See how Insoft Services is responding to COVID-19

MS-500T04-A: Administering Microsoft 365 Built-in Compliance

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


  • MS-500T04-A: Administering Microsoft 365 Built-in Compliance
    1 days  (Instructor Led Online)  |  Microsoft 365 - Security Administrator

    Course Details

    Internal policies and external requirements for data retention and investigation may be necessary for your organisation. In this Administering Microsoft 365 Built-in Compliance (MS-500T04-A) course, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. Specifically, this course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations. The course also helps your organisation prepare for Global Data Protection Regulation (GDPR).

    This training already retired on 29th of May 2020.

     

    See other Microsoft courses

    Outline

    Module 1: Archiving and Retention

    This module explains concepts related to retention and archiving of data for Microsoft 365 including Exchange and SharePoint.

    Lessons

    • Archiving in Microsoft 365
    • Retention in Microsoft 365
    • Retention Policies in the Security and Compliance Center
    • Archiving and Retention in Exchange
    • In-place Records Management in SharePoint
    • Lab: Archiving and Retention
    • Create and license users in your organisation
    • Configure Retention Tags and Policies
    • MRM Retention Policies

    After completing this module, you should be able to:

    • Describe Data Governance in Microsoft 365.
    • Describe the difference between the In-Place Archive and Records Management.
    • Explain how data is archived in Exchange.
    • Recognize the benefits of In-Place Records Management in SharePoint.
    • Explain the difference between Message Records Management (MRM) in Exchange and Retention in Security and Compliance Center.
    • Explain how a retention policy works.
    • Create a retention policy.
    • Enable and disable In-Place Archiving.
    • Create useful retention tags.

     

    Module 2: Data Governance in Microsoft 365

    This module focuses on data governance in Microsoft 365. The module will introduce you to the Compliance Manager and discuss GDPR.

    Lessons

    • Planning Security and Compliance Needs
    • Building Ethical Walls in Exchange Online
    • Manage Retention in Email
    • Troubleshooting Data Governance
    • Analytics and Telemetry

    After completing this module, you should be able to:

    • Plan security and compliance roles.
    • Describe what you need to consider for GDPR.
    • Describe what an ethical wall in Exchange is and how it works.
    • Work with retention tags in mailboxes
    • Describe retention policies with email messages and email folders
    • Explain how the retention age of elements is calculated.
    • Repair retention policies that do not run as expected.

     

    Module 3: Managing Search and Investigations

    This module is focused on content searching and investigations. Specifically, it covers how to use eDiscovery to conduct advanced investigations of Microsoft 365 data. It also covers audit logs and discusses GDPR data subject requests.

    Lessons

    • Searching for Content in the Security and Compliance Center
    • Audit Log Investigations
    • Advanced eDiscovery
    • Lab: eDiscovery
    • Create and license users in your organisation
    • Investigate your Microsoft 365 Data

    After completing this module, you should be able to:

    • Describe how to use a content search.
    • Designing your content search.
    • Configuring search permission filtering.
    • Describe what the audit log is and the permissions that are necessary to search the Office 365 audit log.
    • Configure Audit Policies.
    • Enter criteria for searching the audit log.
    • Export search results to a CSV file.
    • Describe what Advanced eDiscovery is and what requirements are needed.
    • Analyze data in Advanced eDiscovery.
    • Viewing the Advanced eDiscovery event log.
    • Use Express Analytics.

    Target Audience

    This course is for the Microsoft 365 security administrator role. This role collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organisation.

    This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance.

    The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and has strong skills and experience with identity protection, information protection, threat protection, security management and data governance. This role focuses on the Microsoft 365 environment and includes hybrid environments.

    Prerequisites

    Before attending the Administering Microsoft 365 Built-in Compliance (MS-500T04-A) course, students must have the following skills:

    • Basic conceptual understanding of Microsoft Azure
    • Experience with Windows 10 devices
    • Experience with Office 365
    • Basic understanding of authorization and authentication
    • Basic understanding of computer networks
    • Working knowledge of managing mobile devices