MS-500T00 Microsoft 365 Security Administrator
Event Information
About this event
1 - USER AND GROUP MANAGEMENT
Identity and Access Management concepts
The Zero Trust model
Plan your identity and authentication solution
User accounts and roles
Password Management
2 - IDENTITY SYNCHRONIZATION AND PROTECTION
Plan directory synchronization
Configure and manage synchronized identities
Azure AD Identity Protection
3 - IDENTITY AND ACCESS MANAGEMENT
Application Management
Identity Governance
Manage device access
Role Based Access Control (RBAC)
Solutions for external access
Privileged Identity Management
4 - SECURITY IN MICROSOFT 365
Threat vectors and data breaches
Security strategy and principles
Microsoft security solutions
Secure Score
5 - THREAT PROTECTION
Exchange Online Protection (EOP)
Microsoft Defender for Office 365
Manage Safe Attachments
Manage Safe Links
Microsoft Defender for Identity
6 - THREAT MANAGEMENT
Security dashboard
Threat investigation and response
Azure Sentinel
Advanced Threat Analytics
7 - MICROSOFT CLOUD APPLICATION SECURITY
Deploy Cloud Application Security
Use cloud application security information
8 - MOBILITY
Mobile Application Management (MAM)
Mobile Device Management (MDM)
Deploy mobile device services
Enroll devices to Mobile Device Management
9 - INFORMATION PROTECTION AND GOVERNANCE
Information protection concepts
Governance and Records Management
Sensitivity labels
Archiving in Microsoft 365
Retention in Microsoft 365
Retention policies in the Microsoft 365 Compliance Center
Archiving and retention in Exchange
In-place records management in SharePoint
10 - RIGHTS MANAGEMENT AND ENCRYPTION
Information Rights Management (IRM)
Secure Multipurpose Internet Mail Extension (S-MIME)
Office 365 Message Encryption
11 - DATA LOSS PREVENTION
Data loss prevention fundamentals
Create a DLP policy
Customize a DLP policy
Create a DLP policy to protect documents
Policy tips
12 - COMPLIANCE MANAGEMENT
Compliance center
13 - INSIDER RISK MANAGEMENT
Insider Risk
Privileged Access
Information barriers
Building ethical walls in Exchange Online
14 - DISCOVER AND RESPOND
Content Search
Audit Log Investigations
Advanced eDiscovery