MS-4002: Prepare security and compliance to support Microsoft 365 Copilot

This course examines how administrators can manage and extend Microsoft 365 Copilot to meet their business needs. The course introduces you to Copilot, examines how to implement and administer it, and then explores the fundamentals of Copilot extensibility.

The MS-4002: Prepare Security and Compliance to Support Microsoft 365 Copilot course provides a detailed understanding of how to secure and protect Microsoft 365 environments to support the use of Microsoft Copilot. Participants will learn how to manage user access, implement app and endpoint protection, deploy Microsoft Defender for Office 365, and enforce data retention and information barriers. The course also covers advanced data protection techniques, such as data loss prevention (DLP) and sensitivity labeling, to ensure compliance and security for organizations using Microsoft 365.


Course Objectives

  • Manage secure user access with multifactor authentication and Conditional Access policies.
  • Implement app protection using Microsoft Defender for Cloud Apps and manage cloud security policies.
  • Utilize Microsoft Defender for Endpoint to detect and respond to advanced threats on devices.
  • Deploy Microsoft Defender for Office 365 to safeguard against email and collaboration threats.
  • Apply retention policies and labels to ensure compliance and protect sensitive data.
  • Establish Data Loss Prevention (DLP) strategies to prevent data exposure and misuse.

Who should attend

  • Security Administrator
  • Security Architect
  • Security Consultant

Prerequisites

Required

  • Learners should have basic functional experience with Microsoft 365 services.
  • Learners must have a proficient understanding of general IT practices.


Course Outline

Manage secure user access in Microsoft 365

  • Manage user passwords.
  • Create Conditional Access policies.
  • Enable security defaults.
  • Describe pass-through authentication.
  • Enable multifactor authentication.
  • Describe self-service password management.
  • Implement Microsoft Entra Smart Lockout.

Implement app protection by using Microsoft Defender for Cloud Apps

  • Describe how Microsoft Defender for Cloud Apps provides improved visibility into network cloud activity and increases the protection of critical data across cloud applications.
  • Explain how to deploy Microsoft Defender for Cloud Apps.
  • Control your cloud apps with file policies.
  • Manage and respond to alerts generated by those policies.
  • Configure and troubleshoot Cloud Discovery.

Implement endpoint protection by using Microsoft Defender for Endpoint

  • Describe how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats.
  • Onboard supported devices to Microsoft Defender for Endpoint.
  • Implement the Threat and Vulnerability Management module to effectively identify, assess, and remediate endpoint weaknesses.
  • Configure device discovery to help find unmanaged devices connected to your corporate network.
  • Lower your organization's threat and vulnerability exposure by remediating issues based on prioritized security recommendations.

Implement threat protection by using Microsoft Defender for Office 365

  • Describe the protection stack provided by Microsoft Defender for Office 365.
  • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant.
  • Describe the Threat Tracker widgets and views that provide you with intelligence on different cybersecurity issues that might affect your company.
  • Run realistic attack scenarios using Attack Simulator to help identify vulnerable users before a real attack impacts your organization.

Explore retention in Microsoft 365

  • Explain how a retention policies and retention labels work.
  • Identify the capabilities of both retention policies and retention labels.
  • Select the appropriate scope for a policy depending on business requirements.
  • Explain the principles of retention.
  • Identify the differences between retention settings and eDiscovery holds.
  • Restrict retention changes by using preservation lock.

Andre relevante kurs