Introduction |
|
xv | |
Organization of this book |
|
xv | |
Preparing for the exam |
|
xv | |
Microsoft certifications |
|
xvi | |
Quick access to online references |
|
xvi | |
Errata, updates, & book support |
|
xvii | |
Stay in touch |
|
xvii | |
|
Chapter 1 Implement and manage identity and access |
|
|
1 | (32) |
|
Skill 1.1 Secure Microsoft 365 hybrid environments |
|
|
1 | (4) |
|
Plan Azure AD authentication options |
|
|
2 | (1) |
|
Plan Azure AD synchronization options |
|
|
2 | (1) |
|
Monitor and troubleshoot Azure AD Connect events |
|
|
3 | (2) |
|
Skill 1.2 Secure identities |
|
|
5 | (3) |
|
Implement Azure AD group membership |
|
|
5 | (1) |
|
Implement password management |
|
|
6 | (1) |
|
Configure and manage identity governance |
|
|
6 | (2) |
|
Skill 1.3 Implement authentication methods |
|
|
8 | (5) |
|
|
9 | (1) |
|
Implement multifactor authentication (MFA) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Plan and implement device authentication methods like Windows Hello |
|
|
10 | (2) |
|
Configure and manage Azure AD user authentication options |
|
|
12 | (1) |
|
Skill 1.4 Implement conditional access |
|
|
13 | (5) |
|
Plan for compliance and conditional access policies |
|
|
13 | (2) |
|
Configure and manage device compliance for endpoint security |
|
|
15 | (2) |
|
Implement and manage conditional access |
|
|
17 | (1) |
|
Skill 1.5 Implement role-based access control (RBAC) |
|
|
18 | (2) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
Skill 1.6 Implement Azure AD Privileged Identity Management (PIM) |
|
|
20 | (2) |
|
|
21 | (1) |
|
Implement and configure Azure PIM roles |
|
|
21 | (1) |
|
Manage Azure PIM role assignments |
|
|
22 | (1) |
|
Skill 1.7 Implement Azure AD Identity Protection |
|
|
22 | (11) |
|
Implement user risk policy |
|
|
22 | (1) |
|
Implement sign-in risk policy |
|
|
23 | (1) |
|
Configure Identity Protection alerts |
|
|
24 | (1) |
|
Review and respond to risk events |
|
|
24 | (7) |
|
Thought Experiment Answers |
|
|
31 | (1) |
|
Secure Microsoft 365 hybrid environments |
|
|
31 | (1) |
|
|
31 | (1) |
|
Implement authentication methods |
|
|
31 | (1) |
|
Implement conditional access |
|
|
31 | (1) |
|
Implement role-based access control (RBAC) |
|
|
31 | (1) |
|
Implement Azure AD Privileged Identity Management |
|
|
31 | (1) |
|
Implement Azure AD Identity Protection |
|
|
32 | (1) |
|
Chapter 2 Implement and manage threat protection |
|
|
33 | (66) |
|
Skill 2.1 Implement an enterprise hybrid threat protection solution |
|
|
33 | (8) |
|
Planning an Azure Advanced Threat Protection (ATP) solution |
|
|
34 | (2) |
|
Install and configure Azure ATP |
|
|
36 | (1) |
|
Manage Azure ATP Workspace Health |
|
|
37 | (1) |
|
Generate Azure ATP reports |
|
|
38 | (1) |
|
Integrate Azure ATP with Microsoft Defender ATP |
|
|
39 | (1) |
|
Manage suspicious activities |
|
|
40 | (1) |
|
Skill 2.2 Implement device threat protection |
|
|
41 | (14) |
|
Plan and implement a Microsoft Defender ATP solution |
|
|
42 | (1) |
|
Manage Microsoft Defender ATP |
|
|
43 | (12) |
|
Monitoring Microsoft Defender ATP |
|
|
55 | (1) |
|
Skill 2.3 Implement and manage device and application protection |
|
|
55 | (14) |
|
Plan for device protection |
|
|
55 | (3) |
|
Configure and manage Windows Defender Application Guard |
|
|
58 | (1) |
|
Configure and manage Windows Defender Application Control |
|
|
59 | (1) |
|
Configure and manage Windows Defender Exploit Guard |
|
|
60 | (1) |
|
|
61 | (1) |
|
Configure and manage Windows 10 device encryption |
|
|
62 | (1) |
|
Plan for securing applications data on devices |
|
|
62 | (1) |
|
Define managed apps for mobile application management (MAM) |
|
|
63 | (1) |
|
Protect your enterprise data using Windows Information Protection (WIP) |
|
|
64 | (1) |
|
|
65 | (3) |
|
Configure Intune App Protection Policies for non-Windows devices |
|
|
68 | (1) |
|
Skill 2.4 Implement and manage Office 365 ATP |
|
|
69 | (1) |
|
Configure Office 365 ATP anti-phishing policies |
|
|
70 | (2) |
|
Define users and domains to protect with Office 365 ATP Anti-Phishing |
|
|
72 | (2) |
|
Configure actions against impersonation |
|
|
74 | (1) |
|
Configure Office 365 ATP anti-spam protection |
|
|
75 | (3) |
|
Enable Office 365 ATP Safe Attachments |
|
|
78 | (1) |
|
Configure Office 365 ATP Safe Attachments policies |
|
|
78 | (1) |
|
Configure Office 365 ATP Safe Links policies |
|
|
79 | (2) |
|
Configure Office 365 ATP Safe Links blocked URLs |
|
|
81 | (1) |
|
Configure Office 365 Threat Intelligence |
|
|
81 | (1) |
|
Integrate Office 365 Threat Intelligence with Microsoft Defender ATP |
|
|
82 | (1) |
|
Review threats and malware trends on the Office 365 ATP Threat Management dashboard |
|
|
83 | (1) |
|
Review threats and malware trends with Office 365 ATP Threat Explorer and Threat Tracker |
|
|
84 | (1) |
|
Create and review Office 365 ATP incidents |
|
|
85 | (1) |
|
Review quarantined items in ATP |
|
|
86 | (1) |
|
Monitor online anti-malware solutions using Office 365 ATP reports |
|
|
87 | (1) |
|
Perform tests using Attack Simulator |
|
|
87 | (5) |
|
Skill 2.5 Implement Azure Sentinel for Microsoft 365 |
|
|
92 | (7) |
|
Plan and implement Azure Sentinel |
|
|
92 | (2) |
|
Configure Playbooks in Azure Sentinel |
|
|
94 | (1) |
|
Manage and monitor Azure Sentinel |
|
|
94 | (1) |
|
Respond to threats in Azure Sentinel |
|
|
95 | (2) |
|
Thought Experiment Answers |
|
|
97 | (1) |
|
|
97 | (1) |
|
Using Microsoft Defender ATP |
|
|
97 | (1) |
|
|
98 | (1) |
|
Protecting users from phishing attacks |
|
|
98 | (1) |
|
Using Office 365 Threat Intelligence |
|
|
98 | (1) |
|
Chapter 3 Implement and manage information protection |
|
|
99 | (1) |
|
Skill 3.1 Secure data access within Office 365 |
|
|
99 | (1) |
|
Implement and manage Customer Lockbox |
|
|
100 | (1) |
|
Configure data access in Office 365 collaboration workloads |
|
|
101 | (2) |
|
Configure B2B sharing for external users |
|
|
103 | (2) |
|
Skill 3.2 Manage Azure Information Protection (AIP) |
|
|
105 | (6) |
|
|
105 | (1) |
|
Configure Sensitivity Labels and policies |
|
|
106 | (3) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Integrate AIP with Office 365 Services |
|
|
110 | (1) |
|
Skill 3.3 Manage Data Loss Prevention (DLP) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Create and manage DLP policies |
|
|
112 | (2) |
|
Create and manage sensitive information types |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Skill 3.4 Implement and manage Microsoft Cloud App Security |
|
|
117 | (14) |
|
Plan Cloud App Security implementation |
|
|
117 | (1) |
|
Configure Microsoft Cloud App Security |
|
|
117 | (1) |
|
Manage cloud app discovery |
|
|
118 | (1) |
|
Manage entries in the Cloud app catalog |
|
|
119 | (1) |
|
Manage apps in Cloud App Security |
|
|
119 | (1) |
|
Manage Microsoft Cloud App Security |
|
|
120 | (1) |
|
Configure Cloud App Security connectors and OAuth apps |
|
|
120 | (1) |
|
Configure Cloud App Security policies and templates |
|
|
121 | (3) |
|
Review, interpret, and respond to Cloud App Security alerts, reports, dashboards, and logs |
|
|
124 | (5) |
|
Thought Experiment Answers |
|
|
129 | (1) |
|
Secure data access within Office 365 |
|
|
129 | (1) |
|
Manage Azure Information Protection (AIP) |
|
|
129 | (1) |
|
Manage Data Loss Prevention (DLP) |
|
|
129 | (1) |
|
Implement and manage Microsoft Cloud App Security |
|
|
129 | (2) |
|
Chapter 4 Manage governance and compliance features in Microsoft 365 |
|
|
131 | (64) |
|
Skill 4.1 Configure and analyze security reporting |
|
|
131 | (13) |
|
Interpret Windows Analytics |
|
|
132 | (1) |
|
Configure Windows Telemetry options |
|
|
132 | (1) |
|
Configure Office Telemetry options |
|
|
133 | (1) |
|
Review and interpret security reports and dashboards |
|
|
133 | (2) |
|
Plan for custom security reporting with Intelligent Security Graph |
|
|
135 | (1) |
|
Review Office 365 Secure Score actions and recommendations |
|
|
136 | (3) |
|
Configure alert policies in the Office 365 Security and Compliance Center |
|
|
139 | (5) |
|
Skill 4.2 Manage and analyze audit logs and reports |
|
|
144 | (1) |
|
Plan for auditing and reporting |
|
|
144 | (2) |
|
Configure Office 365 auditing and reporting |
|
|
146 | (1) |
|
|
147 | (1) |
|
Review and interpret compliance reports and dashboards |
|
|
148 | (3) |
|
Configure audit alert policy |
|
|
151 | (1) |
|
Skill 4.3 Configure Office 365 classification and labeling |
|
|
152 | (7) |
|
Plan for data governance classification and labels |
|
|
153 | (1) |
|
|
153 | (3) |
|
Apply labels to personal data |
|
|
156 | (1) |
|
Monitor for leaks of personal data |
|
|
157 | (1) |
|
Create and publish Office 365 labels |
|
|
157 | (1) |
|
|
158 | (1) |
|
Skill 4.4 Manage data governance and retention |
|
|
159 | (17) |
|
Plan for data governance and retention |
|
|
160 | (1) |
|
Review and interpret data governance reports and dashboards |
|
|
161 | (1) |
|
Configure retention policies |
|
|
162 | (2) |
|
Define data governance event types |
|
|
164 | (1) |
|
Define data governance supervision policies |
|
|
165 | (3) |
|
Configure information holds |
|
|
168 | (1) |
|
Import data in the Security and Compliance Center |
|
|
169 | (2) |
|
|
171 | (1) |
|
Manage inactive mailboxes |
|
|
172 | (4) |
|
Skill 4.5 Manage search and investigation |
|
|
176 | (8) |
|
Plan for content search and eDiscovery |
|
|
176 | (1) |
|
Delegate permissions to use search and discovery tools |
|
|
177 | (1) |
|
Use search and investigation tools to perform content searches |
|
|
177 | (3) |
|
Export content search results |
|
|
180 | (2) |
|
|
182 | (2) |
|
Skill 4.6 Manage data privacy regulation compliance |
|
|
184 | (9) |
|
Plan for regulatory compliance in Microsoft 365 |
|
|
184 | (1) |
|
Review and interpret GDPR dashboards and reports |
|
|
185 | (1) |
|
Manage Data Subject Requests (DSRs) |
|
|
186 | (1) |
|
Review Compliance Manager reports |
|
|
187 | (1) |
|
Create and perform Compliance Manager assessments and action items |
|
|
188 | (5) |
|
Thought Experiment Answers |
|
|
193 | (2) |
|
Configure and analyze security reporting |
|
|
193 | (1) |
|
Manage and analyze audit logs and reports |
|
|
193 | (1) |
|
Configure Office 365 classification and labeling |
|
|
193 | (1) |
|
Manage data governance and retention |
|
|
194 | (1) |
|
Manage search and investigation |
|
|
194 | (1) |
|
Manage data privacy regulation compliance |
|
|
194 | (1) |
Index |
|
195 | |