MS-4006: Copilot for Microsoft 365 for Administrators

The course starts with an overview of the Microsoft Copilot for Microsoft 365 architecture. The primary emphasis is on the security and compliance settings that must be managed by administrators within their Microsoft 365 environment to secure organizational data prior to deploying Copilot for Microsoft 365.

Audience & Prerequisites

This program is tailored for administrators, individuals holding a role within Microsoft 365 administration, or those aiming to be Microsoft 365 Administrators and have already achieved at least one of the Microsoft 365 role-based administrator certification paths.

Course content

Module 1: Prepare your organization for Copilot for Microsoft 365

  • Examine the Copilot for Microsoft 365 design
  • Describe the prerequisites for Copilot for Microsoft 365
  • Explain how Copilot for Microsoft 365 works
  • Understand the Copilot for Microsoft 365 service and tenant logical architecture
  • Describe how to extend Copilot for Microsoft 365 using Microsoft Graph connectors
  • Prepare your data for Copilot for Microsoft 365 searches
  • Assign your Copilot for Microsoft 365 licenses
  • Identify Microsoft 365 security features that control oversharing of data in Copilot for Microsoft 365
  • Drive adoption by creating a Copilot Center of Excellence
  • Implement Copilot for Microsoft 365
  • Examine data security and compliance in Copilot for Microsoft 365

Module 2: Manage data security for Copilot for Microsoft 365

  • Manage secure user access in Microsoft 365
  • Describe how Copilot for Microsoft 365 uses proprietary business data
  • Understand how Copilot for Microsoft 365 protects sensitive business data
  • Describe how Copilot for Microsoft 365 uses Microsoft 365 isolation and access controls
  • Understand how Copilot for Microsoft 365 meets regulatory compliance mandates
  • Manage user passwords
  • Create Conditional Access policies
  • Enable security defaults
  • Describe pass-through authentication
  • Enable multifactor authentication
  • Describe self-service password management
  • Implement Microsoft Entra Smart Lockout
  • Manage roles and role groups in Microsoft 365
  • Describe how threat intelligence in Microsoft 365 is powered by the Microsoft Intelligent Security Graph
  • Create alerts that can identify malicious or suspicious events
  • Understand how the automated investigation and response process works in Microsoft Defender XDR
  • Describe how threat hunting enables security operators to identify cybersecurity threats
  • Describe how Advanced hunting in Microsoft Defender XDR proactively inspects events in your network to locate threat indicators and entities

Module 3: Manage data compliance for Copilot for Microsoft 365

  • Explain the benefits and pain points of creating a data classification framework
  • Identify how data classification of sensitive items is handled in Microsoft 365
  • Understand how Microsoft 365 uses trainable classifiers to protect sensitive data
  • Create and then retrain custom trainable classifiers
  • Analyze the results of your data classification efforts in Content explorer and Activity explorer
  • Implement Document Fingerprinting to protect sensitive information being sent through Exchange Online
  • Describe how sensitivity labels let you classify and protect your organization's data
  • Identify the common reasons why organizations use sensitivity labels
  • Explain what a sensitivity label is and what they can do for an organization
  • Configure a sensitivity label's scope
  • Explain why the order of sensitivity labels in your admin center is important
  • Describe what label policies can do
  • Describe the overall process to create, configure, and publish sensitivity labels
  • Identify the administrative permissions that must be assigned to compliance team members to implement sensitivity labels
  • Develop a data classification framework that provides the foundation for your sensitivity labels
  • Create and configure sensitivity labels
  • Publish sensitivity labels by creating a label policy
  • Identify the differences between removing and deleting sensitivity labels

 

 

 

 

 

 

Other relevant courses