Helion


Szczegóły ebooka

Microsoft Information Protection Administrator SC-400 Certification Guide

Microsoft Information Protection Administrator SC-400 Certification Guide


Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance.

Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you'll be able to take mock tests to help you prepare effectively for the exam.

By the end of this Microsoft book, you'll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.

  • Microsoft Information Protection Administrator SC-400 Certification Guide
  • Foreword
  • Contributors
  • About the authors
  • About the reviewer
  • Preface
    • Who this book is for
    • What this book covers
    • To get the most out of this book
    • Download the color images
    • Conventions used
    • Get in touch
    • Reviews
    • Share Your Thoughts
  • Section 1: Exam Overview and Introduction to Information Protection
  • Chapter 1: Preparing for Your Microsoft Exam and SC-400 Exam Objectives
    • Technical requirements
    • Preparing for a Microsoft exam
      • Accessing resources to prepare for the exam
      • How to access a Microsoft 365 subscription
      • Exam locations
      • Microsoft exam format
    • Accessing resources and Microsoft Learn
      • Accessing Microsoft Learn
      • Microsoft exam information pages
    • Creating a Microsoft 365 trial account
      • Microsoft 365 or Office 365 trial subscription
      • Obtaining the relevant license
    • Introducing the SC-400 exam objectives
    • Why should I take this exam?
    • Summary
  • Chapter 2: Introduction to Information Protection
    • Technical requirements
    • What is Information Protection?
      • Identify your data
      • Provide protection for your data
      • Govern your data
    • Information protection use cases
    • Understanding the scope of Information Protection
    • Why is Information Protection important?
    • What are the benefits of implementing Information Protection in your organization?
    • Summary
  • Section 2: Implementing Information Protection
  • Chapter 3: Creating and Managing Sensitive Information Types
    • Technical requirements
      • Accessing the Microsoft 365 compliance center
    • Selecting a sensitive information type based on an organizations requirements
      • Sensitive information type components
      • Custom sensitive information type features
    • Creating and managing custom sensitive information types
      • Testing a sensitive information type
      • Modifying custom sensitive information types in the compliance center
      • Removing custom sensitive information types in the compliance center
    • Creating custom sensitive information types with exact data matches
      • Saving sensitive data in .csv or .tsv file format
      • Defining the schema for your database of sensitive information
      • Setting up a rule package
      • Modifying the schema for EDM-based classification
      • Removing the schema for EDM-based classification
    • Implementing document fingerprinting
    • Creating a keyword dictionary
      • Building a keyword dictionary using the Security & Compliance Center
      • Creating a keyword dictionary from a file using PowerShell
    • Summary
  • Chapter 4: Creating and Managing Trainable Classifiers
    • Technical requirements
    • What are trainable classifiers?
      • Pretrained classifiers
      • Custom classifiers
    • Identifying when to use trainable classifiers
    • Creating a trainable classifier
    • Verifying that a trainable classifier is performing properly
    • Retraining a classifier
    • Summary
  • Chapter 5: Implementing and Managing Sensitivity Labels
    • Technical requirements
    • Identifying roles and permissions for administering sensitivity labels
      • Security & Compliance Center permissions
      • Relationship between roles, members, and role groups
      • Role groups within the Security and Compliance Center
      • Providing users with access to the Security and Compliance Center
      • Utilizing the Security and Compliance Center PowerShell to grant another user permission to the Security and Compliance Center
    • Creating and managing sensitivity labels and applying sensitivity labels to Microsoft SaaS applications
      • Applying labels to SharePoint Online and Microsoft 365 Groups
    • Configuring automatic labeling policies and monitoring label usage
      • Creating an auto-labeling policy
      • Monitoring information protection
    • Applying bulk classification to on-premises data and managing protection settings
      • Unified the labeling scanner
      • Unified labeling best practice requirements
      • Configuring on-premises labeling
      • Utilizing label analytics to monitor label performance
    • Applying and managing protections and restrictions
      • Manual label application
      • Utilizing auto-apply to apply labels by default
    • Summary
  • Chapter 6: Planning and Implementing Encryption for Email Messages
    • Technical requirements
    • Introduction to encryption in Microsoft 365
      • BitLocker and how it encrypts data at rest
      • Service encryption
    • Defining requirements for implementing Office 365 Advanced Message Encryption
    • Implementing Office 365 Advanced Message Encryption
      • Using mail flow rules to apply OME templates
    • Summary
  • Section 3: Implementing Data Loss Prevention
  • Chapter 7: Creating and Configuring Data Loss Prevention Policies
    • Technical requirements
    • Configuring data loss prevention for policy precedence
      • Amending rule priority
      • Amending policy priority
    • Configuring policies for Exchange Online, SharePoint sites, OneDrive, and Microsoft Teams
      • Custom DLP policy in Exchange Online
      • Custom DLP policy with SharePoint sites, OneDrive, and Microsoft Teams
    • Integrating Information Protection with, and configuring policies in Microsoft Defender for Cloud Apps
      • Configuring file policies in Microsoft Defender for Cloud Apps
    • Implementing data loss prevention policies in test mode
      • Enabling test mode in an existing DLP policy
      • DLP rule user notifications
      • DLP rule incident reports
    • Summary
  • Chapter 8: Implementing and Monitoring Microsoft Endpoint Data Loss Prevention
    • Technical requirements
    • Onboarding devices to Endpoint DLP
    • Configuring Endpoint DLP settings
    • Configuring policies for endpoints
    • Monitoring endpoint activities
    • Summary
  • Chapter 9: Managing and Monitoring Data Loss Prevention Policies and Activities
    • Technical requirements
    • Managing and responding to DLP policy violations
      • Implementing DLP rule exclusion
    • Reviewing and analyzing DLP reports
      • Reviewing DLP policy matches
      • Reviewing DLP incidents
      • Reviewing DLP false positives and overrides
    • Managing permissions for DLP reports
    • Managing DLP violations in Microsoft Defender for Cloud Apps
    • Summary
  • Section 4: Implementing Information Governance
  • Chapter 10: Configuring Retention Policies and Labels
    • Technical requirements
    • Creating and applying retention label policies
      • Configuring retention policies
    • Creating and applying retention labels
    • Configuring and publishing auto-apply label policies
    • Summary
  • Chapter 11: Managing Data Retention in Microsoft 365
    • Technical requirements
    • Creating and applying retention policies in Microsoft SharePoint and OneDrive
      • Preservation Hold Library functionality
      • Retention with document versioning how it works
      • Configuring a retention policy for SharePoint Online and OneDrive for Business
    • Creating and applying retention policies in Microsoft Teams
      • Retention functionality with Teams
    • Recovering content in SharePoint and OneDrive
      • OneDrive for Business
      • SharePoint Online
      • Previous versions
    • Implementing retention policies and tags in Microsoft Exchange
      • How to create a new retention tag
      • Modifying the default retention policy
    • Applying mailbox holds in Microsoft Exchange
      • Applying a litigation hold
    • Implementing Microsoft Exchange Online archiving policies
    • Summary
  • Chapter 12: Implementing Records Management in Microsoft 365
    • Technical requirements
    • Configuring labels for records management
    • Managing and migrating retention requirements with a file plan
    • Configuring automatic retention using file plan descriptors
    • Implementing in-place records management in Microsoft SharePoint
    • Configuring event-based retention
    • Managing the disposition of records
      • Viewing and disposing of content
    • Summary
  • Practice Exam
    • Test questions
    • Answer key
    • Why subscribe?
  • Other Books You May Enjoy
    • Packt is searching for authors like you
    • Share Your Thoughts