This course begins by examining the Microsoft Copilot for Microsoft 365 design. Its main focus, however, is on the security and compliance features that administrators must configure in their Microsoft 365 tenant to protect their company's organizational data before they implement Copilot for Microsoft 365.
Full Time
This course is designed for administrators, Microsoft 365 administrators, or persons aspiring to the Microsoft 365 Administrator role who have completed at least one of the Microsoft 365 role-based administrator certification paths.
1 Day
7 Hours
Module 1: Examine the Copilot for Microsoft 365 design
This module examines the Microsoft Copilot for Microsoft 365 design, how it works, its service and tenant logical architecture, and how you can extend it using plugins and Microsoft Graph connectors.
By the end of this module, you should be able to:
Module 2: Implement Copilot for Microsoft 365
This module examines the key tasks that administrators must complete when implementing Microsoft Copilot for Microsoft 365, such as completing prerequisites, preparing data for searches, and assigning Copilot for Microsoft 365 licenses.
By the end of this module, you should be able to:
Module 3: Examine data security and compliance in Copilot for Microsoft 365
This module examines how Microsoft Copilot for Microsoft 365 adheres to existing privacy and compliance obligations, how it ensures data residency and compliance boundary, and how it protects sensitive business data.
By the end of this module, you should be able to:
Module 4: Manage secure user access in Microsoft 365
This module examines the various features provided in the Microsoft 365 ecosystem for securing user access, such as Conditional Access policies, multifactor authentication, self-service password management, Smart Lockout policies, and security defaults.
Learning objectives
By the end of this module, you should be able to:
Module 5: Manage permissions, roles, and role groups in Microsoft 365
This module examines the use of roles and role groups in the Microsoft 365 permission model, including role management, best practices when configuring admin roles, delegating roles, and elevating privileges.
By the end of this module, you should be able to:
Module 6: Implement data classification of sensitive information
This module introduces you to data classification in Microsoft 365, including how to create and train classifiers, view sensitive data using Content explorer and Activity explorer, and implement Document Fingerprinting.
By the end of this module, you should be able to:
· Explain the benefits and pain points of creating a data classification framework.
· Identify how data classification of sensitive items is handled in Microsoft 365.
· Understand how Microsoft 365 uses trainable classifiers to protect sensitive data.
· Create and then retrain custom trainable classifiers.
· Analyze the results of your data classification efforts in Content explorer and Activity explorer.
· Implement Document Fingerprinting to protect sensitive information being sent through Exchange Online.
Module 7: Explore sensitivity labels
This module examines how sensitivity labels from the Microsoft Information Protection solution let you classify and protect your organization's data, while making sure that user productivity and collaboration isn't hindered.
By the end of this module, you should be able to:
· Describe how sensitivity labels let you classify and protect your organization's data
· Identify the common reasons why organizations use sensitivity labels
· Explain what a sensitivity label is and what they can do for an organization
· Configure a sensitivity label's scope
· Explain why the order of sensitivity labels in your admin center is important
· Describe what label policies can do
Module 8: Implement sensitivity labels
This module examines the process for implementing sensitivity labels, including applying proper administrative permissions, determining a deployment strategy, creating, configuring, and publishing labels, and removing and deleting labels.
By the end of this module, you should be able to:
· Create a deployment strategy for implementing sensitivity labels that satisfies your organization's requirements.
· Enable sensitivity labels in SharePoint Online and OneDrive so they can use encrypted files.
· Create and configure sensitivity labels.
· Publish sensitivity labels by creating a label policy.
· Identify the differences between removing and deleting sensitivity labels.
None
Course Fee Payable | ||
---|---|---|
Original Fee | Before GST | With GST (9%) |
Course Fee | $699.00 | $761.91 |