首頁 > 工業(yè)技術(shù) >
自動(dòng)化技術(shù)
> Microsoft 365 Mobility and Security:Exam Guide MS-101最新章節(jié)目錄
舉報(bào)

會(huì)員
Microsoft 365 Mobility and Security:Exam Guide MS-101
ExamMS-101:Microsoft365MobilityandSecurityisapartoftheMicrosoft365Certified:EnterpriseAdministratorExpertcertificationpathdesignedtohelpusersvalidatetheirskillsinevaluating,planning,migrating,deploying,andmanagingMicrosoft365services.Thisbookwillhelpyouimplementmoderndeviceservices,applyMicrosoft365securityandthreatmanagement,andmanageMicrosoft365governanceandcompliance.Writteninasuccinctway,you’llexplorechapter-wiseself-assessmentquestions,examtips,andmockexamswithanswers.You’llstartbyimplementingmobiledevicemanagement(MDM)andhandlingdevicecompliance.You’lldelveintothreatdetectionandmanagement,learninghowtomanagesecurityreportsandconfigureMicrosoft365alerts.Later,you’lldiscoverdatalossprevention(DLP)toolstoprotectdataaswellastoolsforconfiguringauditlogsandpolicies.ThebookwillalsoguideyouthroughusingAzureInformationProtection(AIP)fordeployingclients,applyingpolicies,andconfiguringservicesanduserstoenhancedatasecurity.Finally,you’llcoverbestpracticesforconfiguringsettingsacrossyourtenanttoensurecomplianceandsecurity.Bytheendofthisbook,you’llhavelearnedtoworkwithMicrosoft365servicesandcoveredtheconceptsandtechniquesyouneedtoknowtopasstheMS-101exam.
目錄(226章)
倒序
- 封面
- Title Page
- Copyright and Credits
- Microsoft 365 Mobility and Security – Exam Guide MS-101
- Dedication
- About Packt
- Why subscribe?
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- Book structure
- The exam
- Certification
- How to get the most out of this book
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Section 1: Modern Device Services
- Implementing Mobile Device Management (MDM)
- Planning for MDM
- Device types and enrollment
- Configuring MDM integration with Azure AD
- Registered versus joined devices
- Setting up automatic enrollment
- Setting an MDM authority
- Setting device enrollment limits for users
- Device type restrictions
- Device limit restrictions
- Summary
- Questions
- Further reading
- Managing Device Compliance
- Planning for device compliance
- Configuring device compliance policies
- Policy options
- Creating a compliance policy
- Designing creating and managing conditional access policies
- Designing conditional access policies
- Assignments
- Users and groups
- Cloud apps or actions
- Conditions
- Access controls
- Grant
- Session
- Creating conditional access policies
- Managing conditional access policies
- Summary
- Questions
- Further reading
- Planning for Devices and Apps
- Creating and configuring Microsoft Store for Business
- Creating your private store
- Setting your MDM solution in Microsoft Store
- Configuring synchronization in Intune and synchronizing apps
- Planning app deployment
- Using a management tool
- Making apps available via your private store
- Assigning apps directly to employees
- Planning device co-management
- Planning device monitoring
- Planning for device profiles
- Assigning profiles
- Monitoring profiles
- Policy conflicts
- Planning for MAM
- Planning mobile device security
- Summary
- Questions
- Further reading
- Planning Windows 10 Deployment
- Planning for WaaS
- Building and deploying
- Servicing
- Servicing channels
- Servicing tools
- Planning for Windows 10 Enterprise deployment
- Windows Autopilot
- In-place upgrades
- Analyzing Upgrade Readiness for Windows 10
- Additional Windows 10 Enterprise security features
- Summary
- Questions
- Further reading
- Section 2: Microsoft 365 Security Threat Management
- Implementing Cloud App Security (CAS)
- Setting up CAS
- Integrating AIP with CAS
- Configuring CAS policies
- Policies
- Templates
- Configuring connected apps
- Designing a CAS solution
- Managing CAS alerts
- Uploading CAS traffic logs
- Manual uploads
- Automatic uploads
- Summary
- Questions
- Further reading
- Implementing Threat Management
- Planning a threat management solution
- Designing and configuring Azure ATP
- Setting up a sensor
- Designing and configuring Microsoft 365 ATP policies
- ATP Safe Attachments
- ATP Safe Links
- ATP for SharePoint OneDrive and Microsoft Teams
- ATP anti-phishing protection
- Monitoring ATA incidents
- Summary
- Questions
- Further reading
- Implementing Windows Defender ATP
- Planning our Windows Defender ATP solution
- Configuring our preferences
- Secure score dashboard security controls
- Microsoft Threat Experts capabilities
- Implementing Windows Defender ATP policies
- Enabling and configuring the security features of Windows 10 Enterprise
- Attack surface reduction
- Install application guard
- Enable application control
- Exploit protection
- Network protection
- Controlled folder access
- Network firewall
- Next-generation protection
- Summary
- Questions
- Further reading
- Managing Security Reports and Alerts
- Managing the Service Assurance Dashboard
- Accessing the Service Assurance Dashboard
- Compliance Manager
- Granting access to others
- Microsoft Secure Score and Azure AD Identity Secure Score
- Tracing and reporting on Azure AD Identity Protection
- Investigating risk events and vulnerabilities
- Settings and alerts
- Microsoft 365 security alerts
- Azure AD Identity Protection dashboard and alerts
- Automatically closing or resolving risk events
- Manually closing risk events
- Summary
- Questions
- Further reading
- Section 3: Microsoft 365 Governance Compliance
- Configuring Data Loss Prevention (DLP)
- Configuring DLP policies
- Designing data retention policies in Microsoft 365
- Labels
- Label policies
- Monitoring and managing DLP policy matches
- Managing DLP exceptions
- Summary
- Questions
- Further reading
- Implementing Azure Information Protection (AIP)
- Planning an AIP solution
- Planning for classification labeling
- Deploying AIP clients
- Implementing an AIP tenant key
- Planning for WIP implementation
- Configuring IRM for workloads
- Planning for the deployment of an on-premises Rights Management connector
- Implementing AIP policies
- Configuring a super user
- Summary
- Questions
- Further reading
- Managing Data Governance
- Planning and configuring information retention
- Retention period and deletion
- Locations
- Creating a retention policy
- Planning for a Microsoft 365 backup
- Planning for restoring deleted content
- Exchange
- SharePoint
- OneDrive
- Summary
- Questions
- Further reading
- Managing Auditing
- Configuring audit log retention
- Enabling auditing of SharePoint site activities
- Enabling auditing of Exchange mailbox activities
- Configuring the audit policy
- Monitoring unified audit logs
- Azure AD audit and sign-in logs
- Summary
- Questions
- Further reading
- Managing eDiscovery
- Searching content using the Security & Compliance Center
- Planning for in-place and legal holds
- Configuring eDiscovery
- Summary
- Questions
- Further reading
- Section 4: Mock Exams
- Mock Exam 1
- Mock Exam 2
- Assessments
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Chapter 13
- Mock Exam 1
- Mock Exam 2
- Leave a review - let other readers know what you think 更新時(shí)間:2021-06-24 12:07:06
推薦閱讀
- Mastering Mesos
- 大數(shù)據(jù)戰(zhàn)爭(zhēng):人工智能時(shí)代不能不說的事
- 平面設(shè)計(jì)初步
- 計(jì)算機(jī)網(wǎng)絡(luò)應(yīng)用基礎(chǔ)
- 電腦上網(wǎng)直通車
- Zabbix Network Monitoring(Second Edition)
- 樂高創(chuàng)意機(jī)器人教程(中級(jí) 下冊(cè) 10~16歲) (青少年iCAN+創(chuàng)新創(chuàng)意實(shí)踐指導(dǎo)叢書)
- 機(jī)器人創(chuàng)新實(shí)訓(xùn)教程
- 西門子S7-200 SMART PLC實(shí)例指導(dǎo)學(xué)與用
- 21天學(xué)通Java Web開發(fā)
- 精通數(shù)據(jù)科學(xué)算法
- Learning Azure Cosmos DB
- 基于Xilinx ISE的FPAG/CPLD設(shè)計(jì)與應(yīng)用
- 云計(jì)算和大數(shù)據(jù)的應(yīng)用
- 在實(shí)戰(zhàn)中成長(zhǎng):C++開發(fā)之路
- 三菱FX/Q系列PLC工程實(shí)例詳解
- Raspberry Pi 3 Projects for Java Programmers
- SolarWinds Server & Application Monitor:Deployment and Administration
- 計(jì)算機(jī)仿真技術(shù)
- ARM? Cortex? M4 Cookbook
- 瘋狂Java實(shí)戰(zhàn)演義
- Hands-On Edge Analytics with Azure IoT
- 深度學(xué)習(xí)
- 微機(jī)原理與接口技術(shù)學(xué)習(xí)指導(dǎo)
- R Deep Learning Projects
- 數(shù)據(jù)庫(kù)應(yīng)用技術(shù):Visual FoxPro 6.0
- 案例解說Visual C++典型控制應(yīng)用
- 機(jī)器學(xué)習(xí)從入門到入職:用sklearn與keras搭建人工智能模型
- 高級(jí)PLC硬件和編程:基于Allen-Bradley和Siemens平臺(tái)的軟、硬件基礎(chǔ)和高級(jí)技術(shù)
- Learning Quantitative Finance with R