舉報

會員
Microsoft 365 Mobility and Security:Exam Guide MS-101
ExamMS-101:Microsoft365MobilityandSecurityisapartoftheMicrosoft365Certified:EnterpriseAdministratorExpertcertificationpathdesignedtohelpusersvalidatetheirskillsinevaluating,planning,migrating,deploying,andmanagingMicrosoft365services.Thisbookwillhelpyouimplementmoderndeviceservices,applyMicrosoft365securityandthreatmanagement,andmanageMicrosoft365governanceandcompliance.Writteninasuccinctway,you’llexplorechapter-wiseself-assessmentquestions,examtips,andmockexamswithanswers.You’llstartbyimplementingmobiledevicemanagement(MDM)andhandlingdevicecompliance.You’lldelveintothreatdetectionandmanagement,learninghowtomanagesecurityreportsandconfigureMicrosoft365alerts.Later,you’lldiscoverdatalossprevention(DLP)toolstoprotectdataaswellastoolsforconfiguringauditlogsandpolicies.ThebookwillalsoguideyouthroughusingAzureInformationProtection(AIP)fordeployingclients,applyingpolicies,andconfiguringservicesanduserstoenhancedatasecurity.Finally,you’llcoverbestpracticesforconfiguringsettingsacrossyourtenanttoensurecomplianceandsecurity.Bytheendofthisbook,you’llhavelearnedtoworkwithMicrosoft365servicesandcoveredtheconceptsandtechniquesyouneedtoknowtopasstheMS-101exam.
目錄(226章)
倒序
- 封面
- Title Page
- Copyright and Credits
- Microsoft 365 Mobility and Security – Exam Guide MS-101
- Dedication
- About Packt
- Why subscribe?
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- Book structure
- The exam
- Certification
- How to get the most out of this book
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Section 1: Modern Device Services
- Implementing Mobile Device Management (MDM)
- Planning for MDM
- Device types and enrollment
- Configuring MDM integration with Azure AD
- Registered versus joined devices
- Setting up automatic enrollment
- Setting an MDM authority
- Setting device enrollment limits for users
- Device type restrictions
- Device limit restrictions
- Summary
- Questions
- Further reading
- Managing Device Compliance
- Planning for device compliance
- Configuring device compliance policies
- Policy options
- Creating a compliance policy
- Designing creating and managing conditional access policies
- Designing conditional access policies
- Assignments
- Users and groups
- Cloud apps or actions
- Conditions
- Access controls
- Grant
- Session
- Creating conditional access policies
- Managing conditional access policies
- Summary
- Questions
- Further reading
- Planning for Devices and Apps
- Creating and configuring Microsoft Store for Business
- Creating your private store
- Setting your MDM solution in Microsoft Store
- Configuring synchronization in Intune and synchronizing apps
- Planning app deployment
- Using a management tool
- Making apps available via your private store
- Assigning apps directly to employees
- Planning device co-management
- Planning device monitoring
- Planning for device profiles
- Assigning profiles
- Monitoring profiles
- Policy conflicts
- Planning for MAM
- Planning mobile device security
- Summary
- Questions
- Further reading
- Planning Windows 10 Deployment
- Planning for WaaS
- Building and deploying
- Servicing
- Servicing channels
- Servicing tools
- Planning for Windows 10 Enterprise deployment
- Windows Autopilot
- In-place upgrades
- Analyzing Upgrade Readiness for Windows 10
- Additional Windows 10 Enterprise security features
- Summary
- Questions
- Further reading
- Section 2: Microsoft 365 Security Threat Management
- Implementing Cloud App Security (CAS)
- Setting up CAS
- Integrating AIP with CAS
- Configuring CAS policies
- Policies
- Templates
- Configuring connected apps
- Designing a CAS solution
- Managing CAS alerts
- Uploading CAS traffic logs
- Manual uploads
- Automatic uploads
- Summary
- Questions
- Further reading
- Implementing Threat Management
- Planning a threat management solution
- Designing and configuring Azure ATP
- Setting up a sensor
- Designing and configuring Microsoft 365 ATP policies
- ATP Safe Attachments
- ATP Safe Links
- ATP for SharePoint OneDrive and Microsoft Teams
- ATP anti-phishing protection
- Monitoring ATA incidents
- Summary
- Questions
- Further reading
- Implementing Windows Defender ATP
- Planning our Windows Defender ATP solution
- Configuring our preferences
- Secure score dashboard security controls
- Microsoft Threat Experts capabilities
- Implementing Windows Defender ATP policies
- Enabling and configuring the security features of Windows 10 Enterprise
- Attack surface reduction
- Install application guard
- Enable application control
- Exploit protection
- Network protection
- Controlled folder access
- Network firewall
- Next-generation protection
- Summary
- Questions
- Further reading
- Managing Security Reports and Alerts
- Managing the Service Assurance Dashboard
- Accessing the Service Assurance Dashboard
- Compliance Manager
- Granting access to others
- Microsoft Secure Score and Azure AD Identity Secure Score
- Tracing and reporting on Azure AD Identity Protection
- Investigating risk events and vulnerabilities
- Settings and alerts
- Microsoft 365 security alerts
- Azure AD Identity Protection dashboard and alerts
- Automatically closing or resolving risk events
- Manually closing risk events
- Summary
- Questions
- Further reading
- Section 3: Microsoft 365 Governance Compliance
- Configuring Data Loss Prevention (DLP)
- Configuring DLP policies
- Designing data retention policies in Microsoft 365
- Labels
- Label policies
- Monitoring and managing DLP policy matches
- Managing DLP exceptions
- Summary
- Questions
- Further reading
- Implementing Azure Information Protection (AIP)
- Planning an AIP solution
- Planning for classification labeling
- Deploying AIP clients
- Implementing an AIP tenant key
- Planning for WIP implementation
- Configuring IRM for workloads
- Planning for the deployment of an on-premises Rights Management connector
- Implementing AIP policies
- Configuring a super user
- Summary
- Questions
- Further reading
- Managing Data Governance
- Planning and configuring information retention
- Retention period and deletion
- Locations
- Creating a retention policy
- Planning for a Microsoft 365 backup
- Planning for restoring deleted content
- Exchange
- SharePoint
- OneDrive
- Summary
- Questions
- Further reading
- Managing Auditing
- Configuring audit log retention
- Enabling auditing of SharePoint site activities
- Enabling auditing of Exchange mailbox activities
- Configuring the audit policy
- Monitoring unified audit logs
- Azure AD audit and sign-in logs
- Summary
- Questions
- Further reading
- Managing eDiscovery
- Searching content using the Security & Compliance Center
- Planning for in-place and legal holds
- Configuring eDiscovery
- Summary
- Questions
- Further reading
- Section 4: Mock Exams
- Mock Exam 1
- Mock Exam 2
- Assessments
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Chapter 13
- Mock Exam 1
- Mock Exam 2
- Leave a review - let other readers know what you think 更新時間:2021-06-24 12:07:06
推薦閱讀
- 輕松學C語言
- Hands-On Artificial Intelligence on Amazon Web Services
- Ansible Quick Start Guide
- 數據產品經理:解決方案與案例分析
- Windows 7寶典
- 網絡綜合布線設計與施工技術
- 軟件構件技術
- 經典Java EE企業應用實戰
- 算法設計與分析
- 西門子S7-1200/1500 PLC從入門到精通
- Getting Started with Tableau 2019.2
- 當產品經理遇到人工智能
- 電氣自動化工程師自學寶典(基礎篇)
- 數據結構與算法(C++語言版)
- Learn SOLIDWORKS 2020
- Data Science with Python
- 深度學習500問:AI工程師面試寶典
- R Programming By Example
- 筆記本電腦維修實用教程
- 數碼照片處理輕松入門
- 人,機,生活
- Data Visualization with d3.js
- 為什么
- 大數據可視化技術
- Hands-On Microservices with Kubernetes
- Teradata Cookbook
- Extending SaltStack
- Cisco ACI Cookbook
- iOS軟件開發兵法
- Microsoft System Center Configuration Manager Advanced Deployment