitoring with Azure AD Identity Protection, and how to configure and manage Azure Identity Protection dashboards and alerts, as well as how to configure and manage Microsoft 365 security alerts. When you're finished with this course, you'll have the skills and knowledge of Microsoft 365 threat management to successfully implement, configure, manage, and monitor the numerous types of Microsoft 365 threats.

Table of contents
  1. Course Overview
  2. Course Introduction Module
  3. Configuring Advanced Threat Protection Policies
  4. Configuring Windows Defender Advanced Threat Protection (ATP)
  5. Monitoring Threat Protection
  6. Implementing and Monitoring Threat Management in Microsoft 365 Course Review

Designing, Managing, and Implementing Data Protection for Microsoft 365

by Brian Alderman

May 13, 2020 / 1h 14m

1h 14m

Start Course
Description

Planning the implementation of data protection is one of the first steps to security your organization’s data stored in Microsoft 365. In this course, Designing, Managing, and Implementing Data Protection in Microsoft 365, you'll learn foundational knowledge of the Microsoft 365 data protection services and products that can be used to create a solution to protect your data. First, you'll learn how to configure, manage, and monitor Data Loss Prevention (DLP) which includes DLP policies. Next, you'll discover the different considerations for deploying and configuring Azure Information Protection (AIP), as well as the other Microsoft 365 technologies that integrate with AIP, including Windows Information Protection (WIP), and Information Rights Management (IRM). Finally, you'll explore additional data protection capabilities like the Rights Management Connector, classifications and labels, and how to configure a super user.. When you're finished with this course, you'll have the skills and knowledge of Microsoft 365 data protection tools and services to successfully implement, configure, manage, and monitor a Microsoft 365 data protection solution.

Table of contents
  1. Course Overview
  2. Course Introduction Module
  3. Configuring Data Loss Prevention (DLP)
  4. Configuring Azure Information Protection (AIP)
  5. Configuring Information Protection in Microsoft 365
  6. Designing, Managing, and Implementing Data Protection for Microsoft 365 Course Review

Configuring, Managing, and Monitoring Microsoft 365 Data

by Brian Alderman

May 22, 2020 / 1h 8m

1h 8m

Start Course
Description

Planning for data management is one of the first steps to understand and protect your organization’s Microsoft 365 information. In this course, Configuring, Managing, and Monitoring Microsoft 365 Data, you'll learn foundational knowledge of the Microsoft 365 data management services and products that can be used to retain, recover, and monitor your data. First, you'll learn about the tools available to implement information retention regardless of where it is located. Next, you'll discover the different auditing services available for monitoring the use and access of your organization’s data. Finally, you'll explore the data preservation methods available by using in-place holds, as well as eDiscovery cases both available in Microsoft 365. When you’re finished with this course, you'll have the skills and knowledge of Microsoft 365 data management to successfully plan for, implement, configure, monitor, and preserve your Microsoft 365 data.

Table of contents
  1. Course Overview
  2. Course Introduction Module
  3. Managing Your Data in Microsoft 365
  4. Configuring Auditing in Microsoft 365
  5. Preserving Data to Meet Legal Requirements
  6. Configuring, Managing, and Monitoring Microsoft 365 Data Course Review

Knowledge is power

A Professional or Enterprise Pluralsight account is required to access Kaplan®* practice exams. Sign in below or sign up for a free team trial.