Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
- Length: 326 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2022-02-10
- ISBN-10: 1801811490
- ISBN-13: 9781801811491
- Sales Rank: #219424 (See Top 100 Books)
Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365
Key Features
- Design, implement, and administer Microsoft Information Protection
- Implement data loss prevention to minimize the risk of data exfiltration
- Use Information Governance capabilities to ensure that data is stored in your environment for as long as necessary
Book Description
Cloud technologies have massively increased the amount of data being produced and the places in which this data is stored. Without proper planning and discipline in configuring information protection for your data, you may be compromising information and regulatory compliance.
Microsoft Information Protection Administrator SC-400 Certification Guide begins with an overview of the SC-400 exam, and then enables you to envision, implement, and administer the Information Protection suite offered by Microsoft. The book also provides you with hands-on labs, along with the theory of creating policies and rules for content classification, data loss prevention, governance, and protection. Toward the end, you’ll be able to take mock tests to help you prepare effectively for the exam.
By the end of this Microsoft book, you’ll have covered everything needed to pass the SC-400 certification exam, and have a handy, on-the-job desktop reference guide.
What you will learn
- Understand core exam objectives to pass the SC-400 exam with ease
- Find out how to create and manage sensitive information types for different types of data
- Create and manage policies and learn how to apply these to Microsoft 365 SaaS applications
- Broaden your knowledge of data protection on M365
- Discover how to configure and manage the protection of your data in M365
- Monitor activity regarding data access in M365
- Understand and implement Data Governance in M365
Who this book is for
If you are a compliance administrator, Microsoft 365 Administrator, or Information Protection Administrator who wants to improve their knowledge of Microsoft Security & Compliance services, then this book is for you. This book is also ideal for anyone looking to achieve the SC-400 Information Protection Associate Administrator certification.
Microsoft Information Protection Administrator SC-400 Certification Guide Foreword Contributors About the authors About the reviewer Preface Who this book is for What this book covers To get the most out of this book Download the color images Conventions used Get in touch Reviews Share Your Thoughts Section 1: Exam Overview and Introduction to Information Protection Chapter 1: Preparing for Your Microsoft Exam and SC-400 Exam Objectives Technical requirements Preparing for a Microsoft exam Accessing resources to prepare for the exam How to access a Microsoft 365 subscription Exam locations Microsoft exam format Accessing resources and Microsoft Learn Accessing Microsoft Learn Microsoft exam information pages Creating a Microsoft 365 trial account Microsoft 365 or Office 365 trial subscription Obtaining the relevant license Introducing the SC-400 exam objectives Why should I take this exam? Summary Chapter 2: Introduction to Information Protection Technical requirements What is Information Protection? Identify your data Provide protection for your data Govern your data Information protection use cases Understanding the scope of Information Protection Why is Information Protection important? What are the benefits of implementing Information Protection in your organization? Summary Section 2: Implementing Information Protection Chapter 3: Creating and Managing Sensitive Information Types Technical requirements Accessing the Microsoft 365 compliance center Selecting a sensitive information type based on an organization's requirements Sensitive information type components Custom sensitive information type features Creating and managing custom sensitive information types Testing a sensitive information type Modifying custom sensitive information types in the compliance center Removing custom sensitive information types in the compliance center Creating custom sensitive information types with exact data matches Saving sensitive data in .csv or .tsv file format Defining the schema for your database of sensitive information Setting up a rule package Modifying the schema for EDM-based classification Removing the schema for EDM-based classification Implementing document fingerprinting Creating a keyword dictionary Building a keyword dictionary using the Security & Compliance Center Creating a keyword dictionary from a file using PowerShell Summary Chapter 4: Creating and Managing Trainable Classifiers Technical requirements What are trainable classifiers? Pretrained classifiers Custom classifiers Identifying when to use trainable classifiers Creating a trainable classifier Verifying that a trainable classifier is performing properly Retraining a classifier Summary Chapter 5: Implementing and Managing Sensitivity Labels Technical requirements Identifying roles and permissions for administering sensitivity labels Security & Compliance Center permissions Relationship between roles, members, and role groups Role groups within the Security and Compliance Center Providing users with access to the Security and Compliance Center Utilizing the Security and Compliance Center PowerShell to grant another user permission to the Security and Compliance Center Creating and managing sensitivity labels and applying sensitivity labels to Microsoft SaaS applications Applying labels to SharePoint Online and Microsoft 365 Groups Configuring automatic labeling policies and monitoring label usage Creating an auto-labeling policy Monitoring information protection Applying bulk classification to on-premises data and managing protection settings Unified the labeling scanner Unified labeling best practice requirements Configuring on-premises labeling Utilizing label analytics to monitor label performance Applying and managing protections and restrictions Manual label application Utilizing auto-apply to apply labels by default Summary Chapter 6: Planning and Implementing Encryption for Email Messages Technical requirements Introduction to encryption in Microsoft 365 BitLocker and how it encrypts data at rest Service encryption Defining requirements for implementing Office 365 Advanced Message Encryption Implementing Office 365 Advanced Message Encryption Using mail flow rules to apply OME templates Summary Section 3: Implementing Data Loss Prevention Chapter 7: Creating and Configuring Data Loss Prevention Policies Technical requirements Configuring data loss prevention for policy precedence Amending rule priority Amending policy priority Configuring policies for Exchange Online, SharePoint sites, OneDrive, and Microsoft Teams Custom DLP policy in Exchange Online Custom DLP policy with SharePoint sites, OneDrive, and Microsoft Teams Integrating Information Protection with, and configuring policies in Microsoft Defender for Cloud Apps Configuring file policies in Microsoft Defender for Cloud Apps Implementing data loss prevention policies in test mode Enabling test mode in an existing DLP policy DLP rule – user notifications DLP rule – incident reports Summary Chapter 8: Implementing and Monitoring Microsoft Endpoint Data Loss Prevention Technical requirements Onboarding devices to Endpoint DLP Configuring Endpoint DLP settings Configuring policies for endpoints Monitoring endpoint activities Summary Chapter 9: Managing and Monitoring Data Loss Prevention Policies and Activities Technical requirements Managing and responding to DLP policy violations Implementing DLP rule exclusion Reviewing and analyzing DLP reports Reviewing DLP policy matches Reviewing DLP incidents Reviewing DLP false positives and overrides Managing permissions for DLP reports Managing DLP violations in Microsoft Defender for Cloud Apps Summary Section 4: Implementing Information Governance Chapter 10: Configuring Retention Policies and Labels Technical requirements Creating and applying retention label policies Configuring retention policies Creating and applying retention labels Configuring and publishing auto-apply label policies Summary Chapter 11: Managing Data Retention in Microsoft 365 Technical requirements Creating and applying retention policies in Microsoft SharePoint and OneDrive Preservation Hold Library functionality Retention with document versioning – how it works Configuring a retention policy for SharePoint Online and OneDrive for Business Creating and applying retention policies in Microsoft Teams Retention functionality with Teams Recovering content in SharePoint and OneDrive OneDrive for Business SharePoint Online Previous versions Implementing retention policies and tags in Microsoft Exchange How to create a new retention tag Modifying the default retention policy Applying mailbox holds in Microsoft Exchange Applying a litigation hold Implementing Microsoft Exchange Online archiving policies Summary Chapter 12: Implementing Records Management in Microsoft 365 Technical requirements Configuring labels for records management Managing and migrating retention requirements with a file plan Configuring automatic retention using file plan descriptors Implementing in-place records management in Microsoft SharePoint Configuring event-based retention Managing the disposition of records Viewing and disposing of content Summary Practice Exam Test questions Answer key Why subscribe? Other Books You May Enjoy Packt is searching for authors like you Share Your Thoughts
Donate to keep this site alive
How to download source code?
1. Go to: https://github.com/PacktPublishing
2. In the Find a repository… box, search the book title: Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
, sometime you may not get the results, please search the main title.
3. Click the book title in the search results.
3. Click Code to download.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.