Book Image

Microsoft 365 Mobility and Security – Exam Guide MS-101

By : Nate Chamberlain
Book Image

Microsoft 365 Mobility and Security – Exam Guide MS-101

By: Nate Chamberlain

Overview of this book

Exam MS-101: Microsoft 365 Mobility and Security is a part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path designed to help users validate their skills in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. This book will help you implement modern device services, apply Microsoft 365 security and threat management, and manage Microsoft 365 governance and compliance. Written in a succinct way, you’ll explore chapter-wise self-assessment questions, exam tips, and mock exams with answers. You’ll start by implementing mobile device management (MDM) and handling device compliance. You’ll delve into threat detection and management, learning how to manage security reports and configure Microsoft 365 alerts. Later, you’ll discover data loss prevention (DLP) tools to protect data as well as tools for configuring audit logs and policies. The book will also guide you through using Azure Information Protection (AIP) for deploying clients, applying policies, and configuring services and users to enhance data security. Finally, you’ll cover best practices for configuring settings across your tenant to ensure compliance and security. By the end of this book, you’ll have learned to work with Microsoft 365 services and covered the concepts and techniques you need to know to pass the MS-101 exam.
Table of Contents (22 chapters)
Free Chapter
1
Section 1: Modern Device Services
6
Section 2: Microsoft 365 Security Threat Management
11
Section 3: Microsoft 365 Governance Compliance
17
Section 4: Mock Exams
18
Mock Exam 1
19
Mock Exam 2

Summary

In this chapter, we covered the exam topics that we outlined at the beginning of this chapter.

We learned that Azure AIP helps us protect sensitive data types from creation to storage and sharing using labels and protection template administrator controls. We created a label and applied protection to items using that label. To help users protect data when they're working in client applications, we deployed AIP clients to our user's devices. We learned that we can incorporate WIP and IRM into our overall information protection solution.

Then, we created and implemented AIP policies, which is the configuration that actually allows much of the functionality we discussed in this chapter, such as the notification bar in client applications. We ended this chapter by enabling a super user, that is, someone who can read and inspect data protected by Azure RMS.

In the...