Maandag - Vrijdag

8:15 - 17:00

Lavendelheide 12, 9202 PD, Drachten

info@startel.nl

050-5028888

  • Homepage
  • >
  • Microsoft 365 Mobility and Security (MS-101)
Microsoft 365 Mobility and Security (MS-101)

Microsoft 365 Mobility and Security (MS-101)

Met mobiele apparaten is cybersecurity nóg belangrijker geworden. Hier leer je er alles over. hacken, alle soorten bedreigingen en hoe Microsoft 365 intelligent met bedreigingen omgaat. In 10 uitgebreide modules leer je, in vijf dagen, kennismaken met de ideale en veiligste manier om Microsoft 365 op mobiele apparaten in te zetten.

Microsoft 365 Mobility and Security (MS-101)

Vul hier je gegevens in en je krijgt van ons een STAP-aanmeldingsformulier voor de aangevraagde training. Je ontvangt je aanmeldingsformulier per mail retour + uitleg hoe je het STAP-budget kan aanvragen. Het kan voorkomen dat deze in je spam terecht komt. 

Na goedkeuring van het STAP-budget nemen wij contact met jou op om de klassikale/virtuele trainingsdag(en) te plannen. Indien er na het aanvragen van het STAP-budget nog een bedrag over blijft, dan factureren wij dit aan je persoonlijk of aan je werkgever.

Mocht iets onduidelijk zijn, stuur dan een e-mail naar Pieter@startel.nl of neem telefonisch contact op via het nummer 06-30817818 of 050-5028888.

Offerte formulier

Wij proberen je aanvraag binnen 2 werkdagen te verwerken. Telefoonnummer is niet direct nodig, maar handig als we nog vragen hebben.

De Microsoft 365 Identity and Services (MS-100)- en de Microsoft 365 Mobility and Security (MS-101)-training worden binnenkort vervangen door de Microsoft 365 Administrator Essentials (MS-102)-training. Het Microsoft 365 Certified: Enterprise Administrator Expert-certificaat wordt vervangen door het Microsoft 365 Certified: Administrator Expert-certificaat.

Deze training behandelt drie kernelementen met betrekking tot het beheer van Microsoft 365 Enterprise: Microsoft 365 security management, Microsoft 365 compliance management, en Microsoft 365 device management. In Microsoft 365 security management onderzoek je alle mogelijke aanvalsvormen en beveiligingsproblemen die bedrijven tegenwoordig tegenkomen, en leer je hoe de beveiligingsoplossingen van Microsoft 365 deze bedreigingen aanpakken. Je maakt kennis met Microsoft Secure Score, en daarnaast met Azure Active Directory Identity Protection. Je leert vervolgens hoe je de Microsoft 365 security services beheert, waaronder Exchange Online Protection, Advanced Threat Protection, Safe Attachments, en Safe Links. Uiteindelijk maak je kennis met diverse rapportages die de beveiligingsstatus bewaken. Daarna ga je verder van security services naar threat intelligence, met name het gebruik van het Security Dashboard en Advanced Threat Analytics om potentiële beveiligingsinbreuken voor te blijven.

Nu de Microsoft 365-beveiligingscomponenten goed zijn ingericht, ga je de sleutelcomponenten van Microsoft 365 compliance (voldoen aan wet- en regelgeving) management onderzoeken. Dit begint met een overzicht van alle belangrijke aspecten van gegevensbeheer, waaronder het archiveren en bewaren van gegevens, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), versleuteling van Office 365-gegevens, en voorkomen van gegevensverlies (DLP, Data Loss Prevention). Vervolgens ga je nog dieper in op archivering en retentie, met speciale aandacht voor in-place gegevensbeheer in SharePoint, archivering en retentie in Exchange, en retentiebeleid in het Security en Compliance Center.

Nu je de sleutelconcepten van omgaan met gegevens begrijpt, ga je onderzoeken hoe je dit kan toepassen, inclusief het bouwen van ethische muren (voorkomen van belangenverstrengeling) in Exchange Online, het maken van DLP-beleid met behulp van ingebouwde sjablonen, het maken van specifiek DLP-beleid, het maken van DLP-beleid om documenten te beschermen, en het maken van beleidstips (waarschuwingen in verband met conflicten met DLP-beleid). Je gaat je vervolgens richten op het beheren van gegevensbeheer in Microsoft 365, inclusief het beheren van retentie in e-mail, het oplossen van problemen met bewaarbeleid en fouten met betrekking toit beleidstips, evenals het oplossen van problemen met gevoelige gegevens. Vervolgens leer je hoe jij Azure Information Protection en Windows Information Protection toepast. Je sluit dit deel af met het leren hoe je “zoekt en onderzoekt”, waaronder het zoeken naar inhoud in het Security and Compliance Center, het controleren van logboekonderzoeken en het beheren van geavanceerde eDiscovery.

Deze training eindigt met een diepgaand onderzoek van Microsoft 365-apparaatbeheer. Je begint met het plannen van diverse aspecten van apparaatbeheer, waaronder het voorbereiden van Windows 10-apparaten voor gezamenlijk beheer. Je leert hoe je kan overschakelen van Configuratie Manager naar Intune en je maakt kennis met de Microsoft Store voor Zakelijk en Mobiel-applicatiebeheer. Hierna ga je over op de planning van de toepassing van apparaatbeheer, met name de Windows 10-implementatiestrategie. Dit omvat het leren implementeren van Windows Autopilot, Windows Analytics, en Mobile Device Management (MDM). Wanneer je MDM onderzoekt, leer je daarbij hoe het toe te passen, hoe je apparaten bekend maakt bij MDM, en hoe je de toegevoegde apparaten beheert.

Wat leer je?

Wanneer je actief aan deze training deelneemt, leer je het volgende:

  • Microsoft 365 Security Metrics.
  • Microsoft 365 Security Services.
  • Microsoft 365 Threat Intelligence.
  • Data Governance in Microsoft 365.
  • Archiveren en retentie in Office 365.
  • Data Governance in Microsoft 365 Intelligence.
  • Zoeken en onderzoeken.
  • Apparaatbeheer.
  • Windows 10-gebruiksstrategieën.
  • Beheren van mobiele apparaten.
Voor wie is de training?

Deze training is specifiek ontworpen voor IT-professionals die de rol van Microsoft 365 Enterprise-administrator op zich willen nemen, en die een van de Microsoft 365-rolgebaseerde administratortrainingen hebben doorlopen.

Welke voorkennis heb je nodig?
  • Een afgeronde rolgebaseerde beheerderscursus zoals Messaging, Teamwork, Security en Compliance, of Collaboration.

  • Goed bekend met DNS en basis functionele ervaring met Microsoft 365-diensten.

  • Een goede algemene kennis van ICT.

Trainingsvorm

Heb je een vraag?

Neem dan contact op met onze klantenservice voor studieadvies of een training op maat.

Microsoft 365 Mobility and Security (MS-101)

Wij proberen je aanvraag zo snel mogelijk te beantwoorden. Meestal zou dat op de dag zelf gebeuren. Om je sneller van dienst te zijn vragen we je telefoonnummer.

Trainingsvorm

Trainingsdata

Heeft je voorkeursdatum geen doorgangsgarantie, neem dan voor de zekerheid contact met ons op. Vaak hebben we een oplossing voor je waarmee je doel gehaald kan worden.

Microsoft 365 Mobility and Security (MS-101)

Wij proberen je aanvraag zo snel mogelijk te beantwoorden. Meestal zou dat op de dag zelf gebeuren. Om je sneller van dienst te zijn vragen we je telefoonnummer.

Startdatum Trainingsvorm Locatie DuurPrijs

Waarom Startel?

Persoonlijke
aanpak
Ervaren
trainers
Aanbod
op maat
Klassikaal en e-learning
mogelijkheden

Het programma

Module 1: Explore security metrics in Microsoft 365

Lessons:

  • Examine threat vectors and data breaches.
  • Explore the Zero Trust security model.
  • Explore security solutions in Microsoft 365.
  • Examine Microsoft Secure Score.
  • Examine Privileged Identity Management.
  • Examine Azure Identity Protection.

Lab: Tenant Setup and Privileged Identity Management

  • Initialize your Microsoft 365 Tenant.
  • PIM Resource Workflows.

After completing this module, students will be able to:

  • Describe several techniques hackers use to compromise user accounts through email.
  • Describe techniques hackers use to gain control over resources.
  • Describe techniques hackers use to compromise data.
  • Describe the Zero Trust approach to security in Microsoft 365.
  • Describe the components of Zero Trust security.
  • Describe and five steps to implementing a Zero Trust model in your organization.
  • Explain Zero Trust networking.
  • List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365.
  • Describe how Microsoft 365 Threat Intelligence can be benefit your organization.
  • Monitor your organization through auditing and alerts.
  • Describe how ASM enhances visibility and control over your tenant through three core areas.
  • Describe the benefits of Secure Score and what kind of services can be analyzed.
  • Describe how to collect data using the Secure Score API.
  • Know where to identify actions that will increase your security by mitigating risks.
  • Explain how to determine the threats each action will mitigate and the impact it has on use.
  • Explain Privileged Identity Management (PIM) in Azure administration.
  • Configure PIM for use in your organization.
  • Audit PIM roles.
  • Explain Microsoft Identity Manager.
  • Explain Privileged Access Management in Microsoft 365.
  • Describe Azure Identity Protection and what kind of identities can be protected.
  • Understand how to enable Azure Identity Protection.
  • Know how to identify vulnerabilities and risk events.
  • Plan your investigation in protecting cloud-based identities.
  • Plan how to protect your Azure Active Directory environment from security breaches.

Module 2: Manage your Microsoft 365 security services

Lessons:

  • Examine Exchange Online Protection.
  • Examine Microsoft Defender for Office 365.
  • Manage Safe Attachments.
  • Manage Safe Links.
  • Explore reporting in the Microsoft 365 security services.

Lab: Manage Microsoft 365 Security Services

  • Implement a Safe Attachments policy.
  • Implement a Safe Links policy.

After completing this module, students will be able to:

  • Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection.
  • List several mechanisms used to filter spam and malware.
  • Describe additional solutions to protect against phishing and spoofing.
  • Describe the benefits of the Spoof Intelligence feature.
  • Describe how Safe Attachments is used to block zero-day malware in email attachments and documents.
  • Describe how Safe Links protect users from malicious URLs embedded in email and documents.
  • Create and modify a Safe Attachments policy in the Security & Compliance Center.
  • Create a Safe Attachments policy by using Windows PowerShell.
  • Configure a Safe Attachments policy to take certain actions.
  • Understand how a transport rule can be used to disable the Safe Attachments functionality.
  • Describe the end-user experience when an email attachment is scanned and found to be malicious.
  • Create and modify a Safe Links policy in the Security & Compliance Center.
  • Create a Safe Links policy by using Windows PowerShell.
  • Understand how a transport rule can be used to disable the Safe Links functionality.
  • Describe the end-user experience when Safe Links identifies a link to a malicious website or file.
  • Describe how the Microsoft 365 security reports show how your organization is being protected.
  • Understand where to access reports generated by EOP and Microsoft Defender for Office 365.
  • Understand how to access detailed information from the generated reports generated.

Module 3: Implement threat intelligence in Microsoft 365

Lessons:

  • Explore threat intelligence in Microsoft 365.
  • Explore the Security Dashboard.
  • Implement Microsoft Defender for Identity.
  • Implement Microsoft Cloud Application Security.

Lab: Implement Threat Intelligence

  • Conduct a Spear Phishing attack using the Attack Simulator.
  • Conduct Password attacks using the Attack Simulator.
  • Prepare for Alert Policies.
  • Implement a Mailbox Permission Alert.
  • Implement a SharePoint Permission Alert.
  • Test the Default eDiscovery Alert.

After completing this module, students will be able to:

  • Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph.
  • Describe how the threat dashboard can benefit C-level security officers.
  • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant.
  • Describe how the Security Dashboard displays top risks, global trends, and protection quality.
  • Describe what Microsoft Defender for Identity is and what requirements are needed to deploy it.
  • Configure Microsoft Defender for Identity.
  • Manage the Microsoft Defender for Identity services.
  • Describe Cloud App Security.
  • Explain how to deploy Cloud App Security.
  • Control your Cloud Apps with Policies.
  • Troubleshoot Cloud App Security.

Module 4: Introduction to Data Governance in Microsoft 365

Lessons:

  • Explore archiving in Microsoft 365.
  • Explore retention in Microsoft 365.
  • Explore Information Rights Management.
  • Explore Office 365 Message Encryption.
  • Explore In-place Records Management in SharePoint.
  • Explore Data Loss Prevention in Microsoft 365.

Lab: Implement Data Governance

  • Configure Microsoft 365 Message Encryption.
  • Validate Information Rights Management.
  • Initialize Compliance.
  • Configure Retention Tags and Policies.

After completing this module, students will be able to:

  • Understand Data Governance in Microsoft 365.
  • Describe the difference between In-Place Archive and Records Management.
  • Explain how data is archived in Exchange.
  • Recognize the benefits of In Place Records Management in SharePoint.
  • Understand how Messaging Records Management works in Exchange.
  • List the types of retention tags that can be applied to mailboxes.
  • Know the different Microsoft 365 Encryption Options.
  • Understand how Information Rights Management (IRM) can be used in Exchange.
  • Configure IRM protection for Exchange mails.
  • Explain how IRM can be used in SharePoint.
  • Apply IRM protection to SharePoint documents.
  • Tell the differences between IRM protection and AIP classification.
  • Understand how message encryption works.
  • Perform encryption on a message.
  • Accomplish decryption of a message.
  • Understand the co-operation of signing and encryption simultaneously.
  • Explain what triple-wrapped messages are.
  • Describe when you can use Office 365 Message Encryption.
  • Explain how Office 365 Message Encryption works.
  • Describe Data Loss Prevention (DLP).
  • Understand what sensitive information and search patterns are that DLP is using.
  • Know what a DLP policy is and what it contains.
  • Recognize how actions and conditions work together for DLP.
  • Express how actions contain functions to send emails on matches.
  • Show policy tips to the users if a DLP rule applies.
  • Use policy templates to implement DLP policies for commonly used information.
  • Explain document finger.
  • Understand how to use DLP to protect documents in Windows Server FCI.

Module 5: Implement data governance in Microsoft 365

Lessons:

  • Evaluate your compliance readiness.
  • Implement compliance solutions.
  • Create information barriers in Microsoft 365.
  • Create a DLP policy from a built-in template.
  • Create a custom DLP policy.
  • Create a DLP policy to protect documents.
  • Implement policy tips for DLP policies.

Lab: Implement DLP Policies

  • Manage DLP Policies.
  • Test MRM and DLP Policies.

After completing this module, students will be able to:

  • Describe the Microsoft 365 Compliance Center and how to access it.
  • Describe the purpose and function of Compliance score.
  • Explain the components of of how an organization's Compliance score is determined.
  • Explain how assessments are used to formulate compliance scores.
  • Explain how Microsoft 365 helps address Global Data Protection Regulation.
  • Describe insider risk management functionality in Microsoft 365.
  • Configure insider risk management policies.
  • Configure insider risk management policies.
  • Explain the communication compliance capabilities in Microsoft 365.
  • Describe what an ethical wall in Exchange is and how it works.
  • Explain how to create information barriers in Microsoft 365.
  • Identify best practices for building and working with ethical walls.
  • Understand the different built-in templates for a DLP policies.
  • Determine how to choose the correct locations for a DLP policy.
  • Configure the correct rules for protecting content.
  • Enable and review the DLP policy correctly.
  • Describe how to modify existing rules of DLP policies.
  • Explain how to add and modify custom conditions and action to a DLP rule.
  • Describe how to change user notifications and policy tips.
  • Configure the user override option to a DLP rule.
  • Explain how incident reports are sent by a DLP rule violation.
  • Describe how to work with managed properties for DLP policies.
  • Explain how SharePoint Online creates crawled properties from documents.
  • Describe how to create a managed property from a crawled property in SharePoint Online.
  • Explain how to create a DLP policy with rules that apply to managed properties via PowerShell.
  • Describe the user experience when a user creates an email or site containing sensitive information.
  • Explain the behavior in Office apps when a user enters sensitive information.

Module 6: Manage data governance in Microsoft 365

Lessons:

  • Manage retention in email.
  • Troubleshoot data governance.
  • Explore sensitivity labels.
  • Implement sensitivity labels.
  • Implement Data Governance.

Lab: Implement Data Governance

  • Implement sensitivity labels.
  • Implement Windows Information Protection.

After completing this module, students will be able to:

  • Determine when and how to use retention tags in mailboxes.
  • Assign retention policy to an email folder.
  • Add optional retention policies to email messages and folders.
  • Remove a retention policy from an email message.
  • Explain how the retention age of elements is calculated.
  • Repair retention policies that do not run as expected.
  • Understand how to systematically troubleshoot when a retention policy appears to fail.
  • Perform policy tests in test mode with policy tips.
  • Describe how to monitor DLP policies through message tracking.
  • Manage data protection using sensitivity labels.
  • Describe the requirements to create a sensitivity label.
  • Develop a data classification framework for your sensitivity labels.
  • Create, publish, and remove sensitivity labels.
  • Describe WIP and what it is used for.
  • Plan a deployment of WIP policies.
  • Implement WIP policies with Intune and SCCM.
  • Implement WIP policies in Windows desktop apps.

Module 7: Manage content search and investigations in Microsoft 365

Lessons:

  • Search for content in the Microsoft 365 Compliance center.
  • Conduct audit log investigations.
  • Manage Advanced eDiscovery.

Lab: Manage Search and Investigations

  • Conduct a data search.
  • Investigate Your Microsoft 365 Data.

After completing this module, students will be able to:

  • Describe how to use content search.
  • Design your content search.
  • Configure search permission filtering.
  • Explain how to search for third-party data.
  • Describe when to use scripts for advanced searches.
  • Describe what the audit log is and the permissions required to search a Microsoft 365 audit.
  • Configure Audit Policies.
  • Enter criteria for searching the audit log.
  • View, sort, and filter search results.
  • Export search results to a CSV file.
  • Search the unified audit log by using Windows PowerShell.
  • Describe Advanced eDiscovery.
  • Configure permissions for users in Advanced eDiscovery.
  • Create Cases in Advanced eDiscovery.
  • Search and prepare data for Advanced eDiscovery.

Module 8: Prepare for device management in Microsoft 365

Lessons:

  • Explore Co-management of Windows 10 device.
  • Prepare your Windows 10 devices for Co-management.
  • Transition from Configuration Manager to Intune.
  • Examine the Microsoft Store for Business.
  • Plan for application management.

Lab: Implement the Microsoft Store for Business

  • Configure the Microsoft Store for Business.
  • Manage the Microsoft Store for Business.

After completing this module, students will be able to:

  • Describe the benefits of Co-management.
  • Plan your organization's Co-management Strategy.
  • Describe the main features of Configuration Manager.
  • Describe how Azure Active Directory enables Co-management.
  • Identify the prerequisites for using Co-management.
  • Configure Configuration Manager for Co-management.
  • Enroll Windows 10 Devices to Intune.
  • Modify your co-management settings.
  • Transfer workloads to Intune.
  • Monitor your Co-management solution.
  • Check compliance for Co-managed devices.
  • Describe the feature and benefits of the Microsoft Store for Business.
  • Configure the Microsoft Store for Business.
  • Manage settings for the Microsoft Store for Business.

Module 9: Plan your Windows 10 deployment strategy

Lessons:

  • Examine Windows 10 deployment scenarios.
  • Explore Windows Autopilot deployment models.
  • Plan your Windows 10 Subscription Activation strategy.
  • Resolve Windows 10 upgrade errors.
  • Analyze Windows 10 diagnostic data using Desktop Analytics.

After completing this module, students will be able to:

  • Plan for Windows as a Service.
  • Plan a Modern Deployment.
  • Plan a Dynamic Deployment.
  • Plan a Traditional Deployment.
  • Describe Windows Autopilot requirements.
  • Configure Autopilot.
  • Describe Autopilot Self-deployments, Pre-provisioned deployments, and User-driven deployments.
  • Deploy BitLocker Encryption for Autopiloted Devices.
  • Understand Windows 10 Enterprise E3 in CSP.
  • Configure VDA for Subscription Activation.
  • Deploy Windows 10 Enterprise licenses.
  • Describe common fixes for Windows 10 upgrade errors.
  • Use SetupDiag.
  • Troubleshooting upgrade errors.
  • Describe Windows error reporting.
  • Understand the upgrade error codes and resolution procedure.
  • Describe Desktop Analytics.
  • Describe Device Health.
  • Describe Update Compliance.
  • Determine Upgrade Readiness.

Module 10: Implement Mobile Device Management in Microsoft 365

Lessons:

  • Explore Mobile Device Management.
  • Deploy Mobile Device Management.
  • Enroll devices to Mobile Device Management.
  • Manage device compliance.

Lab: Manage devices with Intune

  • Enable device management.
  • Configure Azure AD for Intune.
  • Create Intune policies.
  • Enroll a Windows 10 device.
  • Manage and monitor a device in Intune.

After completing this module, students will be able to:

  • Manage devices with MDM.
  • Compare MDM for Microsoft 365 and Intune.
  • Understand policy settings for mobile devices.
  • Control Email and Document Access.
  • Activate Mobile Device Management Services.
  • Deploy Mobile Device Management.
  • Configure Domains for MDM.
  • Configure an APNs Certificate for iOS devices.
  • Manage Device Security Policies.
  • Define a Corporate Device Enrollment Policy.
  • Enroll devices to MDM.
  • Understand the Apple Device Enrollment Program.
  • Understand Enrollment Rules.
  • Configure a Device Enrollment Manager Role.
  • Describe Multi-factor Authentication considerations.
  • Plan for device compliance.
  • Configure conditional users and groups.
  • Create Conditional Access policies.
  • Monitor enrolled devices.

Hoe maken we het persoonlijk?

Bij Startel is persoonlijk ook écht persoonlijk. Om de best passende trainingen te geven starten we met het belangrijkste ingrediënt: jou.

  1. We starten altijd met een intake om jou te leren kennen.
  2. We passen de Training aan de hand van jouw ambitie en doelen aan.
  3. We kijken ook naar jouw persoonlijke situatie om de lesstof zo praktisch mogelijk te maken.

Contact formulier

Wil je informatie of wil je een maatwerk training. Neem dan Contact met  ons op.

Microsoft 365 Mobility and Security (MS-101)

Wij proberen je aanvraag zo snel mogelijk te beantwoorden. Meestal zou dat op de dag zelf gebeuren. Om je sneller van dienst te zijn vragen we je telefoonnummer.

categorie: 
  • Cloud
  • Microsoft 365
  • Security