Book Image

Microsoft Information Protection Administrator SC-400 Certification Guide

By : Shabaz Darr, Viktor Hedberg
2 (1)
Book Image

Microsoft Information Protection Administrator SC-400 Certification Guide

2 (1)
By: Shabaz Darr, Viktor Hedberg

Overview of this book

Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance. Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam. By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.
Table of Contents (19 chapters)
1
Section 1: Exam Overview and Introduction to Information Protection
4
Section 2: Implementing Information Protection
9
Section 3: Implementing Data Loss Prevention
13
Section 4: Implementing Information Governance

What this book covers

Chapter 1, Preparing for Your Microsoft Exam, provides guidance on getting prepared for a Microsoft exam, along with the resources that can assist in your learning plans.

Chapter 2, Introduction to Information Protection, provides an introduction to information protection, including what it is and why it is so important. This chapter will also discuss the benefits of implementing information protection in your organization.

Chapter 3, Creating and Managing Sensitive Information Types, focuses on creating sensitive information types of data and how to manage these in an organization.

Chapter 4, Creating and Managing Trainable Classifiers, introduces trainable classifiers, and how to identify, create, and manage them. We will also look at how to verify that they are performing correctly and how to retrain a classifier.

Chapter 5, Implementing and Managing Sensitivity Labels, examines the roles and permissions required to administer sensitivity labels as well as create and manage policies and how to apply them to Microsoft 365 SaaS applications. We will also look at the integration of classification with on-premises data and the application of protections and restrictions to files.

Chapter 6, Planning and Implementing Encryption for Email Messages, provides an overview of what encryption in Microsoft 365 looks like and then focuses on email encryption specifically. We will look at defining requirements and then implementing Office 365 Message Encryption.

Chapter 7, Creating and Configuring Data Loss Prevention Policies, covers how to create data loss prevention policies in Microsoft 365 in order to discover, classify, and protect sensitive and business-critical content throughout its life cycle across your organization.

Chapter 8, Implementing and Monitoring Microsoft Endpoint Data Loss Prevention, examines the planning and implementation of Microsoft Endpoint data loss prevention, which extends the activity monitoring and protection capabilities of data loss prevention to sensitive items that are on Windows 10 devices.

Chapter 9, Managing and Monitoring Data Loss Prevention Policies and Activities, discusses how to respond to and mitigate data loss policy violations using the Microsoft Purview Compliance Portal and Microsoft Defender for Cloud Apps.

Chapter 10, Configuring Retention Policies and Labels, examines the planning and implementation of retention labels and policies. This will include deploying, managing, and configuring retention labels and policies for your Microsoft 365 tenant.

Chapter 11, Managing Data Retention in Microsoft 365, discusses how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services.

Chapter 12, Implementing Microsoft Purview Records Management, covers how to use intelligent classification to automate and simplify the retention schedule for regulatory and business-critical records in your organization.