舉報

會員
Microsoft 365 Mobility and Security:Exam Guide MS-101
ExamMS-101:Microsoft365MobilityandSecurityisapartoftheMicrosoft365Certified:EnterpriseAdministratorExpertcertificationpathdesignedtohelpusersvalidatetheirskillsinevaluating,planning,migrating,deploying,andmanagingMicrosoft365services.Thisbookwillhelpyouimplementmoderndeviceservices,applyMicrosoft365securityandthreatmanagement,andmanageMicrosoft365governanceandcompliance.Writteninasuccinctway,you’llexplorechapter-wiseself-assessmentquestions,examtips,andmockexamswithanswers.You’llstartbyimplementingmobiledevicemanagement(MDM)andhandlingdevicecompliance.You’lldelveintothreatdetectionandmanagement,learninghowtomanagesecurityreportsandconfigureMicrosoft365alerts.Later,you’lldiscoverdatalossprevention(DLP)toolstoprotectdataaswellastoolsforconfiguringauditlogsandpolicies.ThebookwillalsoguideyouthroughusingAzureInformationProtection(AIP)fordeployingclients,applyingpolicies,andconfiguringservicesanduserstoenhancedatasecurity.Finally,you’llcoverbestpracticesforconfiguringsettingsacrossyourtenanttoensurecomplianceandsecurity.Bytheendofthisbook,you’llhavelearnedtoworkwithMicrosoft365servicesandcoveredtheconceptsandtechniquesyouneedtoknowtopasstheMS-101exam.
目錄(226章)
倒序
- 封面
- Title Page
- Copyright and Credits
- Microsoft 365 Mobility and Security – Exam Guide MS-101
- Dedication
- About Packt
- Why subscribe?
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- Book structure
- The exam
- Certification
- How to get the most out of this book
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Section 1: Modern Device Services
- Implementing Mobile Device Management (MDM)
- Planning for MDM
- Device types and enrollment
- Configuring MDM integration with Azure AD
- Registered versus joined devices
- Setting up automatic enrollment
- Setting an MDM authority
- Setting device enrollment limits for users
- Device type restrictions
- Device limit restrictions
- Summary
- Questions
- Further reading
- Managing Device Compliance
- Planning for device compliance
- Configuring device compliance policies
- Policy options
- Creating a compliance policy
- Designing creating and managing conditional access policies
- Designing conditional access policies
- Assignments
- Users and groups
- Cloud apps or actions
- Conditions
- Access controls
- Grant
- Session
- Creating conditional access policies
- Managing conditional access policies
- Summary
- Questions
- Further reading
- Planning for Devices and Apps
- Creating and configuring Microsoft Store for Business
- Creating your private store
- Setting your MDM solution in Microsoft Store
- Configuring synchronization in Intune and synchronizing apps
- Planning app deployment
- Using a management tool
- Making apps available via your private store
- Assigning apps directly to employees
- Planning device co-management
- Planning device monitoring
- Planning for device profiles
- Assigning profiles
- Monitoring profiles
- Policy conflicts
- Planning for MAM
- Planning mobile device security
- Summary
- Questions
- Further reading
- Planning Windows 10 Deployment
- Planning for WaaS
- Building and deploying
- Servicing
- Servicing channels
- Servicing tools
- Planning for Windows 10 Enterprise deployment
- Windows Autopilot
- In-place upgrades
- Analyzing Upgrade Readiness for Windows 10
- Additional Windows 10 Enterprise security features
- Summary
- Questions
- Further reading
- Section 2: Microsoft 365 Security Threat Management
- Implementing Cloud App Security (CAS)
- Setting up CAS
- Integrating AIP with CAS
- Configuring CAS policies
- Policies
- Templates
- Configuring connected apps
- Designing a CAS solution
- Managing CAS alerts
- Uploading CAS traffic logs
- Manual uploads
- Automatic uploads
- Summary
- Questions
- Further reading
- Implementing Threat Management
- Planning a threat management solution
- Designing and configuring Azure ATP
- Setting up a sensor
- Designing and configuring Microsoft 365 ATP policies
- ATP Safe Attachments
- ATP Safe Links
- ATP for SharePoint OneDrive and Microsoft Teams
- ATP anti-phishing protection
- Monitoring ATA incidents
- Summary
- Questions
- Further reading
- Implementing Windows Defender ATP
- Planning our Windows Defender ATP solution
- Configuring our preferences
- Secure score dashboard security controls
- Microsoft Threat Experts capabilities
- Implementing Windows Defender ATP policies
- Enabling and configuring the security features of Windows 10 Enterprise
- Attack surface reduction
- Install application guard
- Enable application control
- Exploit protection
- Network protection
- Controlled folder access
- Network firewall
- Next-generation protection
- Summary
- Questions
- Further reading
- Managing Security Reports and Alerts
- Managing the Service Assurance Dashboard
- Accessing the Service Assurance Dashboard
- Compliance Manager
- Granting access to others
- Microsoft Secure Score and Azure AD Identity Secure Score
- Tracing and reporting on Azure AD Identity Protection
- Investigating risk events and vulnerabilities
- Settings and alerts
- Microsoft 365 security alerts
- Azure AD Identity Protection dashboard and alerts
- Automatically closing or resolving risk events
- Manually closing risk events
- Summary
- Questions
- Further reading
- Section 3: Microsoft 365 Governance Compliance
- Configuring Data Loss Prevention (DLP)
- Configuring DLP policies
- Designing data retention policies in Microsoft 365
- Labels
- Label policies
- Monitoring and managing DLP policy matches
- Managing DLP exceptions
- Summary
- Questions
- Further reading
- Implementing Azure Information Protection (AIP)
- Planning an AIP solution
- Planning for classification labeling
- Deploying AIP clients
- Implementing an AIP tenant key
- Planning for WIP implementation
- Configuring IRM for workloads
- Planning for the deployment of an on-premises Rights Management connector
- Implementing AIP policies
- Configuring a super user
- Summary
- Questions
- Further reading
- Managing Data Governance
- Planning and configuring information retention
- Retention period and deletion
- Locations
- Creating a retention policy
- Planning for a Microsoft 365 backup
- Planning for restoring deleted content
- Exchange
- SharePoint
- OneDrive
- Summary
- Questions
- Further reading
- Managing Auditing
- Configuring audit log retention
- Enabling auditing of SharePoint site activities
- Enabling auditing of Exchange mailbox activities
- Configuring the audit policy
- Monitoring unified audit logs
- Azure AD audit and sign-in logs
- Summary
- Questions
- Further reading
- Managing eDiscovery
- Searching content using the Security & Compliance Center
- Planning for in-place and legal holds
- Configuring eDiscovery
- Summary
- Questions
- Further reading
- Section 4: Mock Exams
- Mock Exam 1
- Mock Exam 2
- Assessments
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Chapter 13
- Mock Exam 1
- Mock Exam 2
- Leave a review - let other readers know what you think 更新時間:2021-06-24 12:07:06
推薦閱讀
- 高效能辦公必修課:Word圖文處理
- Verilog HDL數字系統設計入門與應用實例
- R Machine Learning By Example
- 實時流計算系統設計與實現
- Julia 1.0 Programming
- HBase Design Patterns
- Multimedia Programming with Pure Data
- 大型數據庫管理系統技術、應用與實例分析:SQL Server 2005
- 網絡布線與小型局域網搭建
- 內模控制及其應用
- Godot Engine Game Development Projects
- 3ds Max造型表現藝術
- 人工智能云平臺:原理、設計與應用
- Oracle 11g Anti-hacker's Cookbook
- Intel Edison Projects
- 商務智能
- 單片機與微機原理及應用
- OpenGL Development Cookbook
- 數字孿生技術與工程實踐:模型+數據驅動的智能系統
- 工業機器人測試與評價技術
- 單片機系統設計與制作
- Bash Quick Start Guide
- 網絡管理自動化
- Julia 1.0 Programming Cookbook
- 非線性系統控制理論與技術
- 自動化生產線安裝與調試
- 用戶體驗樂趣多:寫給開發者的用戶體驗與交互設計課
- 工業機器人:產品包裝典型應用精析
- Getting Started with Cubieboard
- 計算機檢修技能零基礎成長