microsoft partner logo color
8243  Reviews star_rate star_rate star_rate star_rate star_half

Administering Information Protection and Compliance in Microsoft 365

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course...

Read More
$2,380 USD GSA  $1,284.26
Course Code SC-400T00
Duration 4 days
Available Formats Classroom, Virtual

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

Audience Profile

The information protection administrator translates an organization’s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls.

Skills Gained

After completing this course, students will be able to:

  • Explain and use sensitivity labels.
  • Configure Data Loss Prevention policies.
  • Secure messages with Microsoft Purview
  • Describe the information governance configuration process.
  • Define key terms associated with Microsofts information protection and governance solutions.
  • Explain the Content explorer and Activity explorer.
  • Describe how to use sensitive information types and trainable classifiers.
  • Review and analyze DLP reports.
  • Identify and mitigate DLP policy violations.
  • Describe the integration of DLP with Microsoft Defender for Cloud Apps.
  • Deploy Endpoint DLP
  • Describe records management
  • Configure event driven retention
  • Import a file plan
  • Configure retention policies and labels
  • Create custom keyword dictionaries
  • Implement document fingerprinting

Prerequisites

Before attending this course, students should have:

  • Foundational knowledge of Microsoft security and compliance technologies.
  • Basic knowledge of information protection concepts.
  • Understanding of cloud computing concepts.
  • Understanding of Microsoft 365 products and services.

Course Details

Outline

  • Introduction to information security and compliance in Microsoft Purview
    • Foundations of data security and compliance with Microsoft Purview
    • Know your data
    • Protect your data
    • Prevent data loss
    • Govern your data
    • Knowledge check
    • Summary and resources
  • Classify data for protection and governance
    • Data classification overview
    • Classify data using sensitive information types
    • Classify data using trainable classifiers
    • Review sensitive information and label usage
    • Explore labeled and sensitive content
    • Understand activities related to your data
    • Summary and knowledge check
  • Create and manage sensitive information types
    • Sensitive information type overview
    • Compare built-in versus custom sensitive information types
    • Create and manage custom sensitive information types
    • Create and manage exact data match sensitive info types
    • Implement document fingerprinting
    • Describe named entities
    • Create a keyword dictionary
    • Knowledge check
    • Summary and resources
  • Understand Microsoft 365 encryption
    • Introduction to Microsoft 365 encryption
    • Learn how Microsoft 365 data is encrypted at rest
    • Understand service encryption in Microsoft Purview
    • Explore customer key management using Customer Key
    • Learn how data is encrypted in-transit
    • Summary and knowledge check
  • Deploy Microsoft Purview Message Encryption
    • Implement Microsoft Purview Message Encryption
    • Implement Microsoft Purview Advanced Message Encryption
    • Use Microsoft Purview Message Encryption templates in mail flow rules
    • Knowledge check
    • Summary and resources
  • Create and configure sensitivity labels with Microsoft Purview
    • Sensitivity label overview
    • Create and configure sensitivity labels and label policies
    • Configure encryption with sensitivity labels
    • Implement auto-labeling policies
    • Use the data classification dashboard to monitor sensitivity labels
    • Knowledge check
  • Apply sensitivity labels for data protection
    • Foundations of sensitivity label integration in Microsoft 365
    • Manage sensitivity labels in Office apps
    • Apply sensitivity labels with Copilot for Microsoft 365 for secure collaboration
    • Protect meetings with sensitivity labels
    • Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
    • Knowledge check
    • Summary and resources
  • Prevent data loss in Microsoft Purview
    • Data loss prevention overview
    • Plan and design DLP policies
    • Understand DLP policy deployment and simulation mode
    • Create and manage DLP policies
    • Integrate Adaptive Protection with DLP
    • Use DLP analytics (preview) to identify data risks
    • Understand DLP alerts and activity tracking
    • Knowledge check
    • Summary and resources
  • Implement endpoint data loss prevention (DLP) with Microsoft Purview
    • Endpoint data loss prevention (DLP) overview
    • Understand the endpoint DLP implementation workflow
    • Onboard devices for endpoint DLP
    • Configure settings for endpoint DLP
    • Create and manage endpoint DLP policies
    • Deploy the Microsoft Purview browser extension
    • Configure just-in-time (JIT) protection
    • Knowledge check
    • Summary and resources
  • Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
    • Configure data loss prevention policies for Power Platform
    • Integrate data loss prevention in Microsoft Defender for Cloud Apps
    • Configure policies in Microsoft Defender for Cloud Apps
    • Manage data loss prevention violations in Microsoft Defender for Cloud Apps
    • Knowledge check
    • Summary and resources
  • Manage data loss prevention policies and reports in Microsoft 365
    • Configure data loss prevention for policy precedence
    • Implement data loss prevention policies in test mode
    • Explain data loss prevention reporting capabilities
    • Manage permissions for data loss prevention reports
    • Manage and respond to data loss prevention policy violations
    • Knowledge check
    • Summary and resources
  • Manage the data lifecycle in Microsoft Purview
    • Data Lifecycle Management overview
    • Configure retention policies
    • Configure retention labels
    • Configure manual retention label policies
    • Configure auto-apply retention label policies
    • Import data for Data Lifecycle Management
    • Manage, monitor, and remediate Data Lifecycle Management
    • Summary and knowledge check
  • Manage data retention and deletion in Microsoft 365 workloads
    • Explain retention in SharePoint Online and OneDrive
    • Explain retention in Microsoft Teams
    • Explain retention in Copilot for Microsoft 365
    • Explain retention in Viva Engage
    • Explain retention in Exchange Online
    • Apply mailbox holds in Microsoft Exchange
    • Recover content in Microsoft Exchange
    • Recover content in Microsoft 365 workloads
    • Knowledge check
    • Summary and resources
  • Manage records in Microsoft Purview
    • Records management overview
    • Import a file plan
    • Configure retention labels
    • Configure event driven retention
    • Manage, monitor, and remediate records
    • Summary and knowledge check
  • Explore compliance in Microsoft 365
    • Plan for security and compliance in Microsoft 365
    • Plan your beginning compliance tasks in Microsoft Purview
    • Manage your compliance requirements with Compliance Manager
    • Examine the Compliance Manager dashboard
    • Analyze the Microsoft Compliance score
    • Knowledge check
  • Search for content in the Microsoft Purview compliance portal
    • Explore Microsoft Purview eDiscovery solutions
    • Create a content search
    • View the search results and statistics
    • Export the search results and search report
    • Configure search permissions filtering
    • Search for and delete email messages
    • Knowledge check
  • Manage Microsoft Purview eDiscovery (Standard)
    • Explore Microsoft Purview eDiscovery solutions
    • Implement Microsoft Purview eDiscovery (Standard)
    • Create eDiscovery holds
    • Search for content in a case
    • Export content from a case
    • Close, reopen, and delete a case
    • Knowledge check
  • Manage Microsoft Purview eDiscovery (Premium)
    • Explore Microsoft Purview eDiscovery (Premium)
    • Implement Microsoft Purview eDiscovery (Premium)
    • Create and manage an eDiscovery (Premium) case
    • Manage custodians and non-custodial data sources
    • Collect content for a case
    • Review and manage case content
    • Analyze case content
    • Knowledge check
  • Search and investigate with Microsoft Purview Audit
    • Microsoft Purview Audit overview
    • Configure and manage Microsoft Purview Audit
    • Conduct searches with Audit (Standard)
    • Audit Microsoft Copilot for Microsoft 365 interactions
    • Investigate activities with Audit (Premium)
    • Export audit log data
    • Configure audit retention with Audit (Premium)
    • Knowledge check
  • Prepare Microsoft Purview Communication Compliance
    • Introduction to communication compliance
    • Plan for communication compliance
    • Identify and resolve communication compliance workflow
    • Introduction to communication compliance policies
    • Communication compliance with Copilot for Microsoft 365
    • Knowledge check
    • Case study--Configure an offensive language policy
    • Investigate and remediate communication compliance alerts
    • Summary and knowledge check
  • Manage insider risk in Microsoft Purview
    • Insider risk management overview
    • Introduction to managing insider risk policies
    • Create and manage insider risk policies
    • Knowledge check
    • Investigate insider risk alerts
    • Take action on insider risk alerts through cases
    • Manage insider risk management forensic evidence
    • Create insider risk management notice templates
    • Summary and knowledge check
  • Implement Adaptive Protection in Insider Risk Management
    • Adaptive Protection Overview
    • Understand and configure risk levels in Adaptive Protection
    • Configure Adaptive Protection
    • Manage Adaptive Protection
    • Summary and knowledge check
  • Implement Microsoft Purview Information Barriers
    • Explore Microsoft Purview Information Barriers
    • Configure information barriers in Microsoft Purview
    • Examine information barriers in Microsoft Teams
    • Examine information barriers in OneDrive
    • Examine information barriers in SharePoint
    • Knowledge check
  • Manage regulatory and privacy requirements with Microsoft Priva
    • Create and manage risk management policies
    • Investigate and remediate risk management alerts
    • Create rights requests
    • Manage data estimate and retrieval for rights requests
    • Review data from rights requests
    • Get reports from rights requests
    • Knowledge check
  • Implement privileged access management
    • Understand privileged access management
    • Configure privileged access management
    • Manage privileged access management
    • Case study - Implement privileged access management
    • Knowledge check
  • Manage Customer Lockbox
    • Understand Customer Lockbox
    • Configure Customer Lockbox
    • Manage Customer Lockbox requests
    • Knowledge check
    • Summary and resources
|
View Full Schedule