MS-101: Microsoft 365 Mobility and Security

Log in to Enroll

Summary

  • advanced
  • m365
  • azure
  • azure-active-directory
  • office
  • office-365
  • Candidates for this exam are Microsoft 365 Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. They perform Microsoft 365 tenant management tasks for an enterprise, including its identities, security, compliance, and supporting technologies.Candidates have a working knowledge of Microsoft 365 workloads and should have been an administrator for at least one Microsoft 365 workload (Exchange, SharePoint, Skype for Business, or Windows as a Service). Candidates also have a working knowledge of networking, server administration, and IT fundamentals such as DNS, Active Directory, and PowerShell.

Learning paths

1 hr 37 min
Learn how Azure can provide comprehensive security for your organization's estate.

Modules in this learning path

  • Improve your cloud security posture with Azure Security Center
    7 Units
    39 min

    Learn how you can strengthen your security posture through Azure Security Center.

  • Secure your cloud apps and services with Microsoft Cloud App Security
    9 Units
    58 min

    Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. Learn how to use Cloud App Security in your organization.

1 hr 41 min
Secure the Microsoft 365 Messaging environment helps you understand role-based permissions, compliance issues, and Microsoft's Advanced Threat Protection.

Modules in this learning path

  • Manage role-based-permissions in Microsoft 365 Messaging
    7 Units
    34 min

    Learn about messaging role groups, admin roles, role-based access control, and how you can use eDiscovery in Exchange Online.

  • Manage message hygiene using Exchange Online and Microsoft 365 Advanced Threat Protection
    8 Units
    23 min

    Learn how to plan, implement, and configure policies to protect your organization from malware, spam, and phishing.

  • Manage compliance in Microsoft 365 and Exchange Online
    7 Units
    44 min

    Learn how compliance works in Exchange Online. Learn how to use retention and data loss prevention policies to keep the data and communications you’re required to maintain, how to find that data and communications, and how to ensure you’re ready for an audit.

5 hr 13 min
The amount of data being generated today is growing faster than ever, employees want to get work done everywhere, and the regulatory landscape is constantly changing. Microsoft’s solutions for information protection and governance help organizations achieve the right balance between keeping their data protected and their people productive.

Modules in this learning path

  • Govern information in Microsoft 365
    8 Units
    59 min

    Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don’t.

  • Transition from Azure Information Protection to Microsoft Information Protection
    4 Units
    35 min

    Learn the key considerations for transitioning your organization from using Azure Information Protection to Microsoft Information Protection.

  • Prevent data loss in Microsoft 365
    4 Units
    33 min

    Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.

  • Introduction to information protection and governance in Microsoft 365
    6 Units
    44 min

    Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.

  • Manage records in Microsoft 365
    6 Units
    46 min

    Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.

  • Classify data for protection and governance
    7 Units
    57 min

    Learn about the information available to help you understand your data landscape and know your data.

  • Protect information in Microsoft 365
    6 Units
    39 min

    Learn how to detect sensitive content as it’s used and shared throughout your organization, in the cloud and on devices, and help prevent accidental data loss.

3 hr 7 min
The explosion of data creates challenges of finding the data you need when you need it for a variety of scenarios. Whether it is litigation, internal investigation, responding to a regulatory request or policy obligation – you need to be able to find relevant content, then refine and prepare that content in an efficient and effective manner. Business data across custodial and shared workspaces, devices and apps creates a challenge of effectively responding to data requests. Microsoft 365 has designed the Investigate & Respond solution to help organizations to respond to requests with built-in suite-wide discovery & audit tools.

Modules in this learning path

  • Discover and analyze content in place using Advanced eDiscovery
    10 Units
    2 hr 2 min

    eDiscovery offers built-in tools such as Content Search to help identify data used as evidence in legal cases. Content Search helps identify relevant data directly in Microsoft 365, reducing the amount of data that customers need to prepare and export to their third-party compliance tools. Advanced eDiscovery builds on the core eDiscovery solution, helping organizations respond more quickly with a streamlined end-to-end eDiscovery workflow, intelligent search capabilities to decrease manual work, and save on third-party storage costs.

  • Track user and admin activity with Advanced Audit
    7 Units
    1 hr 5 min

    Microsoft 365 delivers comprehensive audit logs and alerts across more than 15 services, which enables customers to track user and administration activity within their tenants. Improvements in Advanced Auditing in Microsoft 365 include preservation of audit logs for up to a year, faster access to data, and access to crucial events for quicker investigations.

5 hr 44 min
Learn how Microsoft safeguards customer data is designed for people in audit, compliance, risk, and legal roles who seek an overall understanding of Microsoft 365’s fundamental security and privacy practices to safeguard their customer data.

Modules in this learning path

  • Understand Microsoft 365 subprocessor management
    7 Units
    27 min

    Learn how Microsoft 365 procures, monitors, and manages subprocessors to help protect data from unauthorized access and inappropriate use.

  • Understand Microsoft 365 security incident management
    7 Units
    22 min

    Learn how Microsoft 365 investigates, manages, and responds to security concerns to protect customers and the Microsoft 365 cloud environment.

  • Understand Microsoft 365 audit logging and monitoring
    5 Units
    19 min

    Learn about how Microsoft 365 uses comprehensive audit logging and monitoring to support security monitoring, maintain service availability, and meet compliance requirements.

  • Understand Microsoft 365 identity and access management
    7 Units
    26 min

    Learn how Microsoft 365 implements the principle of Zero Standing Access (ZSA) to protect production environments and customer data using Just-In-Time (JIT) and Just-Enough-Access (JEA).

  • Understand Microsoft 365 cloud architecture
    6 Units
    27 min

    Learn how the architecture of Microsoft 365 implements security and privacy features to protect customers who use Microsoft 365 multi-tenant services.

  • Understand Microsoft 365 security development and operation
    8 Units
    37 min

    Learn how Microsoft 365 follows Microsoft’s Security Development Lifecycle (SDL) to build security and privacy into our products and services.

  • Understand Microsoft 365 privacy
    11 Units
    39 min

    Learn about Microsoft 365 privacy standards, the reasons we have them in place, and how they differentiate Microsoft in protecting and respecting customer data.

  • Understand Microsoft 365 governance
    7 Units
    28 min

    Learn how Microsoft implements organization-wide security and privacy governance to support the secure operation of Microsoft 365 services and maintain compliance with regulatory requirements and customer commitments.

  • Understand Microsoft 365 resiliency and continuity
    8 Units
    30 min

    Learn how Microsoft 365 builds resilient services to meet customer expectations in the face of faults and challenges to normal operations, maintains optimal service availability, and fulfills business continuity requirements.

  • Understand Microsoft datacenter security
    9 Units
    30 min

    Learn how Microsoft uses Defense-In-Depth to secure our datacenters against unauthorized access, environmental hazards, and other physical threats, as well as how Microsoft implements resilient architecture, business continuity, and disaster recovery to maintain the availability of our services.

  • Understand Microsoft 365 risk management
    6 Units
    17 min

    Learn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers and the Microsoft 365 environment.

  • Understand Microsoft 365 encryption
    6 Units
    20 min

    Learn how Microsoft 365 encrypts data at rest and in transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.

  • Understand Microsoft 365 vulnerability management and security monitoring
    7 Units
    22 min

    Learn how Microsoft 365 proactively monitors information system assets for vulnerabilities, assesses the risks associated with discovered vulnerabilities, and remediates them in a timely manner.

2 hr 57 min
Manage your enterprise deployment with modern tools from Microsoft 365. Empower your users and IT to benefit from the easy deployment and productivity enhancements from Windows 10, while still maintaining your standards for security and manageability.

Modules in this learning path

  • Introduction to modern management in Microsoft 365
    3 Units
    20 min

    Throughout this module, you will learn about the key concepts and benefits of modern management with Microsoft 365. We will explore the four key pillars to modern management, and how they can help your organization manage all their devices in a modern way that is easy to deploy, up-to-date, secure and intelligent.

  • Automate Windows deployments by using Windows Autopilot
    4 Units
    30 min

    During the course of this module, you will learn about Windows Autopilot and the benefits it can provide to modern IT organizations. From the very beginning, to the very end of a device’s lifecycle; Windows Autopilot is an essential tool to reduce the burden on IT teams when registering, resetting, and recovering devices.

  • Manage devices by using Microsoft Intune
    3 Units
    35 min

    This module will introduce you to the modern device management options for Windows 10 from Microsoft 365, including co-management, Microsoft Intune, and Mobile Device Management (MDM) for Office 365.

  • Manage Windows 10 through co-management by using System Center Configuration Manager
    5 Units
    31 min

    Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the Microsoft 365 cloud. It helps you unlock additional cloud-powered capabilities like conditional access.

  • Manage applications by using Microsoft Intune
    7 Units
    29 min

    Managing applications on devices in your organization is key to a secure and productive application ecosystem. Microsoft Intune is a cloud-based service that helps enable your workforce to be productive anywhere and, on any device; while keeping your corporate data protected. In this module, we will learn about considerations for implementing Mobile Application Management (MAM) and manage MAM policies in Intune.

  • Deploy Windows Update in Microsoft 365
    6 Units
    32 min

    To keep computers that run Windows 10 stable and protected, you must update them regularly with the latest features, security updates, and fixes. To utilize Windows Update effectively, you must be aware of the configuration options that Windows Update has available, and you must guide users on how to configure these options.

58 min
Microsoft threat protection in Microsoft 365 addresses today's security challenges by securing your organization's assets and proactively identifying and protecting against persistent threats to your network endpoints.

Modules in this learning path

  • Introduction to threat protection with Microsoft 365
    4 Units
    11 min

    Learn about how attackers most commonly breach organizations–and the Microsoft tools that protect your organization in an ever shifting landscape.

  • Protect against threats with Microsoft Defender Advanced Threat Protection
    4 Units
    26 min

    Learn how new threat protection tools from Microsoft protect your organization’s users, devices, and data from attempted attacks.

  • Remediate risks with Office 365 Advanced Threat Protection
    5 Units
    49 min

    Learn about the Office 365 Advanced Threat Protection component of Microsoft Threat Protection.

  • Safeguard your environment with Azure Advanced Threat Protection
    5 Units
    1 hr 2 min

    Learn about the Azure Advanced Threat Protection component of Microsoft Threat Protection.

1 hr 0 min
Identity & access management is the foundation for a secure digital estate. The credentials that you issue to your users prove that they are who they claim to be and that they have permission to access your resources. Learn how to use Microsoft 365 to for authentication and authorization in your enterprise environment.

Modules in this learning path

  • Overview of identity and access management in Microsoft 365
    5 Units
    8 min

    Learn how identity and access management work in Microsoft 365.

  • Simplify access and identity provisioning with Microsoft 365
    6 Units
    17 min

    Learn how to use Microsoft 365 authentication tools for access and identity provisioning.

  • Strengthen authentication with Microsoft 365
    6 Units
    8 min

    Learn how to strengthen authentication across your enterprise deployment with security tools from Microsoft 365.

  • Protect those most targeted
    5 Units
    19 min

    Learn how to protect the most important credentials in your enterprise ecosystem – administrator credentials.

  • Use Microsoft 365 to promote a security mindset
    5 Units
    8 min

    Learn how to promote an enterprise-wide security mindset with Microsoft 365.

  • Embrace Zero Trust with Azure Active Directory
    5 Units
    35 min

    Learn about the Zero Trust model and how to implement Zero Trust into your organization.

44 min
We live in an always connected, technology-driven world. Efficient security management is the foundation to managing your assets – in the cloud, on-premises, or across a hybrid environment. You need to proactively manage and secure your organization’s identities, devices, end points (both apps and data), and IT infrastructure. Microsoft 365 helps you secure your infrastructure with a focus on visibility, control, and guidance, and helps you consolidate from a plethora of specialized functions and tools, leveraging the shared intelligence, to keep your security teams focused on the most critical insights for their workloads.

Modules in this learning path

  • Overview of security management in Microsoft 365 security center
    3 Units
    10 min

    Learn how the security management tools from Microsoft help you protect your organization’s users, devices, and data.

  • Use reporting in the Microsoft 365 security center
    3 Units
    12 min

    Learn how to take advantage of the reporting and insights available through the Microsoft 365 security center to drive organizational security health.

  • Protect mail with Office 365 Advanced Threat Protection
    3 Units
    10 min

    Learn how Office 365 Advanced Threat Protection (ATP) helps safeguard your organization against unknown malware, viruses, and harmful email links and attachments.

  • Secure Windows 10 endpoints
    4 Units
    12 min

    Learn how to mitigate end-point threats by using Windows 10 security features.

6 hr 49 min
Learn how to configure security policies and manage security alerts with the tools and services in Azure.

Modules in this learning path

  • Security, responsibility, and trust in Azure
    11 Units
    1 hr 16 min

    Discuss the basic concepts for protecting your infrastructure and data when you work in the cloud. Understand what responsibilities are yours and what Azure takes care of for you.

  • Create security baselines
    11 Units
    1 hr 0 min

    Create security baselines

  • Identify security threats with Azure Security Center
    7 Units
    43 min

    In this module, you’ll discover how to detect and respond to threats with Azure Security Center.

  • Resolve security threats with Azure Security Center
    7 Units
    44 min

    In this module, you’ll use the alert capabilities of Azure Security Center to watch for and respond to threats.

  • Protect your servers and VMs from brute-force and malware attacks with Azure Security Center
    6 Units
    44 min

    In this module, you’ll discover how to protect VMs and servers with Azure Security Center

  • Analyze your Azure infrastructure by using Azure Monitor logs
    5 Units
    34 min

    Use Azure Monitor logs to extract valuable information about your infrastructure from log data.

  • Improve incident response with alerting on Azure
    9 Units
    53 min

    Respond to incidents and activities in your infrastructure through alerting capabilities in Azure Monitor.

  • Capture Web Application Logs with App Service Diagnostics Logging
    8 Units
    55 min

    Use application logs in Azure Web Apps to help debug web app code.