Examens: Microsoft 365 Security Administration (MS-500)
- Prix: EUR195,00
- Réf.: MS-500
Aller à:
Descriptif
TopCandidates for this exam are familiar with M365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance. This role focuses on the M365 environment and includes hybrid environments.
Programme
TopThe bullets that appear below each of the skills measured in the document below are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive.
Implement and manage identity and access (30-35%)
Secure Microsoft 365 hybrid environments
- configure and manage security integration components in Microsoft 365 hybrid environments, including connectivity, synchronization services, and authentication
- plan Azure AD authentication options
- plan Azure AD synchronization options
- monitor and interpret Azure AD Connect events
Secure user accounts
- implement Azure AD dynamic group membership
- implement Azure AD Self-service password reset
- manage Azure AD access reviews
Implement authentication methods
- plan sign-on security
- implement multi-factor authentication (MFA)
- manage and monitor MFA
- implement device sign-on methods
- manage authentication methods
- monitor authentication methods
Implement conditional access
- plan for compliance and conditional access policies
- configure and manage device compliance policy
- configure and manage conditional access policy
- monitor Conditional Access and Device Compliance
Implement role-based access control (RBAC)
- plan for RBAC
- configure RBAC
- monitor RBAC usage
Implement Azure AD Privileged Identity Management (PIM)
- plan for Azure PIM
- configure and manage Azure PIM
- monitor Azure PIM
Implement Azure AD Identity Protection
- implement user risk policy
- implement sign-in risk policy
- configure Identity Protection alerts
- review and respond to risk events
Implement and manage threat protection (20-25%)
Implement an enterprise hybrid threat protection solution
- plan an Azure Advanced Threat Protection (ATP) solution
- install and configure Azure ATP
- manage Azure ATP workspace health
- generate Azure ATP reports
- integrate Azure ATP with Microsoft Defender ATP
- monitor Azure ATP
- manage suspicious activities
Implement device threat protection
- plan and implement a Microsoft Defender ATP solution
- manage Microsoft Defender ATP
- monitor Microsoft Defender ATP
Implement and manage device and application protection
- plan for device protection
- configure and manage Windows Defender Application Guard
- configure and manage Windows Defender Application Control
- configure and manage Windows Defender Exploit Guard
- configure Secure Boot
- configure and manage Windows 10 device encryption
- configure and manage non-Windows device encryption
- plan for securing applications data on devices
- define managed apps for Mobile Application Management (MAM)
- protect your enterprise data using Windows Information Protection (WIP)
- configure Intune App Protection policies for Windows and non-Windows devices
Implement and manage Office 365 ATP
- configure Office 365 ATP anti-phishing protection
- configure Office 365 ATP anti-phishing policies
- define users and domains to protect with Office 365 ATP Anti-phishing
- configure Office 365 ATP anti-spoofing
- configure actions against impersonation
- configure Office 365 ATP anti-spam protection
- enable Office 365 ATP Safe-Attachments
- configure Office 365 ATP Safe Attachments policies
- configure Office 365 ATP Safe Attachments options
- configure Office 365 ATP Safe Links options
- configure Office 365 ATP Safe Links blocked URLs
- configure Office 365 ATP Safe Links policies
- review threats and malware trends on the Office 365 ATP Threat Management dashboard
- review threats and malware trends with Office 365 ATP Threat Explorer and Threat Tracker
- create and review Office 365 ATP incidents
- review quarantined items in ATP including Microsoft SharePoint Online, OneDrive for Business, Exchange Online, and Microsoft Teams
- monitor online anti-malware solutions using Office 365 ATP Reports
- perform tests using Attack Simulator
Implement and manage information protection (15-20%)
Secure data access within Office 365
- plan secure data access within Office 365
- implement and manage Customer Lockbox
- configure data access in Office 365 collaboration workloads
- configure B2B sharing for external users
Manage Azure information Protection (AIP)
- plan an AIP solution
- activate Azure Rights Management
- configure usage rights
- configure and manage super users
- customize policy settings
- create and configure labels and conditions
- create and configure templates
- configure languages
- configure and use the AIP scanner
- deploy the RMS connector
- manage tenant keys
- deploy the AIP client
- track and revoke protected documents
- integrate AIP with Microsoft Online Services
Manage Data Loss Prevention (DLP)
- plan a DLP solution
- create and manage DLP policies
- create and manage sensitive information types
- monitor DLP reports
- manage DLP notifications
- create queries to locate sensitive data
- Implement and manage Microsoft Cloud App Security
- plan Cloud App Security implementation
- configure Microsoft Cloud App Security
- perform productivity app discovery using Cloud App Security
- manage entries in the Cloud app catalog
- manage third-party apps in Cloud App Security
- manage Microsoft Cloud App Security
- configure Cloud App Security connectors
- configure Cloud App Security policies
- configure and manage Cloud App Security templates
- configure Cloud App Security users and permissions
- review and respond to Cloud App Security alerts
- review and interpret Cloud App Security dashboards and reports
- review and interpret Cloud App Security activity log and governance log
Manage governance and compliance features in Microsoft 365 (25-30%)
Configure and analyze security reporting
- interpret Windows Analytics
- configure Windows Telemetry options
- configure Office Telemetry options
- review and interpret security reports and dashboards
- plan for custom security reporting with Intelligent Security Graph
- review Office 365 secure score action and recommendations
- configure reports and dashboards in Azure Log Analytics
- review and interpret reports and dashboards in Azure Log Analytics
- configure alert policies in the Office 365 Security and Compliance Center
Manage and analyze audit logs and reports
- plan for auditing and reporting
- configure Office 365 auditing and reporting
- perform audit log search
- review and interpret compliance reports and dashboards
- configure audit alert policy
Configure Office 365 classification and labeling
- plan for data governance classification and labels
- search for personal data
- apply labels to personal data
- monitor for leaks of personal data
- create and publish Office 365 labels
- configure label policies
Manage data governance and retention
- plan for data governance and retention
- review and interpret data governance reports and dashboards
- configure retention policies
- define data governance event types
- define data governance supervision policies
- configure Information holds
- find and recover deleted Office 365 data
- import data in the Security and Compliance Center
- configure data archiving
- manage inactive mailboxes
Manage search and investigation
- plan for content search and eDiscovery
- delegate permissions to use search and discovery tools
- use search and investigation tools to perform content searches
- export content search results
- manage eDiscovery cases
Manage data privacy regulation compliance
- plan for regulatory compliance in Microsoft 365
- review and interpret GDPR dashboards and reports
- manage Data Subject Requests (DSRs)
- review Compliance Manager reports
- create and perform Compliance Manager assessments and action items
- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/fr/reviews/fr-global-review-q1-q2-fy25.png #000000
- <table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Délais d’inscription</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">Avant le début de la formation <strong>jusqu’à 5 jours ouvrés sous réserve de disponibilité. </strong>Dans le cas d’une formation finançable par votre <a style="display: inline;" href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf" data-mce-href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf" data-mce-style="display: inline;">CPF,</a> jusqu’à 11 jours ouvrés avant le début de la formation. <a style="display: inline;" href="mailto:cpf@globalknowledge.fr" data-mce-href="mailto:cpf@globalknowledge.fr" data-mce-style="display: inline;">Contactez-nous</a> pour connaître les formations éligibles.</p></td></tr></tbody></table><p><br /></p>
- <p><br /></p><table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Modalité d'évaluation</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">A l'issue de la formation, le participant est invité à s’auto-évaluer par rapport aux objectifs énoncés.</p></td></tr></tbody></table>
- <p><br /></p><table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Accessibilité et accompagnement</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">Notre référente handicap se tient à votre disposition pour adapter votre accueil et le suivi de votre formation. N’hésitez pas à la contacter : <a href="mailto:info@globalknowledge.fr" data-linkindex="0" data-mce-href="mailto:info@globalknowledge.fr">info@globalknowledge.fr</a></p></td></tr></tbody></table>
- #000000
- #000000
- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/fr/federacion-francaise-de-la-cybersecurite.png #000000