Copilot for Microsoft 365 for Administrators
$559.00
Course ID: AI-10035
Duration (Days): 1.0
Please contact us for additional details and scheduling options.
Contact UsThis course starts by introducing the design of Microsoft Copilot for Microsoft 365, focusing on the essential security and compliance settings that administrators need to configure within their Microsoft 365 environment to safeguard organizational data before deploying Copilot.
This course provides a focused overview of the Microsoft Copilot for Microsoft 365 design, with a particular emphasis on the security and compliance aspects that administrators must address within their Microsoft 365 environment. Participants will learn about key components of Copilot and how to prepare their systems by implementing necessary data protection measures. The course guides administrators through the process of securing user access, managing roles, and applying data classification and sensitivity labels, ensuring their Microsoft 365 tenant is properly secured before deploying Copilot for Microsoft 365.
Course Outline
##### Module 1 - Examine the Copilot for Microsoft 365 design
- Examine the Copilot for Microsoft 365 logical architecture
- Examine the key components of Copilot for Microsoft 365
- Explore the Copilot for Microsoft 365 service and tenant architecture
- Extend Copilot for Microsoft 365 with Microsoft Graph connectors
##### Module 2 - Implement Copilot for Microsoft 365
- Get ready for Copilot for Microsoft 365
- Prepare your data for searches in Copilot for Microsoft 365
- Protect your Copilot for Microsoft 365 data with Microsoft 365 security tools
- Assign your Copilot for Microsoft 365 licenses
- Drive Copilot for Microsoft 365 adoption with a Copilot Center of Excellence
##### Module 3 - Examine data security and compliance in Copilot for Microsoft 365
- Examine how Copilot for Microsoft 365 uses your proprietary business data
- Examine how Copilot for Microsoft 365 protects sensitive business data
- Examine how Copilot for Microsoft 365 uses Microsoft 365 isolation and access controls
- Examine how Copilot for Microsoft 365 meets regulatory compliance mandates
##### Module 4 - Manage secure user access in Microsoft 365
- Examine the identity and access tools used in Microsoft 365
- Manage user passwords
- Implement Conditional Access policies
- Enable pass-through authentication
- Implement multifactor authentication
- Enable passwordless sign-in with Microsoft Authenticator
- Explore self-service password management
- Explore Windows Hello for Business
- Implement Microsoft Entra Smart Lockout
- Explore Security Defaults in Microsoft Entra ID
- Investigate authentication issues using sign-in logs
##### Module 5 - Manage roles and role groups in Microsoft 365
- Examine the use of roles in the Microsoft 365 permission model
- Manage roles across the Microsoft 365 ecosystem
- Explore administrator roles in Microsoft 365
- Examine best practices when configuring administrative roles
- Assign admin roles to users in Microsoft 365
- Delegate admin roles to partners
- Implement role groups in Microsoft 365
- Manage permissions using administrative units in Microsoft Entra ID
- Elevate privileges using Microsoft Entra Privileged Identity Management
##### Module 6 - Explore threat intelligence in Microsoft Defender XDR
- Explore Microsoft Intelligent Security Graph
- Explore alert policies in Microsoft 365
- Run automated investigations and responses
- Explore threat hunting with Microsoft Threat Protection
- Explore advanced threat hunting in Microsoft Defender XDR
- Explore threat analytics in Microsoft 365
- Identify threat issues using Microsoft Defender reports
##### Module 7 - Implement data classification of sensitive information
- Explore data classification
- Implement data classification in Microsoft 365
- Explore trainable classifiers
- Create and retrain a trainable classifier
- View sensitive data using Content explorer and Activity explorer
- Detect sensitive information documents using Document Fingerprinting
##### Module 8 - Explore sensitivity labels
- Manage data protection using sensitivity labels
- Explore what sensitivity labels can do
- Determine a sensitivity label\'s scope
- Apply sensitivity labels automatically
- Explore sensitivity label policies
##### Module 9 - Implement sensitivity labels
- Plan your deployment strategy for sensitivity labels
- Examine the requirements to create a sensitivity label
- Create sensitivity labels
- Publish sensitivity labels
- Remove and delete sensitivity labels