theme-sticky-logo-alt
MS-500 Study Guide

MS-500 Study Guide – Microsoft 365 Security Administration

The MS-500 exam is the only exam needed to get the Microsoft 365 Certified: Security Administrator Associate Certification. Candidates for this exam are familiar with M365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance. This role focuses on the M365 environment and includes hybrid environments.

In this MS-500 Study Guide, I will share both free and paid options, whether books, video training or simply links to articles and blog posts. I will not share any dumps as those are against the Microsoft Terms of Service, and by using dumps, we decrease the value of our certifications.

MS-500 Books

MS-500 Study Guide Book

Exam Ref MS-500 Microsoft 365 Security Administration
Prepare for Microsoft Exam MS-500: Demonstrate your real-world knowledge of Microsoft 365 security implementation and administration, including identity, access, threat and information protection, governance, and compliance. Designed for professionals with Microsoft security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft 365 Certified: Security Administrator Associate level.

MS-500 Study Guide Book

Microsoft 365 Security Administration: MS-500 Exam Guide:
This book starts by showing you how to configure and administer identity and access within Microsoft 365. You will learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, the book shows you how RBAC and Azure AD Identity Protection can be used to help you detect risks and secure information in your organization. You will also explore concepts, such as Advanced Threat Protection, Windows Defender ATP, and Threat Intelligence. As you progress, you will learn about additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention, and Cloud App Discovery and Security. The book also ensures you are well prepared to take the exam by giving you the opportunity to work through a mock paper, topic summaries, illustrations that briefly review key points, and real-world scenarios.

MS-500 Video Training

NOTE: Pluralsight is a paid resource unlike Channel9 and Microsoft Virtual Academy which are free. The quality they provide is also superior because of all the quality checks they go through, and the instructors are one of the best in the industry. The Pluralsight courses have a link to where you can get a free trial and decide for yourself if paying a subscription or not is worth it, but the 10-day free trial should allow you to view all those courses for free.

Planning and Designing Microsoft 365 Identity Strategy
After completing this course, you’ll have an understanding of the different components associated with identity management, the types of authentication, the design considerations of directory synchronization, and know how to install Azure AD Connect.

Managing and Synchronizing Microsoft 365 Azure Identities
In this course, you will gain an understanding of how to configure, manage, and monitor the synchronization of user accounts and groups as well as managing passwords and licenses associated with the user.

Implementing Hybrid Threat Solutions with Azure Advanced Threat Protection
This course will teach you Azure Advanced Threat Protection functionality and features.

Protecting Endpoints with Microsoft Defender Advanced Threat Protection
The cyber threat landscape has evolved whereby attackers are using sophistication to attack endpoints. Protecting these endpoints is crucial to any organization. This course will teach you how to deploy, maintain, and monitor Microsoft Defender ATP.

Protecting Devices and Applications in Microsoft 365
This course will teach you how to prepare for the MS-500 certification exam and to secure your devices through Microsoft applications and utilities.

Implementing and Managing Office 365 Advanced Threat Protection
Environments are under constant attacks from constantly changing threats from spam, malware, and phishing attacks. This course will cover everything you need to get Office 365 ATP up and running in your environment.

Managing Governance and Compliance Features in Microsoft 365
In this course, you’ll explore the security and compliance centers inside of Microsoft 365. You’ll learn how to implement, manage, and maintain compliance, governance, and security features of Microsoft 365.

Implementing and Managing Microsoft 365 Information Protection
This course will teach you how to secure your devices through Microsoft 365.

MS-500 Microsoft 365 Security Administration Lectures & Sims
Get prepared for the MS-500 exam with instructor led labs and hands on tutorials available 24/7

Microsoft 365 Security Administration (Exam MS-500)
In this course, students will learn to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments

MS-500 Microsoft 365 Security Administration
Learn all about Microsoft 365 security services and become a Microsoft 365 Certified Security Administrator Associate

Crash Course to pass the M365 MS-500 Security Admin Course
This course is specially built to prepare you for taking the Microsoft 365 Certified Security Admin MS-500 Exam.

MS-500 Microsoft Learn Tutorials / Paths

Those tutorial / paths have been combined by Microsoft and published for free. They contain a collection of text, video, and exercises for this exam.

Protect identity and access with Azure Active Directory
The Identity and Access learning path covers the latest identity and access technologies, tools for strengthening authentication, and guidance on identity protection within your organization. Microsoft access and identity technologies enable you to secure your organization’s identity, whether it is on-premises or in the cloud, and empower your users to work securely from any location.

Defend against threats with Microsoft Threat Protection
The Microsoft Threat Protection learning path covers an introduction to Microsoft Threat Protection and the underlying pillars such as Microsoft Defender Advanced Threat Protection, Office 365 Advanced Threat Protection, and Azure Advanced Threat Protection concepts.

Protect enterprise information with Microsoft 365
Protecting and securing your organization’s information is more challenging than ever. The Protect enterprise information with Microsoft 365 learning path discusses how to protect your sensitive information from accidental oversharing or misuse, how to discover and classify data, how to protect it with sensitivity labels, and how to both monitor and analyze your sensitive information to protect against its loss.

Manage security with Microsoft 365
We live in an always connected, technology-driven world. Efficient security management is the foundation to managing your assets – in the cloud, on-premises, or across a hybrid environment. You need to proactively manage and secure your organization’s identities, devices, end points (both apps and data), and IT infrastructure. Microsoft 365 helps you secure your infrastructure with a focus on visibility, control, and guidance, and helps you consolidate from a plethora of specialized functions and tools, leveraging the shared intelligence, to keep your security teams focused on the most critical insights for their workloads.

MS-500 Instructor-led training (Microsoft Official Courses)

Course MS-500T00-A: Microsoft 365 Security Administration
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.

MS-500 Articles / Blog Posts Per Objective

Implement and manage identity and access (30-35%)

Secure Microsoft 365 hybrid environments

  • plan Azure AD authentication options
  1. Choose the right authentication method for your Azure Active Directory hybrid identity solution
  2. What authentication and verification methods are available in Azure Active Directory?
  3. What is hybrid identity with Azure Active Directory?
  4. Determine identity requirements for your hybrid identity solution
  • plan Azure AD synchronization options
  1. Azure AD Connect sync: Understand and customize synchronization
  2. Getting started with Azure AD Connect using express settings
  3. Custom installation of Azure AD Connect
  4. Hybrid identity and directory synchronization for Microsoft 365
  5. Azure Active Directory Hybrid Identity Design Considerations
  6. Deploy Microsoft 365 Directory Synchronization in Microsoft Azure
  7. How objects and credentials are synchronized in an Azure Active Directory Domain Services managed domain
  8. Set up directory synchronization for Microsoft 365
  • monitor and troubleshoot Azure AD Connect events
  1. Troubleshoot Azure AD connectivity
  2. Troubleshoot object synchronization with Azure AD Connect sync
  3. Azure Active Directory Connect Health operations

Secure Identities

  • implement Azure AD group membership
  1. Create a basic group and add members using Azure Active Directory
  2. Create or update a dynamic group in Azure Active Directory
  3. Dynamic membership rules for groups in Azure Active Directory
  4. Create a dynamic group and check status
  • implement password management
  1. Plan an Azure Active Directory self-service password reset deployment
  2. Tutorial: Enable users to unlock their account or reset passwords using Azure Active Directory self-service password reset
  3. Let users reset their own passwords
  4. How it works: Azure AD self-service password reset
  5. Password policies and account restrictions in Azure Active Directory
  • configure and manage identity governance
  1. What is Azure AD Identity Governance?
  2. Manage user access with Azure AD access reviews

Implement authentication methods

  • plan sign-on security
  1. What are security defaults?
  2. What is single sign-on (SSO)?
  3. Determine multi-factor authentication requirements for your hybrid identity solution
  • implement multi-factor authentication (MFA)
  1. Overview of Azure Multi-Factor Authentication for your organization
  2. Set up multi-factor authentication
  3. Tutorial: Secure user sign-in events with Azure Multi-Factor Authentication
  4. Features and licenses for Azure Multi-Factor Authentication
  • manage and monitor MFA
  1. Manage user settings for Azure Multi-Factor Authentication
  2. Use the sign-ins report to review Azure Multi-Factor Authentication events
  3. Change your two-factor verification method and settings
  4. Monitor identity and access
  • plan and implement device authentication methods like Windows Hello
  1. Plan a passwordless authentication deployment in Azure Active Directory
  2. Planning a Windows Hello for Business Deployment
  3. Move away from passwords, deploy Windows Hello. Today!
  • configure and manage Azure AD user authentication options
  1. What authentication and verification methods are available in Azure Active Directory?
  2. Azure Active Directory Authentication documentation

Implement conditional access

  • plan for compliance and conditional access policies
  1. Plan a Conditional Access deployment
  2. What are common ways to use Conditional Access with Intune?
  3. What are conditions in Azure Active Directory Conditional Access?
  4. Building a Conditional Access policy
  5. Best practices for Conditional Access in Azure Active Directory
  • configure and manage device compliance for endpoint security
  1. Manage endpoint security in Microsoft Intune
  2. Use compliance policies to set rules for devices you manage with Intune
  3. Manage devices with endpoint security in Microsoft Intune
  4. Create a compliance policy in Microsoft Intune
  • implement and manage conditional access
  1. Common Conditional Access policies

Implement role-based access control (RBAC)

  • plan for roles
  1. What is Azure role-based access control (Azure RBAC)?
  2. Best practices for Azure RBAC
  • configure roles
  1. Create or update Azure custom roles using the Azure portal
  2. Assign Azure roles using the Azure portal
  3. Assign Azure roles using Azure PowerShell
  4. Azure built-in roles
  5. Azure custom roles
  • audit roles
  1. View activity logs for Azure RBAC changes

Implement Azure AD Privileged Identity Management (PIM)

  • plan for Azure PIM
  1. Deploy Azure AD Privileged Identity Management (PIM)
  2. What is Azure AD Privileged Identity Management?
  3. Securing privileged access for hybrid and cloud deployments in Azure AD
  4. Start using Privileged Identity Management
  • implement and configure Azure PIM roles
  1. Configure Azure AD role settings in Privileged Identity Management
  2. Configure Azure resource role settings in Privileged Identity Management
  3. Delegate access to Privileged Identity Management
  • manage Azure PIM role assignments
  1. Assign Azure AD roles in Privileged Identity Management
  2. Assign Azure resource roles in Privileged Identity Management
  3. Management capabilities for Azure AD roles in Privileged Identity Management
  4. Activate my Azure AD roles in PIM

Implement Azure AD Identity Protection

  • implement user risk policy
  1. How To: Configure and enable risk policies
  2. Identity Protection policies
  3. Tutorial: Use risk detections for user sign-ins to trigger Azure Multi-Factor Authentication or password changes
  4. Conditional Access: Sign-in risk-based Conditional Access
  5. Remediate risks and unblock users
  • implement sign-in risk policy
  1. How To: Configure and enable risk policies
  • configure Identity Protection alerts
  1. How To: Configure risk policies in Azure Active Directory identity protection
  2. Quickstart: Block access when a session risk is detected with Azure Active Directory Identity Protection
  3. Azure Active Directory Identity Protection notifications
  • review and respond to risk events
  1. Users flagged for risk report in the Azure portal
  2. Simulating risk detections in Identity Protection
  3. Remediate risks and unblock users

Implement and manage threat protection (20-25%)

Implement an enterprise hybrid threat protection solution

  • plan a Microsoft Defender for Identity solution
  1. What is Microsoft Defender for Identity?
  2. Microsoft Defender for Identity documentation
  3. Microsoft Defender for Identity prerequisites
  4. Plan capacity for Microsoft Defender for Identity
  • install and configure Microsoft Defender for Identity
  1. Quickstart: Create your Microsoft Defender for Identity instance
  2. Quickstart: Connect to your Active Directory Forest
  3. Quickstart: Download the Microsoft Defender for Identity sensor setup package
  4. Quickstart: Install the Microsoft Defender for Identity sensor
  • monitor and manage Microsoft Defender for Identity
  1. Work with Microsoft Defender for Identity health and events
  2. Working with the Microsoft Defender for Identity portal

Implement device threat protection

  • plan a Microsoft Defender for Endpoint solution
  1. Microsoft Defender for Endpoint
  2. Prepare Microsoft Defender for Endpoint deployment
  3. Minimum requirements for Microsoft Defender for Endpoint
  4. Plan your Microsoft Defender for Endpoint deployment
  • implement Microsoft Defender for Endpoint
  1. Set up Microsoft Defender for Endpoint deployment
  2. Configure advanced features in Defender for Endpoint
  • manage and monitor Microsoft For Endpoint
  1. Manage Microsoft Defender for Endpoint alerts
  2. Check the Microsoft Defender for Endpoint service health

Implement and manage device and application protection

  • plan for device and application protection
  1. What are app protection policies?
  2. App protection policies overview
  3. How to create and assign app protection policies
  • configure and manage Windows Defender Application Guard
  1. Microsoft Defender Application Guard overview
  2. Create and deploy Microsoft Defender Application Guard policy
  3. Configure Microsoft Defender Application Guard policy settings
  4. System requirements for Microsoft Defender Application Guard
  5. Application Guard testing scenarios
  • configure and manage Windows Defender Application Control
  1. Windows Defender Application Control
  2. Windows Defender Application Control and virtualization-based protection of code integrity
  3. Deploy Windows Defender Application Control policies by using Group Policy
  4. Application Control for Windows
  5. Windows Defender Application Control management with Configuration Manager
  6. Deploy Windows Defender Application Control policies by using Microsoft Intune
  7. Manage Packaged Apps with Windows Defender Application Control
  • configure and manage Windows Defender Exploit Guard
  1. Create and deploy an Exploit Guard policy
  2. Protect devices from exploits
  3. Import, export, and deploy exploit protection configurations
  • configure Secure Boot
  1. Secure boot
  2. Secure the Windows 10 boot process
  • configure and manage Windows device encryption
  1. Overview of BitLocker Device Encryption in Windows 10
  2. BitLocker
  • plan for securing applications data on devices
  1. Protect your data in files, apps, and devices
  2. Prevent data leaks on non-managed devices using Microsoft Intune
  3. Microsoft Intune planning guide
  • implement application protection policies
  1. App protection policies overview
  2. Frequently asked questions about MAM and app protection
  3. Data protection framework using app protection policies
  4. Android app protection policy settings in Microsoft Intune
  5. Application protection policies and work profiles on Android Enterprise devices in Intune

Implement and manage Microsoft Defender for Office 365

  • configure Microsoft Defender for Office 365
  1. Microsoft 365 Defender
  2. Office 365 Security overview
  3. Set up Safe Attachments policies in Microsoft Defender for Office 365
  4. Set up Safe Links policies in Microsoft Defender for Office 365
  5. Recommended settings for EOP and Microsoft Defender for Office 365 security
  • monitor Microsoft Defender for Office 365
  1. Security Dashboard
  • conduct simulated attacks using Attack Simulator
  1. Attack Simulator in Microsoft Defender for Office 365

Monitor Microsoft 365 Security with Azure Sentinel

  • plan and implement Azure Sentinel
  1. Microsoft Azure Sentinel overview
  2. What is Azure Sentinel?
  3. Quickstart: On-board Azure Sentinel
  • configure playbooks in Azure Sentinel
  1. Tutorial: Use playbooks with automation rules in Azure Sentinel
  • manage and monitor Azure Sentinel
  1. Tutorial: Visualize and monitor your data
  • respond to threats in Azure Sentinel
  1. Tutorial: Detect threats out-of-the-box
  2. Tutorial: Create custom analytics rules to detect threats
  3. Tutorial: Use playbooks with automation rules in Azure Sentinel

Implement and manage information protection (15-20%)

Secure data access within Office 365

  • implement and manage Customer Lockbox
  1. Customer Lockbox in Office 365
  • configure data access in Office 365 collaboration workloads
  1. Microsoft 365 inter-tenant collaboration
  2. Office 365 external sharing and Azure Active Directory (Azure AD) B2B collaboration
  • configure B2B sharing for external users
  1. What is guest user access in Azure Active Directory B2B?
  2. Enable B2B external collaboration and manage who can invite guests

Manage Azure information Protection (AIP)

  • plan a sensitivity label solution
  1. What is Azure Information Protection?
  2. Requirements for Azure Information Protection
  3. Azure Information Protection requirements
  4. Azure Information Protection deployment roadmap
  5. Tutorial: Configure Azure Information Protection policy settings and create a new label
  • configure Sensitivity labels and policies
  1. Learn about sensitivity labels
  2. Use sensitivity labels in Office apps
  3. How to migrate Azure Information Protection labels to unified sensitivity labels
  4. Enable sensitivity labels for Office files in SharePoint and OneDrive
  5. Create and configure sensitivity labels and their policies
  6. Get started with sensitivity labels
  7. Restrict access to content by using sensitivity labels to apply encryption
  8. Apply a sensitivity label to content automatically
  • deploy the RMS connector
  1. Deploying the Azure Rights Management connector
  2. Installing and configuring the Azure Rights Management connector
  3. Configuring servers for the Azure Rights Management connector
  • manage tenant keys
  1. Operations for your Azure Information Protection tenant key
  2. Microsoft-managed: Tenant key life cycle operations
  3. Customer-managed: Tenant key life cycle operations
  4. Bring your own key (BYOK) details for Azure Information Protection
  • configure and use label analytics
  1. Analytics and central reporting for Azure Information Protection
  • use sensitivity labels with Teams, Sharepoint, OneDrive and Office apps
  1. Use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 groups, and SharePoint sites

Manage Data Loss Prevention (DLP)

  • plan a DLP solution
  1. Overview of data loss prevention
  • create and manage DLP policies
  1. Get started with the default DLP policy
  2. Create a DLP policy from a template
  3. Create, test, and tune a DLP policy
  4. Get started with the data loss prevention on-premises scanner
  • create and manage sensitive information types
  1. Custom sensitive information types
  2. Create a custom sensitive information type in the Security & Compliance Center
  3. Create a custom sensitive information type in Security & Compliance Center PowerShell
  4. Sensitive information type entity definitions
  5. Create custom sensitive information types with Exact Data Match based classification
  6. Customize a built-in sensitive information type
  7. Create a sensitive information type policy for your organization using Message Encryption
  • monitor DLP reports
  1. View the reports for data loss prevention
  • manage DLP notifications
  1. Send email notifications and show policy tips for DLP policies

Implement and manage Microsoft Cloud App Security

  • plan Cloud App Security implementation
  1. Quickstart: Get started with Microsoft Cloud App Security
  2. Basic setup for Cloud App Security
  3. What are the differences between Microsoft Cloud App Security and Office 365 Cloud App Security?
  4. Connect Microsoft 365 to Microsoft Cloud App Security
  • configure Microsoft Cloud App Security
  1. Security configuration overview
  • manage cloud app discovery
  1. Set up Cloud Discovery
  2. Working with discovered apps
  3. Discovered app filters and queries
  4. Create Cloud Discovery policies
  • manage entries in the Cloud app catalog
  1. Add custom apps to Cloud Discovery
  • manage apps in Cloud App Security
  1. Connect apps
  2. Control cloud apps with policies
  • configure Cloud App Security connectors and Oauth apps
  1. Manage OAuth apps
  2. Tutorial: Investigate risky OAuth apps
  3. OAuth app policies
  • configure Cloud App Security policies and templates
  1. Policy template reference
  2. Access policies
  3. Activity policies
  4. File policies
  5. Information protection policies
  • review, interpret and respond to Cloud App Security alerts, reports, dashboards and logs
  1. Monitor alerts in Cloud App Security
  2. Get behavioral analytics and anomaly detection
  3. Create snapshot Cloud Discovery reports
  4. Generate data management reports

Manage governance and compliance features in Microsoft 365 (25-30%)

Configure and analyze security reporting

  • monitor and manage device security status using Microsoft Endpoint Manager Admin Center
  1. Monitor security baselines and profiles in Microsoft Intune
  2. Device management overview
  • manage and monitor security reports and dashboards using Microsoft 365 Security Center
  1. Overview of the Microsoft 365 security center
  2. Reports in the Security & Compliance Center
  3. Security Dashboard
  4. Smart reports and insights in the Security & Compliance Center
  5. App monitoring and reporting in the Microsoft 365 security center
  6. View email security reports in the Security & Compliance Center
  • plan for custom security reporting with Graph Security API
  1. Use the Microsoft Graph Security API
  • use secure score dashboards to review actions and recommendations
  1. Microsoft Secure Score
  2. Assess your security posture with Microsoft Secure Score
  • configure alert policies in the Security & Compliance admin center
  1. Alert policies in the security and compliance center

Manage and analyze audit logs and reports

  • plan for auditing and reporting
  1. Auditing and Reporting in Microsoft cloud services
  2. Auditing in Office 365 (for Admins)
  3. Turn audit log search on or off
  • perform audit log search
  1. Turn audit log search on or off
  2. Search the audit log to investigate common support issues
  3. Detailed properties in the audit log
  4. Search the audit log for events in Microsoft Teams
  • review and interpret compliance reports and dashboards
  1. Microsoft Compliance Manager
  2. Reports in the Security & Compliance Center
  • configure audit alert policy
  1. Alert policies in the security and compliance center
  2. Manage audit log retention policies

Manage data governance and retention

  • plan for data governance and retention
  1. Data governance and retention in your Microsoft 365 tenant—a secure and highly capable solution
  2. Microsoft Information Governance in Microsoft 365
  3. Get started with retention policies and retention labels
  • review and interpret data governance reports and dashboards
  1. View the data governance reports
  2. Smart reports and insights in the Security & Compliance Center
  • configure retention policies
  1. Create and configure retention policies
  2. Set up an archive and deletion policy for mailboxes in your organization
  3. Retention policies in Microsoft Teams
  4. Learn about retention for Microsoft Teams
  • define data governance event types
  1. Start retention when an event occurs
  • define data governance supervision policies
  1. Learn about communication compliance in Microsoft 365
  2. Get started with communication compliance
  • configure Information holds
  1. In-Place Hold and Litigation Hold
  2. How to identify the type of hold placed on an Exchange Online mailbox
  3. Create a Litigation Hold
  4. Manage holds in Advanced eDiscovery
  • find and recover deleted Office 365 data
  1. Recover deleted items in a user mailbox
  • configure data archiving
  1. Enable archive mailboxes in the Security & Compliance Center
  2. Archive features in Exchange Online Archiving
  3. Overview of unlimited archiving
  4. Enable unlimited archiving – Admin Help
  • manage inactive mailboxes
  1. Create and manage inactive mailboxes
  2. Overview of inactive mailboxes
  3. Recover an inactive mailbox
  4. Delete an inactive mailbox
  5. Restore an inactive mailbox

Manage search and investigation

  • plan for content search and eDiscovery
  1. eDiscovery in Microsoft 365
  2. Content Search
  3. Limits for Content Search in the Security & Compliance Center
  • search for personal data
  1. Search for and find personal data
  • monitor for leaks of personal data
  1. Monitor for leaks of personal data
  • delegate permissions to use search and discovery tools
  1. Assign eDiscovery permissions in the Security & Compliance Center
  • use search and investigation tools to perform content searches
  1. Overview of Microsoft 365 Advanced eDiscovery
  2. Conduct an eDiscovery investigation of content in Microsoft Teams
  3. Content Search
  • export content search results
  1. Export Content Search results
  2. Export a Content Search report
  3. Export content from a Core eDiscovery case
  • manage eDiscovery cases
  1. Get started with Core eDiscovery
  2. Set up Microsoft 365 Advanced eDiscovery
  3. Manage legal investigations in Microsoft 365
  4. Create an eDiscovery hold
  5. Close, reopen, and delete a Core eDiscovery case
  6. Add custodians to an Advanced eDiscovery case

Manage data privacy regulation compliance

  • plan for regulatory compliance in Microsoft 365
  1. Microsoft compliance offerings
  • review and interpret GDPR dashboards and reports
  1. GDPR discovery, protection, and reporting in the dev/test environment
  2. New Microsoft 365 features to accelerate GDPR compliance
  • manage Data Subject Requests (DSRs)
  1. Data Subject Requests and the GDPR and CCPA
  • administer Compliance Manager
  1. Compliance Manager quickstart
  • review Compliance Manager reports
  1. Use Compliance Manager to manage improvement actions
  • create and perform Compliance Manager assessments and action items
  1. Build and manage assessments in Compliance Manager
15 49.0138 8.38624 1 0 4000 1 https://vladtalkstech.com 300 1