Atnaujinkite slapukų nuostatas

Exam Ref MS-500 Microsoft 365 Security Administration [Minkštas viršelis]

  • Formatas: Paperback / softback, 224 pages, aukštis x plotis x storis: 229x185x13 mm, weight: 340 g
  • Serija: Exam Ref
  • Išleidimo metai: 07-Jan-2021
  • Leidėjas: Addison Wesley
  • ISBN-10: 0135802644
  • ISBN-13: 9780135802649
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 224 pages, aukštis x plotis x storis: 229x185x13 mm, weight: 340 g
  • Serija: Exam Ref
  • Išleidimo metai: 07-Jan-2021
  • Leidėjas: Addison Wesley
  • ISBN-10: 0135802644
  • ISBN-13: 9780135802649
Kitos knygos pagal šią temą:

Direct from Microsoft, this Exam Ref is the official study guide for the new Microsoft MS-500 Microsoft 365 Security Administration certification exam.


Exam Ref MS-500 Microsoft 365 Security Administration offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on the specific areas of expertise modern IT professionals need to implement and administer security in any Microsoft 365 environment. Coverage includes:

  • Implementing and managing identity and access
  • Implementing and managing threat protection
  • Implementing and managing information protection
  • Managing governance and compliance features in Microsoft 365

Microsoft Exam Ref publications stand apart from third-party study guides because they:

  • Provide guidance from Microsoft, the creator of Microsoft certification exams
  • Target IT professional-level exam candidates with content focused on their needs, not "one-size-fits-all" content
  • Streamline study by organizing material according to the exam’s objective domain (OD), covering one functional group and its objectives in each chapter
  • Feature Thought Experiments to guide candidates through a set of "what if?" scenarios, and prepare them more effectively for Pro-level style exam questions
  • Explore big picture thinking around the planning and design aspects of the IT pro’s job role

For more information on Exam MS-500 and the Microsoft 365 Certified: Security Administrator Associate, visit microsoft.com/learning.


Introduction xv
Organization of this book xv
Preparing for the exam xv
Microsoft certifications xvi
Quick access to online references xvi
Errata, updates, & book support xvii
Stay in touch xvii
Chapter 1 Implement and manage identity and access
1(32)
Skill 1.1 Secure Microsoft 365 hybrid environments
1(4)
Plan Azure AD authentication options
2(1)
Plan Azure AD synchronization options
2(1)
Monitor and troubleshoot Azure AD Connect events
3(2)
Skill 1.2 Secure identities
5(3)
Implement Azure AD group membership
5(1)
Implement password management
6(1)
Configure and manage identity governance
6(2)
Skill 1.3 Implement authentication methods
8(5)
Plan sign-in security
9(1)
Implement multifactor authentication (MFA)
10(1)
Manage and monitor MFA
10(1)
Plan and implement device authentication methods like Windows Hello
10(2)
Configure and manage Azure AD user authentication options
12(1)
Skill 1.4 Implement conditional access
13(5)
Plan for compliance and conditional access policies
13(2)
Configure and manage device compliance for endpoint security
15(2)
Implement and manage conditional access
17(1)
Skill 1.5 Implement role-based access control (RBAC)
18(2)
Plan for roles
18(1)
Configure roles
19(1)
Audit roles
20(1)
Skill 1.6 Implement Azure AD Privileged Identity Management (PIM)
20(2)
Plan for Azure PIM
21(1)
Implement and configure Azure PIM roles
21(1)
Manage Azure PIM role assignments
22(1)
Skill 1.7 Implement Azure AD Identity Protection
22(11)
Implement user risk policy
22(1)
Implement sign-in risk policy
23(1)
Configure Identity Protection alerts
24(1)
Review and respond to risk events
24(7)
Thought Experiment Answers
31(1)
Secure Microsoft 365 hybrid environments
31(1)
Secure identities
31(1)
Implement authentication methods
31(1)
Implement conditional access
31(1)
Implement role-based access control (RBAC)
31(1)
Implement Azure AD Privileged Identity Management
31(1)
Implement Azure AD Identity Protection
32(1)
Chapter 2 Implement and manage threat protection
33(66)
Skill 2.1 Implement an enterprise hybrid threat protection solution
33(8)
Planning an Azure Advanced Threat Protection (ATP) solution
34(2)
Install and configure Azure ATP
36(1)
Manage Azure ATP Workspace Health
37(1)
Generate Azure ATP reports
38(1)
Integrate Azure ATP with Microsoft Defender ATP
39(1)
Manage suspicious activities
40(1)
Skill 2.2 Implement device threat protection
41(14)
Plan and implement a Microsoft Defender ATP solution
42(1)
Manage Microsoft Defender ATP
43(12)
Monitoring Microsoft Defender ATP
55(1)
Skill 2.3 Implement and manage device and application protection
55(14)
Plan for device protection
55(3)
Configure and manage Windows Defender Application Guard
58(1)
Configure and manage Windows Defender Application Control
59(1)
Configure and manage Windows Defender Exploit Guard
60(1)
Configure Secure Boot
61(1)
Configure and manage Windows 10 device encryption
62(1)
Plan for securing applications data on devices
62(1)
Define managed apps for mobile application management (MAM)
63(1)
Protect your enterprise data using Windows Information Protection (WIP)
64(1)
Configure WIP policies
65(3)
Configure Intune App Protection Policies for non-Windows devices
68(1)
Skill 2.4 Implement and manage Office 365 ATP
69(1)
Configure Office 365 ATP anti-phishing policies
70(2)
Define users and domains to protect with Office 365 ATP Anti-Phishing
72(2)
Configure actions against impersonation
74(1)
Configure Office 365 ATP anti-spam protection
75(3)
Enable Office 365 ATP Safe Attachments
78(1)
Configure Office 365 ATP Safe Attachments policies
78(1)
Configure Office 365 ATP Safe Links policies
79(2)
Configure Office 365 ATP Safe Links blocked URLs
81(1)
Configure Office 365 Threat Intelligence
81(1)
Integrate Office 365 Threat Intelligence with Microsoft Defender ATP
82(1)
Review threats and malware trends on the Office 365 ATP Threat Management dashboard
83(1)
Review threats and malware trends with Office 365 ATP Threat Explorer and Threat Tracker
84(1)
Create and review Office 365 ATP incidents
85(1)
Review quarantined items in ATP
86(1)
Monitor online anti-malware solutions using Office 365 ATP reports
87(1)
Perform tests using Attack Simulator
87(5)
Skill 2.5 Implement Azure Sentinel for Microsoft 365
92(7)
Plan and implement Azure Sentinel
92(2)
Configure Playbooks in Azure Sentinel
94(1)
Manage and monitor Azure Sentinel
94(1)
Respond to threats in Azure Sentinel
95(2)
Thought Experiment Answers
97(1)
Using Azure ATP
97(1)
Using Microsoft Defender ATP
97(1)
Device Protection
98(1)
Protecting users from phishing attacks
98(1)
Using Office 365 Threat Intelligence
98(1)
Chapter 3 Implement and manage information protection
99(1)
Skill 3.1 Secure data access within Office 365
99(1)
Implement and manage Customer Lockbox
100(1)
Configure data access in Office 365 collaboration workloads
101(2)
Configure B2B sharing for external users
103(2)
Skill 3.2 Manage Azure Information Protection (AIP)
105(6)
Plan an AIP solution
105(1)
Configure Sensitivity Labels and policies
106(3)
Deploy the RMS connector
109(1)
Manage tenant keys
109(1)
Deploy the AIP client
110(1)
Integrate AIP with Office 365 Services
110(1)
Skill 3.3 Manage Data Loss Prevention (DLP)
111(1)
Plan a DLP solution
112(1)
Create and manage DLP policies
112(2)
Create and manage sensitive information types
114(1)
Monitor DLP reports
115(1)
Manage DLP notifications
116(1)
Skill 3.4 Implement and manage Microsoft Cloud App Security
117(14)
Plan Cloud App Security implementation
117(1)
Configure Microsoft Cloud App Security
117(1)
Manage cloud app discovery
118(1)
Manage entries in the Cloud app catalog
119(1)
Manage apps in Cloud App Security
119(1)
Manage Microsoft Cloud App Security
120(1)
Configure Cloud App Security connectors and OAuth apps
120(1)
Configure Cloud App Security policies and templates
121(3)
Review, interpret, and respond to Cloud App Security alerts, reports, dashboards, and logs
124(5)
Thought Experiment Answers
129(1)
Secure data access within Office 365
129(1)
Manage Azure Information Protection (AIP)
129(1)
Manage Data Loss Prevention (DLP)
129(1)
Implement and manage Microsoft Cloud App Security
129(2)
Chapter 4 Manage governance and compliance features in Microsoft 365
131(64)
Skill 4.1 Configure and analyze security reporting
131(13)
Interpret Windows Analytics
132(1)
Configure Windows Telemetry options
132(1)
Configure Office Telemetry options
133(1)
Review and interpret security reports and dashboards
133(2)
Plan for custom security reporting with Intelligent Security Graph
135(1)
Review Office 365 Secure Score actions and recommendations
136(3)
Configure alert policies in the Office 365 Security and Compliance Center
139(5)
Skill 4.2 Manage and analyze audit logs and reports
144(1)
Plan for auditing and reporting
144(2)
Configure Office 365 auditing and reporting
146(1)
Perform audit log search
147(1)
Review and interpret compliance reports and dashboards
148(3)
Configure audit alert policy
151(1)
Skill 4.3 Configure Office 365 classification and labeling
152(7)
Plan for data governance classification and labels
153(1)
Search for personal data
153(3)
Apply labels to personal data
156(1)
Monitor for leaks of personal data
157(1)
Create and publish Office 365 labels
157(1)
Configure label policies
158(1)
Skill 4.4 Manage data governance and retention
159(17)
Plan for data governance and retention
160(1)
Review and interpret data governance reports and dashboards
161(1)
Configure retention policies
162(2)
Define data governance event types
164(1)
Define data governance supervision policies
165(3)
Configure information holds
168(1)
Import data in the Security and Compliance Center
169(2)
Configure data archiving
171(1)
Manage inactive mailboxes
172(4)
Skill 4.5 Manage search and investigation
176(8)
Plan for content search and eDiscovery
176(1)
Delegate permissions to use search and discovery tools
177(1)
Use search and investigation tools to perform content searches
177(3)
Export content search results
180(2)
Manage eDiscovery cases
182(2)
Skill 4.6 Manage data privacy regulation compliance
184(9)
Plan for regulatory compliance in Microsoft 365
184(1)
Review and interpret GDPR dashboards and reports
185(1)
Manage Data Subject Requests (DSRs)
186(1)
Review Compliance Manager reports
187(1)
Create and perform Compliance Manager assessments and action items
188(5)
Thought Experiment Answers
193(2)
Configure and analyze security reporting
193(1)
Manage and analyze audit logs and reports
193(1)
Configure Office 365 classification and labeling
193(1)
Manage data governance and retention
194(1)
Manage search and investigation
194(1)
Manage data privacy regulation compliance
194(1)
Index 195
Ed Fisher, Security & Compliance Architect at Microsoft, focuses on all aspects of security and compliance within Office 365, especially Microsoft Threat Protection. He has spent nearly a decade helping Microsoft customers and partners succeed with Microsoft cloud and productivity solutions. You can learn more at https://aka.ms/edfisher.

Nate Chamberlain is a Microsoft 365 Certified Enterprise Administrator Expert. He has been an Office Apps and Services MVP since 2019, frequently blogging at NateChamberlain.com and speaking at Microsoft-focused events and user groups.