Oreilly - Microsoft 365 Mobility and Security (Exam MS-101)
by Norm Kennedy | Publisher: Intellezy | Release Date: October 2019 | ISBN: 042365MS101
Table of Contents
- Introduction
- Identifying Threat Vectors
- Today's Threat Landscape 00:02:15
- What is Spoofing? 00:02:38
- What is Phishing? 00:02:53
- How Do Spam and Malware Cause Harm? 00:01:26
- How Do Account Breaches Cause Harm? 00:02:54
- Data Exfiltration, Deletion, and Spillage 00:02:52
- Using Secure Score
- What is a Secure Score? 00:02:19
- Using the Secure Score Dashboard and Analyzer 00:03:06
- Increasing your Security Posture 00:04:51
- Configuring Azure Identity Protection
- What is Azure Identity Protection? 00:06:29
- Activating Azure Information Protection 00:03:09
- Configuring Azure Information Protection 00:06:15
- Configuring Alerts and Investigation 00:04:17
- Setting Exclusions 00:03:15
- Exchange Online Protection
- What is Exchange Online Protection? 00:06:25
- Understanding Zero Hour Auto Purge 00:02:38
- Spoofing and Phishing Protection 00:03:18
- Configuring with Exchange AntiSpam 00:07:02
- Configuring Exchange Anti Malware 00:04:08
- Creating a Safe Attachments Policy 00:07:25
- Creating a Transport Rule to Bypass Safe Attachments 00:04:25
- Creating a Safe Links Policy 00:04:53
- Creating a Transport Rule to Bypass Safe Links 00:03:26
- Monitoring and Reporting 00:04:31
- Microsoft 365 Threat Intelligence
- Microsoft Intelligent Security Graph 00:02:59
- Working with the Security Dashboard 00:03:47
- Viewing the Threat Explorer 00:02:43
- What is Microsoft Advanced Threat Analytics? 00:04:56
- Configuring ATA 00:08:56
- Managing ATA 00:03:48
- Microsoft Data Governance
- In-Place Archive in Exchange 00:02:56
- Enabling In-Place Archiving 00:02:57
- In-Place Records Management in SharePoint 00:02:42
- Activating In-Place Records Management 00:06:15
- Messaging Records Management 00:04:29
- Creating MRM Policy and Tags 00:06:23
- Troubleshooting MRM PolicesThat Don't Run 00:03:19
- Information Rights Management in Exchange 00:03:53
- Information Rights Management in SharePoint 00:06:22
- Office 365 Message Encryption 00:04:10
- Security and Compliance
- Planning Security and Compliance Roles 00:04:16
- Reviewing GDPR Needs 00:05:37
- Building an Ethical Wall 00:04:03
- Working with a Retention Policy 00:05:14
- Creating Retention Policy 00:08:41
- Data Loss Prevention 00:04:23
- Creating a DPL Policy 00:11:00
- Troubleshooting Policy Tips 00:02:22
- What is Azure Information Protection? 00:02:47
- Planning Azure Information Protection 00:03:22
- Configuring Super User for AIP 00:02:57
- Implementing the AIP Tenant Key 00:02:22
- Working with AIP Labels and Policies 00:07:53
- What is Windows Information Protection 00:04:41
- Planning for WIP 00:02:47
- Implementing Windows Information Protection 00:04:23
- Managing Search and Investigation
- What is Content Search? 00:02:05
- Creating a Content Search 00:03:31
- Auditing in Microsoft 365 00:02:24
- Searching Audit Logs 00:08:34
- Configuring Audit Policy in SharePoint 00:01:29
- Planning for Device Management
- Planning for Device Management 00:03:59
- Prerequisites for Using Co-Management 00:01:58
- Enabling Co-Management 00:04:08
- Transferring Services to Intune 00:02:28
- What is Microsoft Store for Business? 00:03:10
- Configuring Microsoft Store for Business 00:02:23
- Managing Settings in the Microsoft Store for Business 00:04:07
- What is Mobile Application Management? 00:02:32
- Configuring Mobile Application Management 00:02:36
- Using Azure AD for Apps 00:04:29
- Windows 10 Deployment Strategy
- Planning for Windows as a Service 00:03:19
- What are the Windows 10 Deployment Models? 00:08:12
- Planning your Subscription Activation Strategy 00:02:40
- Resolving Windows 10 Upgrade Errors 00:06:30
- Implementing Mobile Device Malmanagement
- Managing Devices with MDM 00:02:34
- Activating MDM 00:02:36
- Configuring MDM 00:02:36
- Managing Device Policies 00:04:36
- Creating Conditional Access Policies 00:05:37
- Enrolling Devices for MDM 00:02:31
- Monitoring Enrolled Devices 00:02:39
- Conclusion
042365MS101.Microsoft.365.Mobility.and.Security.Exam.MS101.part1.OR.rar
042365MS101.Microsoft.365.Mobility.and.Security.Exam.MS101.part2.OR.rar
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.