Copilot for Microsoft 365 for Administrators (MS-4006) [M-MS4006]

Durée totale
Localisation
En ligne
Date et lieu de début

Copilot for Microsoft 365 for Administrators (MS-4006) [M-MS4006]

Global Knowledge Belgium BV
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début

computer En ligne: VIRTUAL TRAINING CENTER
7 juin 2024
check_circle Date de début garantie
computer En ligne: VIRTUAL TRAINING CENTER
1 juil. 2024
computer En ligne: VIRTUAL TRAINING CENTER
16 août 2024
computer En ligne: VIRTUAL TRAINING CENTER
13 sept. 2024
computer En ligne: VIRTUAL TRAINING CENTER
14 oct. 2024
computer En ligne: VIRTUAL TRAINING CENTER
11 nov. 2024
computer En ligne: VIRTUAL TRAINING CENTER
12 déc. 2024

Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

This course begins by examining the Microsoft Copilot for Microsoft 365 design. Its main focus, however, is on the security and compliance features that administrators must configure in their Microsoft 365 tenant to protect their company's organizational data before they implement Copilot for Microsoft 365.

AUDIENCE

This course is designed for administrators, Microsoft 365 administrators, or persons aspiring to the Microsoft 365 Administrator role who have completed at least one of the Microsoft 365 role-based administrator certification paths.

CONTENT

Module 1: Examine the Copilot for Microsoft 365 design

  • Describe the prerequisites for Copilot for Microsoft 365.
  • Explain how Copilo…

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Microsoft 365, Word, Excel, Compétences numériques et informatiques et Apple Mac OS X.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

This course begins by examining the Microsoft Copilot for Microsoft 365 design. Its main focus, however, is on the security and compliance features that administrators must configure in their Microsoft 365 tenant to protect their company's organizational data before they implement Copilot for Microsoft 365.

AUDIENCE

This course is designed for administrators, Microsoft 365 administrators, or persons aspiring to the Microsoft 365 Administrator role who have completed at least one of the Microsoft 365 role-based administrator certification paths.

CONTENT

Module 1: Examine the Copilot for Microsoft 365 design

  • Describe the prerequisites for Copilot for Microsoft 365.
  • Explain how Copilot for Microsoft 365 works.
  • Understand the Copilot for Microsoft 365 service and tenant logical architecture.
  • Describe how to extend Copilot for Microsoft 365 using Microsoft Graph connectors.

Module 2: Implement Copilot for Microsoft 365

  • Identify the prerequisites for Copilot for Microsoft 365.
  • Prepare your data for Copilot for Microsoft 365 searches.
  • Assign your Copilot for Microsoft 365 licenses.
  • Identify Microsoft 365 security features that control oversharing of data in Copilot for Microsoft 365.
  • Drive adoption by creating a Copilot Center of Excellence.

Module 3: Examine data security and compliance in Copilot for Microsoft 365

  • Describe how Copilot for Microsoft 365 uses proprietary business data.
  • Understand how Copilot for Microsoft 365 protects sensitive business data.
  • Describe how Copilot for Microsoft 365 uses Microsoft 365 isolation and access controls.
  • Understand how Copilot for Microsoft 365 meets regulatory compliance mandates.

Module 4: Manage secure user access in Microsoft 365

  • Manage user passwords.
  • Create Conditional Access policies.
  • Enable security defaults.
  • Describe pass-through authentication.
  • Enable multifactor authentication.
  • Describe self-service password management.
  • Implement Microsoft Entra Smart Lockout.

Module 5: Manage roles and role groups in Microsoft 365

  • Understand how roles are used in the Microsoft 365 ecosystem.
  • Describe the Azure role-based access control permission model used in Microsoft 365.
  • Identify the key tasks assigned to the common Microsoft 365 admin roles.
  • Identify best practices when configuring admin roles.
  • Delegate admin roles to partners.
  • Implement role groups in Microsoft 365.
  • Manage permissions using administrative units in Microsoft Entra ID.
  • Elevate privileges to access admin centers by using Microsoft Entra ID Privileged Identity Management.

Module 6: Explore threat intelligence in Microsoft Defender XDR

  • Describe how threat intelligence in Microsoft 365 is powered by the Microsoft Intelligent Security Graph.
  • Create alerts that can identify malicious or suspicious events.
  • Understand how the automated investigation and response process works in Microsoft Defender XDR.
  • Describe how threat hunting enables security operators to identify cybersecurity threats.
  • Describe how Advanced hunting in Microsoft Defender XDR proactively inspects events in your network to locate threat indicators and entities.

Module 7: Implement data classification of sensitive information

  • Explain the benefits and pain points of creating a data classification framework.
  • Identify how data classification of sensitive items is handled in Microsoft 365.
  • Understand how Microsoft 365 uses trainable classifiers to protect sensitive data.
  • Create and then retrain custom trainable classifiers.
  • Analyze the results of your data classification efforts in Content explorer and Activity explorer.
  • Implement Document Fingerprinting to protect sensitive information being sent through Exchange Online.

Module 8: Explore sensitivity labels

  • Describe how sensitivity labels let you classify and protect your organization's data
  • Identify the common reasons why organizations use sensitivity labels
  • Explain what a sensitivity label is and what they can do for an organization
  • Configure a sensitivity label's scope
  • Explain why the order of sensitivity labels in your admin center is important
  • Describe what label policies can do

Module 9: Implement sensitivity labels

  • Describe the overall process to create, configure, and publish sensitivity labels
  • Identify the administrative permissions that must be assigned to compliance team members to implement sensitivity labels
  • Develop a data classification framework that provides the foundation for your sensitivity labels
  • Create and configure sensitivity labels
  • Publish sensitivity labels by creating a label policy
  • Identify the differences between removing and deleting sensitivity labels

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.