MS-101: Microsoft 365 Mobility and Security
Log in to EnrollSummary
- advanced
- m365
- azure
- azure-active-directory
- office
- office-365
Candidates for this exam are Microsoft 365 Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft 365 services. They perform Microsoft 365 tenant management tasks for an enterprise, including its identities, security, compliance, and supporting technologies.Candidates have a working knowledge of Microsoft 365 workloads and should have been an administrator for at least one Microsoft 365 workload (Exchange, SharePoint, Skype for Business, or Windows as a Service). Candidates also have a working knowledge of networking, server administration, and IT fundamentals such as DNS, Active Directory, and PowerShell.
Learning paths
Modules in this learning path
-
Improve your cloud security posture with Azure Security Center
7 Units39 minLearn how you can strengthen your security posture through Azure Security Center.
-
Secure your cloud apps and services with Microsoft Cloud App Security
9 Units58 minMicrosoft Cloud App Security is a Cloud Access Security Broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. Learn how to use Cloud App Security in your organization.
Modules in this learning path
-
Manage role-based-permissions in Microsoft 365 Messaging
7 Units34 minLearn about messaging role groups, admin roles, role-based access control, and how you can use eDiscovery in Exchange Online.
-
Manage message hygiene using Exchange Online and Microsoft 365 Advanced Threat Protection
8 Units23 minLearn how to plan, implement, and configure policies to protect your organization from malware, spam, and phishing.
-
Manage compliance in Microsoft 365 and Exchange Online
7 Units44 minLearn how compliance works in Exchange Online. Learn how to use retention and data loss prevention policies to keep the data and communications you’re required to maintain, how to find that data and communications, and how to ensure you’re ready for an audit.
Modules in this learning path
-
Govern information in Microsoft 365
8 Units59 minLearn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don’t.
-
Transition from Azure Information Protection to Microsoft Information Protection
4 Units35 minLearn the key considerations for transitioning your organization from using Azure Information Protection to Microsoft Information Protection.
-
Prevent data loss in Microsoft 365
4 Units33 minLearn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.
-
Introduction to information protection and governance in Microsoft 365
6 Units44 minLearn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels.
-
Manage records in Microsoft 365
6 Units46 minLearn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.
-
Classify data for protection and governance
7 Units57 minLearn about the information available to help you understand your data landscape and know your data.
-
Protect information in Microsoft 365
6 Units39 minLearn how to detect sensitive content as it’s used and shared throughout your organization, in the cloud and on devices, and help prevent accidental data loss.
Modules in this learning path
-
Discover and analyze content in place using Advanced eDiscovery
10 Units2 hr 2 mineDiscovery offers built-in tools such as Content Search to help identify data used as evidence in legal cases. Content Search helps identify relevant data directly in Microsoft 365, reducing the amount of data that customers need to prepare and export to their third-party compliance tools. Advanced eDiscovery builds on the core eDiscovery solution, helping organizations respond more quickly with a streamlined end-to-end eDiscovery workflow, intelligent search capabilities to decrease manual work, and save on third-party storage costs.
-
Track user and admin activity with Advanced Audit
7 Units1 hr 5 minMicrosoft 365 delivers comprehensive audit logs and alerts across more than 15 services, which enables customers to track user and administration activity within their tenants. Improvements in Advanced Auditing in Microsoft 365 include preservation of audit logs for up to a year, faster access to data, and access to crucial events for quicker investigations.
Modules in this learning path
-
Understand Microsoft 365 subprocessor management
7 Units27 minLearn how Microsoft 365 procures, monitors, and manages subprocessors to help protect data from unauthorized access and inappropriate use.
-
Understand Microsoft 365 security incident management
7 Units22 minLearn how Microsoft 365 investigates, manages, and responds to security concerns to protect customers and the Microsoft 365 cloud environment.
-
Understand Microsoft 365 audit logging and monitoring
5 Units19 minLearn about how Microsoft 365 uses comprehensive audit logging and monitoring to support security monitoring, maintain service availability, and meet compliance requirements.
-
Understand Microsoft 365 identity and access management
7 Units26 minLearn how Microsoft 365 implements the principle of Zero Standing Access (ZSA) to protect production environments and customer data using Just-In-Time (JIT) and Just-Enough-Access (JEA).
-
Understand Microsoft 365 cloud architecture
6 Units27 minLearn how the architecture of Microsoft 365 implements security and privacy features to protect customers who use Microsoft 365 multi-tenant services.
-
Understand Microsoft 365 security development and operation
8 Units37 minLearn how Microsoft 365 follows Microsoft’s Security Development Lifecycle (SDL) to build security and privacy into our products and services.
-
Understand Microsoft 365 privacy
11 Units39 minLearn about Microsoft 365 privacy standards, the reasons we have them in place, and how they differentiate Microsoft in protecting and respecting customer data.
-
Understand Microsoft 365 governance
7 Units28 minLearn how Microsoft implements organization-wide security and privacy governance to support the secure operation of Microsoft 365 services and maintain compliance with regulatory requirements and customer commitments.
-
Understand Microsoft 365 resiliency and continuity
8 Units30 minLearn how Microsoft 365 builds resilient services to meet customer expectations in the face of faults and challenges to normal operations, maintains optimal service availability, and fulfills business continuity requirements.
-
Understand Microsoft datacenter security
9 Units30 minLearn how Microsoft uses Defense-In-Depth to secure our datacenters against unauthorized access, environmental hazards, and other physical threats, as well as how Microsoft implements resilient architecture, business continuity, and disaster recovery to maintain the availability of our services.
-
Understand Microsoft 365 risk management
6 Units17 minLearn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers and the Microsoft 365 environment.
-
Understand Microsoft 365 encryption
6 Units20 minLearn how Microsoft 365 encrypts data at rest and in transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
-
Understand Microsoft 365 vulnerability management and security monitoring
7 Units22 minLearn how Microsoft 365 proactively monitors information system assets for vulnerabilities, assesses the risks associated with discovered vulnerabilities, and remediates them in a timely manner.
Modules in this learning path
-
Introduction to modern management in Microsoft 365
3 Units20 minThroughout this module, you will learn about the key concepts and benefits of modern management with Microsoft 365. We will explore the four key pillars to modern management, and how they can help your organization manage all their devices in a modern way that is easy to deploy, up-to-date, secure and intelligent.
-
Automate Windows deployments by using Windows Autopilot
4 Units30 minDuring the course of this module, you will learn about Windows Autopilot and the benefits it can provide to modern IT organizations. From the very beginning, to the very end of a device’s lifecycle; Windows Autopilot is an essential tool to reduce the burden on IT teams when registering, resetting, and recovering devices.
-
Manage devices by using Microsoft Intune
3 Units35 minThis module will introduce you to the modern device management options for Windows 10 from Microsoft 365, including co-management, Microsoft Intune, and Mobile Device Management (MDM) for Office 365.
-
Manage Windows 10 through co-management by using System Center Configuration Manager
5 Units31 minCo-management is one of the primary ways to attach your existing Configuration Manager deployment to the Microsoft 365 cloud. It helps you unlock additional cloud-powered capabilities like conditional access.
-
Manage applications by using Microsoft Intune
7 Units29 minManaging applications on devices in your organization is key to a secure and productive application ecosystem. Microsoft Intune is a cloud-based service that helps enable your workforce to be productive anywhere and, on any device; while keeping your corporate data protected. In this module, we will learn about considerations for implementing Mobile Application Management (MAM) and manage MAM policies in Intune.
-
Deploy Windows Update in Microsoft 365
6 Units32 minTo keep computers that run Windows 10 stable and protected, you must update them regularly with the latest features, security updates, and fixes. To utilize Windows Update effectively, you must be aware of the configuration options that Windows Update has available, and you must guide users on how to configure these options.
Modules in this learning path
-
Introduction to threat protection with Microsoft 365
4 Units11 minLearn about how attackers most commonly breach organizations–and the Microsoft tools that protect your organization in an ever shifting landscape.
-
Protect against threats with Microsoft Defender Advanced Threat Protection
4 Units26 minLearn how new threat protection tools from Microsoft protect your organization’s users, devices, and data from attempted attacks.
-
Remediate risks with Office 365 Advanced Threat Protection
5 Units49 minLearn about the Office 365 Advanced Threat Protection component of Microsoft Threat Protection.
-
Safeguard your environment with Azure Advanced Threat Protection
5 Units1 hr 2 minLearn about the Azure Advanced Threat Protection component of Microsoft Threat Protection.
Modules in this learning path
-
Overview of identity and access management in Microsoft 365
5 Units8 minLearn how identity and access management work in Microsoft 365.
-
Simplify access and identity provisioning with Microsoft 365
6 Units17 minLearn how to use Microsoft 365 authentication tools for access and identity provisioning.
-
Strengthen authentication with Microsoft 365
6 Units8 minLearn how to strengthen authentication across your enterprise deployment with security tools from Microsoft 365.
-
Protect those most targeted
5 Units19 minLearn how to protect the most important credentials in your enterprise ecosystem – administrator credentials.
-
Use Microsoft 365 to promote a security mindset
5 Units8 minLearn how to promote an enterprise-wide security mindset with Microsoft 365.
-
Embrace Zero Trust with Azure Active Directory
5 Units35 minLearn about the Zero Trust model and how to implement Zero Trust into your organization.
Modules in this learning path
-
Overview of security management in Microsoft 365 security center
3 Units10 minLearn how the security management tools from Microsoft help you protect your organization’s users, devices, and data.
-
Use reporting in the Microsoft 365 security center
3 Units12 minLearn how to take advantage of the reporting and insights available through the Microsoft 365 security center to drive organizational security health.
-
Protect mail with Office 365 Advanced Threat Protection
3 Units10 minLearn how Office 365 Advanced Threat Protection (ATP) helps safeguard your organization against unknown malware, viruses, and harmful email links and attachments.
-
Secure Windows 10 endpoints
4 Units12 minLearn how to mitigate end-point threats by using Windows 10 security features.
Modules in this learning path
-
Security, responsibility, and trust in Azure
11 Units1 hr 16 minDiscuss the basic concepts for protecting your infrastructure and data when you work in the cloud. Understand what responsibilities are yours and what Azure takes care of for you.
-
Create security baselines
11 Units1 hr 0 minCreate security baselines
-
Identify security threats with Azure Security Center
7 Units43 minIn this module, you’ll discover how to detect and respond to threats with Azure Security Center.
-
Resolve security threats with Azure Security Center
7 Units44 minIn this module, you’ll use the alert capabilities of Azure Security Center to watch for and respond to threats.
-
Protect your servers and VMs from brute-force and malware attacks with Azure Security Center
6 Units44 minIn this module, you’ll discover how to protect VMs and servers with Azure Security Center
-
Analyze your Azure infrastructure by using Azure Monitor logs
5 Units34 minUse Azure Monitor logs to extract valuable information about your infrastructure from log data.
-
Improve incident response with alerting on Azure
9 Units53 minRespond to incidents and activities in your infrastructure through alerting capabilities in Azure Monitor.
-
Capture Web Application Logs with App Service Diagnostics Logging
8 Units55 minUse application logs in Azure Web Apps to help debug web app code.
-
Protect against security threats on Azure
8 Units23 minLearn how Azure can help you protect the workloads you run both in the cloud and in your on-premises datacenter.