YoVDO

MS-101 Manage compliance in Microsoft 365

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Office 365 Courses Data Governance Courses Data Protection Courses Data Classification Courses Email Management Courses

Course Description

Overview

  • Module 1: Manage retention in email
  • By the end of this module, you will be able to:

    • Determine when and how to use retention tags in mailboxes
    • Assign a retention policy to an email folder
    • Add optional retention policies to email messages and folders
    • Remove a retention policy from an email message
  • Module 2: Troubleshoot data governance
  • By the end of this module, you will be able to:

    • Explain how the retention age of elements is calculated
    • Repair retention policies that don't run as expected
    • Understand how to systematically troubleshoot when a retention policy appears to fail
    • Conduct policy tests in test mode with policy tips
    • Describe how to monitor DLP policies through message tracking
  • Module 3: Explore sensitivity labels
  • By the end of this module, you will be able to:

    • Describe how sensitivity labels let you classify and protect your organization's data
    • Identify the common reasons why organizations use sensitivity labels
    • Explain what a sensitivity label is and what they can do for an organization
    • Configure a sensitivity label's scope
    • Explain why the order of sensitivity labels in your admin center is important
    • Describe what label policies can do
  • Module 4: Implement sensitivity labels
  • By the end of this module, you will be able to:

    • Describe the overall process to create, configure, and publish sensitivity labels
    • Identify the administrative permissions that must be assigned to compliance team members to implement sensitivity labels
    • Develop a data classification framework that provides the foundation for your sensitivity labels
    • Create and configure sensitivity labels
    • Publish sensitivity labels by creating a label policy
    • Identify the differences between removing and deleting sensitivity labels
  • Module 5: Implement Windows Information Protection
  • By the end of this module, you will be able to:

    • Describe Windows Information Protection and what it is used for
    • Plan a deployment of Windows Information Protection policies
    • Implement Windows Information Protection policies in Windows desktop apps

Syllabus

  • Module 1: Manage retention in email
    • Introduction
    • Apply personal retention tags to messages and folders
    • Assign a retention policy to an email folder
    • Add optional retention policies
    • Remove a retention policy from an email message
    • Knowledge check
    • Summary
  • Module 2: Troubleshoot data governance
    • Introduction
    • Examine how retention age is calculated
    • Troubleshoot retention policies that fail to run
    • Troubleshoot retention policy tips that do not appear
    • Troubleshoot the transmittal of sensitive data
    • Troubleshoot messaging issues by reviewing message tracking logs
    • Knowledge check
    • Summary
  • Module 3: Explore sensitivity labels
    • Introduction
    • Manage data protection using sensitivity labels
    • Explore what sensitivity labels can do
    • Determine a sensitivity label's scope
    • Explore sensitivity label policies
    • Knowledge check
    • Summary
  • Module 4: Implement sensitivity labels
    • Introduction
    • Examine the requirements to create a sensitivity label
    • Develop a data classification framework for your sensitivity labels
    • Create sensitivity labels
    • Publish sensitivity labels
    • Remove and delete sensitivity labels
    • Knowledge check
    • Summary
  • Module 5: Implement Windows Information Protection
    • Introduction
    • Explore Windows Information Protection
    • Plan for Windows Information Protection
    • Implement Windows Information Protection policies in Windows desktop apps
    • Knowledge check
    • Summary

Tags

Related Courses

Relational Database Support for Data Warehouses
University of Colorado System via Coursera
Compliance in Office 365: Data Governance
Microsoft via edX
Introduction to Data Analytics for Business
University of Colorado Boulder via Coursera
Compliance in Office 365: Data Governance
Microsoft via edX
Microsoft Azure Security Services
Microsoft via edX