Subido por Edwin520

SC-900T00 - Security, Compliance and Identity Fundamentals

Anuncio
Microsoft Se<utlty
SC-900TOO-A: Secu rity,
Com plian ce and Iden tity
Fund amen talsCourse Intro ducti on
Welcome
Thank you for' joining us t·o day.
We've worked together with the Microsoft
Partner Network and Microsoft IT Academies to
bring you a world·class learning experience.
At the end of class, please complete an
evaluation of today's experience. We value your
feedback!
Microsoft Certified Trainers + Instructors. Your
instructor is a premier technical and
instructional expert who meets ongoing
certification requirements.
Certification Exam Benefits. After training,
consider pursuing a Microsoft Certification to
help distinguish your technical expertise and
experience. Ask your instructor about available
exam promotions and discounts.
Customer Satisfaction Guarantee. Our partners
offer a satisfaction guarantee. and we hold
them accountable for it.
We wish you a great learning experience and
ongoing career success!
•
Microsoft
Hello! Instructor Introduction
· Instructor: Fred Brandon
· Technical Consultant, MIE, MCP. ITIL, Security+
· Fred Brandon FLAMES Foundation
· 20+ years of IT experience
· Bestselling Author, Adopting Blockchain & Cryptocurrency
· Certified Financial Education Instructor
· Web3 Evangelist and Educator
• Advocate for STEAM programs for youth
• • Microsoft
About this course
This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts,
and related cloud·based Microsoft solutions and technologies.
The audience for this course wants to understand how Microsoft SCI solutions can span across solution
areas to provide a holistic and endato~end solution.
Learners should have the following prerequisite general knowledge:
General understanding of networking aod doud computing concepts.
General IT knowledge or any general experience working in an rr environment.
General understanding or Miaosoh Azure and Microsoft 365.
•
The content for this course aligns to the SC-900 exam objective domain.
-
Microsoft
Course Agenda
Module 01- Describe the concepts of Security, Compliance, and Identity.
•
Module 02- Describe the capabilities of Microsoft Identity and Access Management Solutions.
•
Module 03 - Describe the capabilities of Microsoft Securi ty Solutions.
Module 04 - Describe the capabilities of Microsoft Compliance Solutions.
. . Microsoft
Certification areas (SC-900)
Study areas
Describe the Concepts of Security, Compliance. and Identity.
Weights
5· 10%
Describe the capabilities of Microsoft Identity and Access Management 25·30%
Solutions.
30·35%
Describe the capabilities of Microsoft Security Solutions.
Describe the Capabilities of Microsoft Compliance Solutions.
25·30%
This course maps directly to the exam SC · 900 Microsoft Security. Compliance, and Identity
Fundamentals.
•
Percentages indicate the relative weight of each area on the exam.
•
The higher t he percentage. the more questions you are likely to see in that area.
• • Microsoft
Microsoft Se<utlty
SC-900TOO-A Modu le 1:
Describe the Conc epts of
Secu rity, Com plian ce, and
Iden tity
Describe security and compliance concep ts and method ologies
....·····
- '.
... ~
! ~/ :
•......,..·•
Describe identity concept s
Lesson 1: Describe security and compliance
concepts and methodolog ies
-•
Lesson 1 Introduction
After completing this lesson, you'll be able to:
Describe the Zero Trust and shared responsibility models.
Describe common security threats and ways to protect through the defense in-depth security model.
Describe the concepts of encryption and hashing.
Describe the cloud adoption framework.
Zero-t rust metho dology
Zero Trust Methodology
Zero Trust guiding prin<iples
"TM1 no ont. 'lt'tefy ~ng·
Verify explicitly
•
Lt&st privileged access
• Assume bteach
Six foundational pillars
ldflttities may be usetS. s.emas, or devices..
O.Vkes aeate a large attadt surfOKe as data flows..
Appfkatlon s are the way that data is consumed
01tt should be dassUitd, labeled, and encrypted l»stod on
Its attnbutes.
lnff'utrvctu re whft.hef on·Pfenlrses or dood blstd.
rtpftifnts a d'W't1t YKCOf
Nt'-<b shoold be - l e d .
c C..,......._,..,.(.o., .......... - -
Defense in depth
OefenM in d.-p1h uses 1 la)'ffttd ~pp«Nch to MCUrhy:
Physical Security
P'hysk.tl secur.ry such as limiling accas to • ct.tKe-nter to Ot'ly authori:r.ed
Pf"C"nol
Identity & Access
Identity •nd •«eu security conuolllng teem to lnfraS1ructure 1nd cha:nge
control
~rimtt.er security Including diS1ributl!'d don£111 of s~r-vice (OOoS) protection
liltC!r l:uge·scale attiKks befo~ they can c&ust a den~l of service for users.
Perimeter
to
Network security an limit convnunlc.ation bc!twetn rts.our~ using
segmentldon tnc1 access controls.
Tht compute J,yer Qn s.ecure ICCtsS to Wtu.al mac:Nnts tlthef on-pttme:s.es 0t
'"the c~ byctos.ng c..uin potts..
--
...,..lc>tlon ~~yo< -...y..,..... ohot
>Pt>b"""'.,......,. ond ' - ol
O.ta 11ytr socumyconttols access to business and C\IA.om« ~~ .nd
encryption to prolect data.
Network
Compute
Application
Data
Confidentiality, Integrity, Availability (CIA)
CIA .. A way to think about security trade·offs.
Confidentiality refers to the need to keep confidential
sensitive data such a.s customer information, passwords, or
financial data.
Integrity refers to keeping data or messages correct.
Availability refers to making data available to those who
need it.
Avuilability
The shared responsibility model
The responsibilities vary based
Sh111ed re:sport~ iblllty model
on where the workload is hosted:
Software as a Service (Sa aS)
Rnpon.sibility
lnfOI"!MMIon aNI
Platform as a Service (PaaS)
Infrastructure as a Service
(laaS)
On-premises datacenter (Onprem)
d"•
Dtwlc.. iMOWt 1nd IICJJ
-_.,.
-.
A((OUf'h
MCiikterll!llft
ldl!f!l!ly ~ doAalll')' lnltKm.C~-
...
N ttwoR <O<IIIok
..............
~M'I-k
ll!wc-.1 ~~-"~
._
Common threats
/.·a
. ···. .\..
(~··..)
...'• \..!./ .·...
...." ....·
.'
\ ..............·/
Dat;J br•ach
• Dictionary attadc
lndude:
1
Tt<h support scams
SOl injection
M~1warC! dtslgned
to stt~l
passwcwds or bank details.
It is a type of identity attack.
A h.aUer nnempts to stNit~n
identity by trying a large number
of known passwords.
' Olctionory .ltUIC:ks tu·e olso
lr;nown ns brute force attM.ks.
t'i..... .....'·\
\
"
/·~
·:·····..\
.!
.:
··.........··./
\,
/
DiJruptiv. •tt<Kia:
It is a type of malware that
encrypts files and folders.
It attempts to extort money from
victims.
A Distributed Denial of Sef'llic:e
(DDoS) au.-.c:k auemplS to
exh3ust i'ln applielltton's
resource-s.
DOoS atta<k.s can be targeted at
arry endpoint.
Phishlng
Other common threats include coin miners, rootkits, trojans, worms, and exploits and exploit kits.
Encryption
unusable to unauthorized vi~
Enayptoon ol datil ot rest
• Encryption ol datil on traron
Two top-level types of encryption:
Symtntlric- U5CS same key to encrypt and decrypt data
• Asymm<itric • uses o public key and private key pair
... ...
... ...
Symmetric Encryption
Encrypllon is the process of malcing dala un,.,adable and
........,
._..,.
n ··:- - - •i.......~,··.:
, ..t---wv--+ i·............
..t.........-....
....... ~....i
.......~..../
.......:..../
Asymmetric Encryption
········-..
.-,
\ .
:
""""...,
········ .
..··n
· ~.-. ;
.: -,.,.~ \
I .....__...
.
,..,_""
! _ _ __
;
' - .•••.••
, ·,.
,·.-·......
\
'-._
.
Hashing
Hashing uses an algorithm to convert the original
text to a unique fixed-length hash value. Hash
functions are:
Detenninistic. the same Input produces the same outpUL
A unique identifier of its associated data
Different to encryption in that the hashed value isn't
S\lbs<q~Jeotly decrypted bad< to the o<iginal.
Used to store passwol'ds. T~ password is ·salted~ to
mitigate risk of bMe-force d'JCtion.aryatta<k.
.......
(~rigln:;;··., ....
\ .•.~.~:.../
.... ··.•..........•·
/·;~:~;~·\
:
010101
:
... 101010 .:
Microsoft Cloud Adoption Framework
Microsoft Cloud Adopllon Framework
Consists of documentation,
implementation guidance, & be-st
practices that support increased
security and compliance
•••
0
....-....•••
···---~
v
....,
Help bvsinesses implement strategies
necessary to succeed in the doud.
......
Q
Mlgnte
lifecyde
Q
Dc!fineo str.uegy
Plan
In-~•
..Oldy
Adop1 (Migrate / Innovate)
Govtrn
Manage
rl~
Lesson 2 Introduction
After completing this module, you'll be able to:
• Describe the concept of identity as a security perimeter
• Understand the difference between authentication and authorization
• Describe identity-related services
Common identity attacks
•
Password-based attacks
...
•
Phishing
.L
._
•
Spear phishing
Types of security threats:
....
A.UMJ"
S..mow2016
.L
Jllt)'201&
hU....Itdl
.L
....
.L
-
.L
~ll)
("""*"'1'
•••
Identity as the primary security perimeter
Identity has become the new security f)(!rimet~ that enables otgl'lniultions to se<:uro thl'lr assets.
An identity is how someone or something can be verified
and authenticat ed and may be associated with:
-,_I-
User
Appllcation
Device
Other
Four pillars of identity:
Administration
Authentication
Authorization
Auditing
n -/
rJ
~--
-
~ ---.1.
-
Modern authentication and the role of the identity provider
Modern authentication is an umbrella term for authentication and authorization methods berween a
dient and a server.
......
(! .J
At the center of modern authentication is the role of the i dentity provider (ldP) .
~
'•
.·8
·····••
.......}
ldP offers authentication. authorization, and auditing services.
(@J
......·
ldP enabfes organizations to establish authentication and authorization policifi:, monitor user behavior; and more•
(~fi
·.....•.·
A fundamental capability of an ldP and "modern
tQ;.
··.......\..
Microsoft Azure Active Directory is an example of a cloud-based identity provider.
authenti<:<~tion~ is the support for single sign-on (SSO).
The concept of Federated Services
Simplification method of federat ion scenario:
The website uses the authentication services of ldP·A
A simplified way to think about federation
-·
~-
... ----- - --
The user authenticates with ldP-B
-·
-- ~t-OIWf'<liuo)
ldP·A has a trust relar•onship configured with ldP·B
When the user's credenti als are passed to the website,
the website trusts the user and allows access
•-
;,u;,t t
IIIIi
The concept of directory services and Active Directory
..·a
······..~
:
~
~
··...........
A directory is a hierarchical structure that stores information about objects on the network.
A directory service stores directory data and makes it available to network users, administrators,
services, and applications.
(jj\
•·.. ......··
The best·known service of this kind is Active Directory Domain Services (AD OS), a central component
in organizations with on-premises IT infrastructure.
tQ;:\
Azure Active Oire<:tory is the evolution of identity and access management solutions, providing
organizations an Identity as a Service (IDaaS) solution for all their apps across cloud and on-premises.
,
\ ........ .
Module Summary
In this module, you have:
l earned about some important security concepts and methodologies.
-
learned about the Zero Trust methodology, the guiding prindples and the six foundational elemMts used in the
Zero Trust model
-
looked at the shared responsibility model.
-
teamed about defense in depth and the tradeoffs as.sodated with CIA triad.
-
learned about common cybersecufity threats ii\Ciuding threats to business and pei'Sonal data.
l earned about some important identity concepts.
-
learned about the concept of identhy as a security perimeter & the four piltars of identity
leamed about identity· related services. including the role of identity provider, federation. Md dlre<tory services
Mkroso ft Security
SC-900TOO-A Module 2:
Describe the Capabilities of
Microsoft Identity and Access
Man agem ent Solutions
tw
.. . i. .\.
·.•.....··
,...8--···-,
'··.......·:'
~
Explore the services and identity types of Azure Active Directory
Explore the authentication capabilities of Azure Active Directory
Explore the access management capabilities of Azure Active Directory
...·-.....
:
•.' ~ :'
;
•········•
Describe identity protection governance capabilities of Azure Active
Directory
Lesson 1: Explore the services and identity
types in Azure Active Directory
Lesson 11ntroduction
After completing this module, you'll be able to:
• Describe what is Azure AD
• Describe the identity types that Azure AD supports
Azure Active Directory
Azure AD is Microsoft's cloud-based identity and access
mMagement setvice. Capabilities of Azure AD lnclud.:r.
Organiutions can e~bl e their employees, guests, and
others to sign in and access the resources they ne-ed.
Provide a single identity system for their cloud and on·
premises appllcatlons.
Protecl user identities and credentials and to meet an
organization's access governance requirements.
Each Microsoft 365. Office 365, Ature, and Dynamics 365
Online subsaiption automatically use an Azure AD tenant
aA a
-~
.\
.
-- ---I
.._ .._
I
~
0
)
[ ll
-- --'-··
Azure AD identity types
Azure AD manages different types of identities: users. service principals, managed identities, and devices.
/: ·······
®- \
'!/JJ :
··..•.....··
User - Generally speaking, a user is a representation of an individual's identity that's managed by Azure AD.
Employees and guests are represented as users in Azure AD.
Device ·A piece of h<udware. such as mobile devices. laptops,. servers. or printer. Device identities can be set up in
different ways in Azure AD, to determine properties wch as who owns the device.
rw.,
.........
- ~•'·
( o····\
\
- ..:
·.......
Service prindpal · You can think of it as an identity for an application. A service principal is created in every tenant
the application is used & defines who can access the app, what resources the app can access, and more.
Managed identity- A type of service principal, a managed identity provides an identity for applications to use
when connectjng to resources that support Alure AO authentication.
Microsoft Se<:urity
Demo
Azure Active Direc tory user
settings
External identities in Azure AD
Two different Azure AD Extemalldentities:
828 collaborati on
828 collaboration allows you to share your apps and
resources with external users
B2C access management
B2C is an identity management solution lor consumer
and customer lacing apps
..............__
·-
•
D
The concept of hybrid identities
Hybrid identities
Hybrid identity model
I]
• With the hybrid model, users accessing both
on- premises and cloud apps are hybrid users
managed in the on-premises Active Directory.
• When you make an update in your onpremises AD OS, all updates to user accounts,
groups, and contacts are synchronized to your
Azure AD with Azure AD Connect
--.. _.....
--
aR a
....
__,
Lesson 2: Explore the authentication
capabilities of Azure Active Directory
Lesson 2 Introduction
After completing this module, you'll be able to:
• Describe the secure authentication methods of Azure AD
• Describe the password protection and management capabilities of Azure AD
Authentication methods of Azure AD
Multifac1or authentication {MFA) & Security
Defaults
MFA requires more than one fotm of verification.:
Something you know
Something you ha~
~thing you llfe
Scct.Jrity defaults:
A set of basic Identity securf1)' me<.hani:sms
r«.omm~nded by Mkr0$0ft.
Agreat option for org4nia:ations that w;)nt to incr~Nse
tlwlf security pMtu~ but don't know wbeft to start. or
f01 organizations using the free tier of Azure AD
licensing.
,._
--
A-·--..v--
El••
- - -.. - -
o ...~-
Multi-factor authentication (MFA) in Azure AD
Different authentication methods that can be used with MFA
Passwords
Good: P•uword
and_
Password & additional verification
Phone {voice or SMS)
11ld6
Microsoft Authenticator
Open Authentication (OATH) with
software or hardware tokens
Passwordless
Biometrics (Windows Hello)
M icrosoft Authenticator
FID02
........
h.»word I
kttet': P•uword
hit: P»swordleu
llld...
~
"''
-
~
-..,_- [!)
...............
......
,......""'
<4!!!!!1
.........
l!MMOTP
....-
"""""'
[!)
..........
...............
•
fiDOl wocutlty Wy
Windows Hello for Business
Windows Hello lets users authenticate to:
A Microsoft account
An Active Directory account
An Azure Active Directory (Azure AD) account
Identity Provider Services or Relying Party Services that support Fast ID Online v2.0 authentication
Why is Windows Hello safer than a password?
Be<ause it's tied to the specific device on which it was set up. Without the hardware, the PIN is useless
Self-service password reset (SSPR) in Azure AD
Benefits of Self-service password reset
It inc:reas.s security.
•
II saves tho O<gonoul- money by reducing the number of calls •nd roq_,. 10 help desl< .,.ft
·
h incren~s PfOductrv•ty. allowmg the user to return to worlc qstet.
Self-service password reset works in the following scenarios:
PasswOfd change
•
·
Passwotd reset
Account unlock
Authentication method of SSPR:
Mobile app notification
Mobile app code
Email
Mkroso ft Security
Demo
Azure Active Direc tory
self-service password reset (SSPR)
Password protection & management capabilities in Azure AD
. .a.· ··.
. .:
·...........
Global banned password list
(CD)
.......
Custom banned password lists
()~(
.........•'
Protecting against password spray
;
~.
Hybrid security
Lesson 3: Explore the access managemen t
capabilities of Azure Active Directory
Lesson 3 Introduction
After completing this module, you'll be able to:
• Describe Condit ional Access and its benefits
• Describe Azure AD roles
Conditional access
Conditional Acce.ss signals:
User or group membership
Named location information
Device
Applic,tion
Re~Hime sign•in ris:k detection
Cloud apps or ;,ctions
User risk
Access controls:
Block access
Grant CKcess
Require one or mOte conditions to be
me1 btfore grJmlng llCcess
Control us~' ae<l"SS based on session
controls to enable limited eltperien<es
within specific doud appr~tations
--- @ © - -l
ffi --....
-®
......
Verify._.,.~
- 0
®
/
'@ -:.- - 0
_.......
=
Mkroso ft Security
Demo
Azure Active Direc tory
Cond itiona l Access
Azure AD role-based access control (RBAC)
Azure AD roles control permissions to manage Azure AD resources.
(;?.
Built-in roles
(Q)':
;
··........·
Custom roles
)
1
..·@
·······.
!
f... ~ ..·j
Azure AD role-based access control
·······
/;;;\'··.•• Only grant the access users need
· ~ =
\ .......... .
Lesson 4: Describe the identity protection
and governance capabilities of Azure Active
Directory
0
Lesson 4 Introduction
After completing this module, you' ll be able to:
• Describe the identity governance capabilities of Azure AD.
• Describe the benefits of Privileged Identity Management (PIM).
• Describe the capabilities of Azure AD Identity Protection.
Identity governance in Azure AD
The tasks of Azure AD identity governance
Govern the identity lifecycle.
Govern access Ufecycle.
Secure privil eg~ access for administration.
Identity lifecycle
Join; A new digital iden,ity is created.
Move; Update access authorizations.
Leave: AccMs may need to be removed.
Entitlement management and access reviews
Entitlement management
It is an identity gcwemance feature that en.ables organizations to
manage identity and access 11fecyde at scale.
It automates access request workflows, access assignments.
reviews. and ex:plra!ion.
Access reviews
Enable organitations to effidently manage group memberships,
acctss 10 entf(pri~ appliclltlons. and role assignmel"'1.
Ensur~ that only dtoe rj,ght
people havt <K<tSS to r~urt-H
Used to ri!View and man<lg(' access for both US(>fS and guests
Terms of use
Allow information to be presented to users. before they oJC:cess
data or an applicatK!n.
Ensure users read relevant disclaimers fOf Segal or compliance
requifemenlS.
Comoso
__
·-- ___ ____ _
·------ ----·
---------·-- __ ____
·Please reovlew users' ~ttteu to the Rn.wM:e Web
tpp In Frid:e!kof1N£T
___ ______ -
..'"''"'_·_...__.....,__,..
_..._.. ... .....
_
.... _ 1 " ' . . . -
....
... ......- --~
.
...
....,._..
...
---·~----
_,
Privileged Identity Management (PIM)
PIM enables you to manage, control, and monitor access to important resources in your organization.
{~)':
··.......··
Just in time, providing
·····1••.:
i.·llll!l
·....... ..
Time-bound, by Dssigning s'tart and end dates that Indicate when a user can acce-ss resources.
t0
·f
'•....•·.
Approval-based, requiring specific approval to acttvate privileges.
..-;;;;;;:.
privileg~ access only when needed, and not before.
~.'\!?.v}
Visible. sending notifications when privileged rotes are activated.
tfrj':
•..........
Auditable. allowing a full access history to be downloaded.
·······
Azure Identity Protection
Enables organizations to accomplish three key tasks:
Automate the dete<don ind remfdiition of tdtruity·based risks.
Jnvestigite rrslts using daca in the portal.
Expo« ns~ deloctoen dolo 10 thord·par1y ut~•tios IO< lunhe< onolysos.
It can categorize and calcutlte rislc
C..tegorize risk into thoee """' low. mecfourn ond Ngh.
• C<llrulate the "!)1>-in riSk. and user odenlity riSio.
II provides organizations with three reports:
Risky users
Risky sign·ins
Risk detections
Module Summary
In this module, you have:
• Learned about Azure AD and services and identity types Azu re AD supports
• Explore the authentication capabilities of Azure AD, including MFA
• Explore the access management capabilities of Azure AD with Conditional
Access and Azure AD RBAC
• Describe identity protection and governance capabilities of Azure AD, including
PIM, entitlement management, and access reviews.
• Learned about the capabilities of Azure AD Identity Protection.
Mkroso ft Security
SC-900TOO -A Mod ule 3:
Describe the Capa bilitie s of
M icros oft Secu rity Solu tions
Describe basic security capabilities in Azure
(q})
........'
Describe se<:urity management capabilities of Azure
~
/·8·····\
·.... " ......:
Describe security capabilities of Azure Sentinel
,.......
'[. !§)
Bl .....;
··.•.....·
Describe threat protection with Microsoft 365 Defender
····\
...-~-:•
··...........
Describe security management capabilities of Microsoft 365
•·.
.....
((d)
'•......·
Describe endpoint security with Microsoft lmune
Lesson 1: Describe basic security capabilities
in Azure
Lesson 1 Introduction
After complet ing this module, you should be able to:
. ··········....
[ .··o
1
.\
'
.·..............
Describe
Azure security
capabilities
for protecting
your network
....o
···········...
i'
~
.\
'
·..........•'/
Describe
how Azure can
protect your VMs
,....o
···········\
:
\ '•
/
..
i
·····.·····
Describe
how encryption
on Azure can
protect your data
Azure Network Security groups
Network security groups (NSG) let you allow or deny network
traffic to and from Azure resources that exist in your Azure
Virtual Netwo rk.
An NSG can be associated with multiple subnets or networ1c interfaces
in a VNet.
An NSG is made up of inbound and outbound security rules.
Each rule specifies one or more of the following properties:
- Name
- Ptiotity
- Source or destination
- Protocol
- Port range
- Oire<tion
-Action
A:;ttme'l
I
HTTPIS
....
T·~·
ll!il
""'
Subneot 1
"'"
"'"""'
Microsoft Se<:urity
Demo
Azure Netw ork Security Groups
Azure DDoS protection
A Distributed Denial ol Service
(DDoS) attack makes resources
unresponsive.
Azure DOoS Protection analyzes
network traffic and diS<:ards
anything that looks like a DOoS
anack.
AzurG DDoS Protection tiers:
Basic
• Standard
·-·,...------····-··---··--·
..,.(> ~ ~ ·~
-
-CC.......,.~(.I:aa
:11 ...... _.....
Azure Firewall
Azure Firewall protects your Azure Virtual Network
(VNet) resources from attackers. Features include:
Built-in high availability & Availability Zones
Outbound SNAT & inbo und DNAT
Threat intelligence
Network & application-level filtering
Multiple public IP addresses
Integratio n with Azure M onitor
-·•
•-·
••
-·-
.....
H'--• -
l"lr-•11
I
.._
r~l
@
--
Azure Bastion
Azure Bastion provides secure
connectivity to your VMs directly from
the Azure portal using Transport layer
Security (TLS). Fearures include:
ROP and SSH directly in Azure
portal.
Remot~ session over ns and
firewall traversal for ROP/SSH.
No Public IP required on the Azure
VM.
No has'Sie of managing NSGs.
Protection against port s.<anning.
Protect against zero-day exploits.
.........
Web Application Firewall
Web Application Firewall (WAF) provides centralized
protection of your web applications from common exploits
and vulnerabilities.
,.•
.j.
! J 1"
•
-
Simplet security management
Improves the response time to a se<urity threat
!=---
Patching a known vulnerability in one place
Protection against threats arwJ intrusions.
•
•
lii!J
@
I
c-.
.._._.......
---·
I
" --
..
•........
•
......_
~
1;1.
-~
---
I.
Ways Azure encrypts data & use of Key Vault
Encryption on Azure
What is Azure Key Vault?
'
Azure Storag~ Service Encryption
8~-
-~
SecretS management
Azure Disk Encryption
@
Key managemen1
Transparent data encryption (TOE)
@
Certificate management
@
Stote secrets backed by HW or SW
r
. i.
Lesson 2: Describe security managemen t
capabilities of Azure
Lesson 2 Introduction
After completing this mod ule, you'll be able to:
.··o
··········......:
~..
.
..i
:"
i
......o
···········...~
i
:
·..........
\.............../
Describe
the security
management
capabilities of
Azure.
Describe
the benefits and
use cases of Azure
Defender.
,....o
···········\
:
\
/
i
··...........··
Understand Cloud
Security Posture
Management and
the security
baseline.
Azure Security Center
Azure Security Center - A unified infrastructure security management system that strengthens the security
posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud
- whether they're in Azure or not - as well as on premises. Azure Security Center's features cover two broad
pillars of cloud security:
.·.........•,
\·.........•·f Cloud security posture management(CSPM):
c··,···--;
Cloud workload protection (CWP):
•......•
~·
CSPM uses a combination of tools & se.vices to
strengthen your hybrid doud posture and track
compliance with the built-in policies.
Features include secure score, detection of security
Security Cente(s integrated cloud wor1<1oad
protection platform (CWPP), Azure Defender, brings
advanced, intelligent protection of your Azure, nonAzure, and hybrid resources and workloads.
misconfigurations in your Azure machines, asset
inventory, and more.
DEfender plans include Azure DEfender for servers,
App Service, SQL. Key Vaul~ and more. ..
Azure Secure Score
_,_
The secure score is shown in the Azure portal pages as a percentage value. To
improve your secure score, remediate security recommendations from your
recommendations list.
. .....
~ "\
v: AP9lf l}'«tlfl upcWn.
~ -;eotC IM.IswtS ~~ttsofWdot!10W fNd'liriH
._..o-g ~ ~ bt -uUIIt<l OtiWWI ~ l«ft kl~
lot SOrt~
l'l:ll.nwf-o.M
45&
("'""' M1"-KOICO •
O ss% ,.
j.OII
~ .t c:C M 'li1u;M _,.,..,.
"- ~ d
~ l dH\'Ml6UMR
vc..t ~1111o\Ad bot I•W.rttdto •I!Pf l'fi! tm upcsii H
~ l of Jf \o'Ms •
$rsltfn \111411t' Oft WIIWIIUC"- $Oht \t'IS \Mo.4d bt IMialtll
'
pptw
OS "n;on shoukl be wpdi!N IOf your doucl , _ . 'ol<ts 0
!Cubtrnttn~ ~ bt ~fd 101 ~_.,
KlbtnwtnWOIOft-
'•"""'
t of S w!WI ftiA(hllf ~ MU
~;a <!)
-
s wn;;,t-wnt ~ wu.
S,Sttm updJI.t1 ~ bt lrm<llotd CfiJOIIIINCflio>n
lrlsUI"""""omrl ~ Cfl ~ wt.iii!NctwiH 0
..-·
~·
N(lnt
<·:· NOnf
'
'
Microsoft Se<:urity
Demo
Azure Security Center
Security baselines & the Azure Security Benchmark
Security baselines for Azure offer a consistent experience when securing your environment They apply prescriptive best
practices and recommendations from the Azure Security Benchmark (ASB) to improve the security of workloads, data,
and services on Azure. The ASS comprises the security recommendations specific to !he Azure platform. Example
security baselines include:
Q
Azure security baseline for Azure Active Directory: Applies guidance from the ASB to Azure AD
@ Azure security baseline for Aiure Firewall: Applies guidance from the ASB to Azure Firewall.
0
Azure security baseline for Security Center: Applies guidance from the ASB to Azure Security Center.
Lesson 3: Describe security capabilities of
Azure Sentinel
Lesson 3 Introduction
After completing this module, you'll be able to:
.··o
··········......:
~..
.
..i
:"
i
......o
···········...~
i
:
·..........
\.............../
Describe
the security
concepts for
StEM, SOAR, and
Describe
how Azure
Sentinel provides
integrated threat
protection.
XDR.
,....o
···········\
:
\
/
i
··...........··
Describe
the capabilities of
Azure Sentinel.
SIEM, SOAR, and XDR
What is security incident and
event management?
A SIEM system is a tool tllat an
organization uses to coUect data from
What is security orchestration
automated response?
A SOAR system talces alerts from many
sourtes. soch as a SIEM system. The
What i.s extended detection
and response?
An XDR system is designed to deliver
across th~ ~ t:!SW.te., inducting
SOAR system lhM trj,ggers actiondrive-n automated worldlows and
processes to run security tasks that
mitigate the issue.
security across an orgMization's
infrastructure. software. and resources.
It does analysis. looks for correlations
or anomalies, and geoetate$ alerts and
incidents.
intelligent. automated. and integrated
domain. It helps prevent. detect. and
respond to threats across identities.
endpoints. applications. emai~ loT.
infrastructure.. and doud plt~~tfonns.
Sentinel provides integrated threat protection (Siide 1>
Collect data at cloud scale across all users. devices, applications,
and infrastructure, both on-premises and in multiple clouds.
.
----
Detect previously uncovered threats and minimize false positives
using analytics and unparalleled threat intelligence.
Investigate threats with AI and hunt suspicious activities at
scale, tapping into decades of cybersecurity work at Microsoft.
Respond to incidents rapidly with built-in orchestration and
automation of common security.
.
•••
••0
-
~
/
--··
.~..
Sentinel provides integrated threat protection (Siide2J
0
ConnKt Sentinel to your data: use connectors for
Workbooks~ monitor the data using the Azure
Sentinel integration with Azure Monitor Workbooks.
®
Investigation: Understand the scope of a potential
security threat and find the fOot cause.
Analytics: Using built in an.alytics alerts. you'll get
notified when anything suspicious occurs.
@)
Hunting: Use search·and-quecy tools. to hunt
proactively for threat$. before an alert is triggered.
4
@
Playbooks: A collection of procedures that can help
automate and orch<!'Strilte your response.
Microsoft solutions providing real·time integration.
Manage Incidents: An incident Is created when an
a lert that you've enabled is ttiggNed.
Security a utomation a nd o rchestration: Integrate
with Azure logic Apps, to create workAows
Integrated thl'e~t pl'otKtlon: XOR with Microsoft
365 Defender and Azure Oefendet integration.
Sentinel provides integrated threat protection (SiideJ>
- ...
- - -- --w--- w--
Ll
--1. ...
.... alll _.,.,..
~-
~
"o
~
I
••
eoo
••
m•
--1.
...
II
---
--
--
Microsoft Se<:urity
Demo
Azure Sentinel
Lesson 4: Describe threat protection with
Microsoft 365 Defender
Lesson 4 Introduction
At the end of t his module, you'll be able to:
..··o
··········....
[
1
.\
'
.·..............
Describe
the Microsoft
365 Defender
service.
....o
···········...~
i'
.....
/'
·..........•'
Describe
how Microsoft 365
Defender provides
integrated
protection against
sophisticated
attacks.
,. .0. . . . . .\
i
:
\ '•
../
·····..···'
Describe
how Microsoft
CloudApp
Security can help
defend your data
and assets.
Microsoft 365 Defender services
Microsoft 365 Defender
®
A
o-\..,
')
Natively coordinate the
detection, prevention.
investigation. and response
to threats.
Protects identities,
endpoints, apps and email
& collaboration.
Integrated Microsoft 365 Defender experience
Apps
....,.,.a....
...~
fM•IVCoUabof'ltion
....._...,......,
-~.No)
Microsoft Defender for Identity
Microsoft Defender for Identity covers following key areas
r\.:@
.....
Monitor and prome u.s«
behavior and activities
Dtfcnd~r for Identity monitors
and analyzes user activitie-s and
Information across your
netwCH'k, including permissions
and group membership,
cre~ting <'I bthbvi()(al baseline
f01 cM:h us~r.
©
Protect u.s« Identities and
reduce the attack surface
Ol!(~tr fCK ldtntity givM
ii'!V,lluable insights on identity
confJgurations and suggested
security best practices.
Thtough security reports and
uset proflle analytics.
®
Identify suspldous activities
and advanced attacks across
the cyt.e-r.Utadc kUI·chaln
Reconnaissance
Compromised credentials
lateral m~ments
Domain dominance
®
lnVMtlgate alerts and
user activities
Defender for Identity is
designed to reduce general
aler1 noist, providing only
relevant. important security
alerts in a simple, real-tlme
Dfganluuional attack
timelint.
Microsoft Defender for Office 365
Microsoft Defender for Office 365 covers:
<D
®
Threat protection
policies
Threat investigation and
response capabilities
(4)
,_,
Automated investigation
and response capabil~ies
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is a platform designed to help enterprise networks protect
endpoints.
Microsoft Defender for Endpoint
-
......,.
..t
-
Thrut and
Vuln~n.billly
Man.agemen1
('I
~
AHack su rface
reduction
Next
gcnerOttlon
prolettlon
Ctntrali%~
Endpoint
dclecllon
1nd response
Automllled
IA'Vfltigatlon and
remedl11tlon
configuration, admini.str.~tion. and APis
....
Micro~ft
Threat Expen
Microsoft Cloud App Security
Mi<rosoft Cloud App Se<urily provides ri<h visibility to yoor doud servi<es. <ontrol over data travel. and sophisti<ated
analytia; to identify and <ombat cyberthreats a<ross all your Microsoft and third·party dood services.
---e-.
The Cloud App Security fr-llmework
• Discover and control the use of Shadow fT
~
• Protect your sensitive Information anywher~
in thedoud
• Protect against cyberttveats and anomalies
• Assess: your cloud apps' compliance
Offke 365 Cloud App Sta~rlty
Enhanced Cloud App Dlscov~ry In
A%ur e Adive Dlre«ory
Mkrosoft Cloud App
S.Curity 11rc.hite<ture
...
It
-~-
~ ~
-
_.,...__..,._
m
e. --. -...,
$'(1 ::..~
J
--•
I
--
Microsoft Se<:urity
Demo
Micro soft Cloud App Security
(MCAS)
Lesson 5: Describe security management
capabilities of Microsoft 365
0
Lesson 5 Introduction
In this module, you will:
@
Describe and
explore the
Microsoft 365
Defender
portal
@
@
@
Describe
how to use
Microsoft
Secure Score.
Explore
security
reports and
dashboards.
Describe
incidents and
incident
management
capabilities.
Microsoft 365 Defender portal
The Microsofl 365 Defender portal combines
protection, detection, investigation, and
response to email, collaboration, identity,
and device threats, in a central portal.
View the security health
of your organization.
Act to configure devices,
users, and apps.
Get alerts for suspicious activity.
The Microsoft 365 Defender navigation pane include these
options and more:
@ ~ @)
lnd dents
&alerts
Hunting
@
~)
·-.
~aming
hub
Action
center
../
Endpoints
~
Email &
f;OiluboraUon
©
r:=:-,
w
Threat
analytJcs
Retports
@
Secure
Scoro
ct.~
Permissio ns
& roles
Describe how to use Microsoft Secure Score
·--
Microsoft Secure Score is a
representation of a company's
security posture.
Will show all possible
improvements for the product.
whatever the license edition.
subsCI'iption. or plan.
,.•
Supporu re<ommendations for:
Microsoft 365
~ure Active Directory
Microsoft Defender for
Endpoint
Microsoft Defender for Identity
Cloud App Security
•
•
•
•
•
__
...
--·
-...
.._-·-----·-·
--
_
. -
-·--
·-,
,,
-------__ ------·
--·------. -- . - --- - - - -- -------. -·
,.. _
-·-------~
Microsoft Se<:urity
Demo
The Micro soft 365 Defender portal
Security reports a nd dashboards
_____...__________
The Microsoft 36S Defender portal Includes a Reports section. Shown below is the general security report.
-·---·
By default. cards are grouped by che
-~-
~
-
following categories:
ldentitiM - user accOUIHS and
c:redentia1s.
Data - email alld document
contents.
1- 1
v
•
•
Devices - computei'S, mobile
phones, and other devices.
Apps - programs and attached
online services.
•
•
You can group cards by topic (risk.
detection uends, configuration and
health. and other.
•
•
-·1 IIMft •t ,.;,"
•
-·-
--------·-
--
---- - -- ---
__..,.__
Incidents & incident management
Incidents are a collection of correlated alerts created when a suspicious event is found and provides a
comprehensive view and context of an attack .
(;;;··\
~
·.•
"\-I' .
..··
.........·····
•
Incident management
Managing incidents is critical in ensuring that threats are contained
and addressed. In Microsoft 365 Defender. you can manage
incidents o n devices, users accounts, and mailbo xes.
Lesson 6: Describe endpoint security with
Microsoft Intune
•
•
Lesson 6 Introduction
After complet ing this module, you should be able to:
. ··········....
[ .··o
1
....o
···········...
.\
'
.·..............
i'
~
.\
'
·..........•'/
Describe
what Intune is.
Describe
the tools available
with Intune.
,....o
···········\
:
\ '•
/
..
i
·····.·····
Describe
how to manage
devices with
Microsoft Endpoint
Manager:
Intune
Microsoft Intune is a cloud· based service that focuses on mobile device management (MOM) and mobile
application management (MAM).
/\
( MoM )
................/
When devkts are enrolled l)nd ~~ in ln1une. odmlri:stri3't01'$ Gllrt
See the devkes enrolled ard gee an inYen(OI')' of the ones accessing
organization resowces.
Conf;gure do-Ac., "' 1hey m«< yow S«Wty ond hoi!llh <Wd.l.,j<
Push certificates to devices so users can easiy access your Wi..fl
nei'WOft. Of use a VPN to <Onnea 10 it.
See ~ on usm and dtMces to dll'lemWM! if lhey"re <Onl)llant
Remove organization data if a devke is lost. .stoler\ or 001 used
·"""""'·
When apps are ma~td In lntunt. admlnlswtorS C'bn;
Add and assign mobil e apps to user groups and devkes.
Configure apps to S!41tt C)( rUn with specifiC Soe(tings etlo)bled and
updM<' eOsting apps :.lreldv on ~ cklvicl!'.
· See reports on Ydtit apps oo.o used and tr.rl ti'W us-age.
Do a ~ wipe by reMOW..g only Qt9.'niultion d3Ul ftotn :.pps.
Endpoint security with Intune
Manage
Manage
devices
security baselines
Configure
conditional access
Integration with
Microsoft Defender
for Endpoint
Oevice·based cooditiooat
Use policies to
manage device
security
Use device
compliance policy
Role·based access control
with M ic.r osoft Intune
access, to ensure only
managed iod compliant
devices eM acce:s.s network
«!SSurc:K
App•ba.wd conditional
acct>SS to manage access to
neiWOrtc resources by users
on devices th;u aren't
INIWiged with rmune.
Android
iOS/iPbdOS
Windows 10 or Mlet
Microsoft Se<:urity
Demo
Microsoft Intune
Module Summary
In this module, you have:
Learned about threat protection with Microsoft 365 Defender and its component solutions: Microsoft
Defender for Identity, Microsoft Defender for Endpoints, MCAS, and Microsoft Defender for Office 365.
Learned about the security management capabilities of Microsoft 365 with the Microsoft 365 Defender
portal and Secure Score.
Learned about Microsoft Intune.
Mkroso ft Security
SC-900TOO-A Mod ule 4:
Desc ribe t he Capabilities of
Micro soft Com pliance
Solut ions
Describe the compliance management capabilities in Microsoft
i'ep\
..............
Describe inrormation protection and governance capabilities of
Microsoft 365
Describe insider risk capabilities in Microsoft 36S
.....
t@fi
··.......••·
·······.~
.•.(6
:
·.•.." ....!
~
Describe eDiscovery, & audit capabilities in Microsoft 365
Describe resource governance capabilities in Azure
Lesson 1: Describe the compliance
managemen t capabi lities in Microsoft
Lesson 11ntroduction
After completing this module, you should be able to:
• Describe the benefit of the Service Trust Portal.
• Describe Microsoft's privacy principles.
• Explore the Microsoft 365 compliance center.
• Describe the benefits of Compliance Manager.
Common compliance needs
Several measures to protect data:
<.::.:.\
~)
Granting individuals the right to access their data at any time.
0
Granting individuals the right to correct or delete data about them if needed.
@
@
@
Introducing minimum or maximum retention periods for data.
Enabling governments and regulatory agencies the right to access and examine data when necessary.
Defining rules for what data can be processed and how t hat should be done.
Service Trust Portal
The Service Trust Portal provides:
•
Information
•
Tools
•
Other resources about Microsoft security,
privacy, and compliance practices.
You can access below offerings:
Service Trust Portal
•
Compliance Manager
Trust Documents
•
Industries & Regions
•
Trust Center
•
Resources
My Library
Microsoft's privacy principles
;:fS.; Control: Putting you, the customer, ln control of your privacy with easy-to-use took and dear chokes..
·'{!)'·
·.....·
Transp.arency: Being transparent about data collection and use so that everyone c<~n make informed decisions.
·'Kij'
·
•.....·
Se-curity. Protecting the data that's enlrusted to Mluosoft by using strong security and encryption.
·~··
·.....· Strong legAl prote«Jons: Respecting local privM:y laws and fighting ror legal protection or privacy as a fundame:ntal human right.
···.....
a··
No contont•b.ased targotin9= Not using ~m:uL C;hi.IL f..M. or other pc!C'SOOOI content to to\rget actv~rtis.lng.
~·.!.~:
Benefits to you; When Microsoft does collect datil, it's used to benefit you. the customer, and to make your experiences better.
Microsoft Se<:urity
Demo
Service Trust Porta l
Microsoft 365 Compliance Center
---·
Microsoft 365 Compliance center portal
A view of how the organization is
meeting its compliance requirements
::. - -
•
---
And more...
Navigation
--
to alerts. reports. policie-s, compliance
Add or remove options for a customized
navigation pane.
Customize navigation conuol.
.
____
Information about active alerts
and more.
•
·-
-
I
_
- ...... -----------
compliance ctt~ttr
compliance
solution~
Welcom• to the
Microsoft 365
Solutions that can be used to help with
Acc~s
•
-
--
"---·-'-·
Compliance Manager
Compliance Manager simplifies
compliance and reduces risk by providing;
Prebuilt assessments based on common standards
Wotkflow capabilities to complete risk assessments
Step·by·stcp improvement actions
Compliance score, shows overall compliance posture
Key elements of Compliance Manager
·---
------- •
____ __ -·-- ---..__ _
-- - - -----____
.. _ ...
-·-..
.....----_...__ -----·--- -· - -------~·-
,
....
Controls
1 --
Assessme-nts
1- - - ..___
Templates
Improvement actions
...
...
~
~=;;;
..
------
~
~
~
Comp liance score
Benefits of complianc e .score:
Help an organl:zation understand Its current
---
-~-
0
------- -
con,pllance poscure.
·-----------......
Help pnoritize actions based on their potent•al
to reduce risk.
Underst&~nd your complianc e score
Actjons
Your improved actions
MICtOSOft actioM
Acto0n types ( & actiOn subcotogcxyl
Mondatory (-tiYO, clele«JVe. 0< contc:.....)
Ot.screhonary (prewntrw., de-tKIM. 01 c«rtct~)
"
----__
__..,.......,_
---- ....--- ·-·
...,.__ _ _...,. ...
_..__
_____
f.=!
~
14111 _ __ ___J
-
IM-Jior~---
Microsoft Se<:urity
Demo
Micro soft 365 Compliance Center
Lesson 2: Describe information protection
and governance capabilities of Microsoft 365
Lesson 2 Introduction
After completing this module, you should be able to:
• Describe data classification capabilities.
• Describe records management.
• Describe data loss prevention.
Know your data, protect your data, and govern your data
..\/ 8······.../.
Know your data.~ Undetstand your data landscape Md identiry important
data across on-premlses, c:loud, and hybrid environments.
(rTJ'j
• \,!./ .
·........•'
Prot«t your data: Apply flexible protection actions including encryption.
access restrictions, and visual markings .
([j'·:
Prevent data loss= Detect risky behavior and prE!Vent acddental oversharing
of sensitive Information.
·: "··.••
./~
'
\ ......./
Govern your data: Automatically keep, delete, and store da1a and records
in a compliant manner.
.......
··...........
Data classification capabilities in the Microsoft 365 Compliance Center
·······...
.,.-8
t.
'•,
.....·}
Sensitive information types.
(CD")•'
.......
Trainable classifiers: Pre-trained classifiers and Custom trainable classifiers.
(!~i)
·........
Understand and explore the data.
•,
;"~\ The content explorer: It enables administrators to gain visibility into the content that has been
............/
,.-; ;··.
l.....
La
.....)
summarized in the overview pane.
The activity explorer: It can monitor what's being done with labeled content across the organization .
Sensitivity labels and policies
Label~
tabetsa1~
Cunomcuble
Ot.tl
lt:~
Ptrslsutnt
usagl':
Encrypt tma.•l and documents.
M~rk the content.
AfJ9ly lho lob<~ automotically.
Ptoct« content in containers: sites and groups.
Extend ......!Mty labels to UWd·potty- one! SOMCOS.
Oo"'ly con1en1 wrthout us;,g •rry pootoctlon ~bog<.
Policits en~ble ldmlns to;
Choose tM users and gfOUps that can see labfts
new emails and documeots
Require juS1ificlltions for t.abei changes
Appty a default tabtlto all
Requlrt users to apply a laix'l (mandlltory ~~lng)
Link users to custom M lp p&g~
Onct a sensit•vity Ia~ k applied to an ema~ or doc:umfil1.
¥'f'l configured prottchOI'I ~bn9S for thi:t labtl.,e enforctd
on the content.
Microsoft Se<:urity
Demo
Sensitivity labels
Describe data loss prevention (DLP)
DLP protects sensitive infonnation and prevents its
in;,dvertent disdosu~.
OPl policies ptO!Kt infotm.:ttlon by iderniiylng ~nd ~bCally
pootocting- d.>...
Protect sensitive int'ormaOOnacross Microsoft 365 .. ~for
Business. SharePOirn Online, bchange OriOe and Miaosolt Teams
Endpoint Data Loss Prevention
•
OLP e.l!tended to Windows tO devices.
Audit and manage activtties inducfmg creating, 'oping.
prlntjng. & renaming items
Data Loss Prevention in Microsoft Teams
OPL capabilities extended to Microsoft Teams chat and
channel message.
(OI'd tl()nl
Retention labels and policies
Retention settings work with SharePoint. OneDrive, Teams, Yammer and Exchange and help organizations manage
and gowm information by ensuring content is kept only for a required time, and then permanently delet ed.
Retention labEls:
• Are applied at an item level.
• Emails and documents can have only a single
retention label assigned to it at a time.
Retention settings from retention labels travel
with the content in your Microsoft 365 tenant.
• Can be applied manually or automatically.
Retention labels support disposition review of
the COl' tent before It's permanently deleted.
Retention policies:
Are applied at site or mailbox level,
Can be applied to multiple locations or
specific locations or users.
Items inherit the retention settings from their
container.
If an item is moved. the retention setting does
not travel to the new location.
Records management
Records management in Microsoft 365 helps an organization look after their legal obligations and helps to
demonstrate compliance with regulations.
When content is labeled as a record. the
o.n..v .... ""....... ~
following happens:
Restrictions are pvt in place to biO<k
o ~~~- -~~-® ,......... -· •.:ott~
certain activities.
..,__, . . .IOtcW•OMI• ~ ...,fritC--. . tot ..... IOCI\Mft •
Activities are loggM.
Proof of disposition is kept at the end of
the retention period.
ll'$(ho;l• . . . . . MW Ill" ........... lifO" • ~~ ,......., IIIMI•• Y'llo«il'll
To enable items to be marked as records,
an administrator sets up retention labels.
_ ,,. "'"'- r...,_, ... _" Oollo!• P.,...~o-oo..onr..l-. " " "t.-.-.
- -...
0
M.on.-··•......,.,.Notoot
,.. .... -
al ........_... . . .
@ o.....-...~
........ """"'" . _ ltc- ..._.1'-1 .. ~ -....
Lesson 3: Describe insider risk capabilities in
Microsoft 365
c ~........._ (c ;e:ts
.,....,._
Lesson 3 Introduction
After completing this module, you should be able to:
• Describe how Microsoft 365 can help organizations identify insider risks and
take appropriate action.
Insider risk solutions in Microsoft 365 (Siide l>
(if;\
·..\.!./.·•
Insider risk management helps minimize internal risks by enabling you to detect investigate, and act on
©
Communication compliance helps minimize communication risks by helping you detect. capture, and act
on inappropriate messages in your organization. Supported seiVices: Microsol\ Teams, Exchange Online.
Yammer, & 3"' party communications in an org.
.......
malicious and inadvertent activities in your organization.
Inf ormation barriers allow you to restrict communication and collaboration between two intemalgroups
to avoid a conflict of interest from occurring in your organization. Supported in Microsoft Teams, OneDrive
for Business. SharePoint Online, and more.
Insider risk solutions in Microsoft 365 (Siide2)
/~
·:······...
.
·.........•·'
'.
Privileged access management allows granular a<:cess control OVt!r privileged Elcchange Online admin
tasks in Office 365.
Customer lockbox ensures that Microsoft cannot access customer content to perfomn a sel\lice operation
without the customer'sexplidt approval. Supported services: Exchange Online. SharePoint Online,
OneOtive for Business.
Lesson 4: Describe eDiscovery & Audit
capabilities in Microsoft 365
c~...._..(c;e:ts
,...,._
Lesson 4 Introduction
After completing this module, you should be able to:
• Describe the purpose of eDiscovery & the capabilities of the content search
tool.
• Describe the core & advanced eDiscovery workflows.
• Describe the core and advanced audit capabilities of Microsoft 365.
eDiscovery & content search
Purpose of eDiscovery
Content Search
• Find electronic information to be used as
evidence when a company is involved in
litigation ..
Search for content in Exchange Online mailboxes,
Microsoft 365 Groups, Microsoft Teams,
SharePoint Online and OneDrive for Business
sites, Skype for Business conversations. and
Yammer teams.
• Use to identify, hold, and export content found in
mailboxes and sites.
•
•
Search Exchange Online mailboxes. SharePoint
Online sites, OneOrive for Business. Teams.
Microsoft 36S groups, Yammer groups
Build search queries and use conditions
Create, report on, and delete multiple searches
Vii!W keyword statistics
Search for third-party data
PowerShell scripts for more complex search
related tasks
Core and advanced eDiscovery workflows
0 . +
Op
..........
""""
...
...........
- -
Coro e Dis.covory
.......
-~-
~~IIIOul'("tof
-a
_.
0
,_.
li'My~c!Maln
0
J.
"""""..."
.....
Advanced e Dff.(overy builds on core o Di~eovery
Add persons ol •ru.erest (custodians) and dau s.owc~ tkat areri't assodat«l with a
Cteate a hold to ptes.erw COf'ltent dt.~t m.ght be
rt'lcv,lonl lO the c.a~ (m.AilboxO'S. sites, ;)ncf public
t
foldt'fs),
l.
spc<Tfic ~~K"r.
Use the buift·ln collections tool to s~rth data sources for CCH'Itent relewnt to the case.
l..
D.lta added to a rl!'kw set atl!! copied from their OtlgW\all«aHon to a s.ecure Azure
"
Use a wlde·wariety of tools aod ca~itles to vi~ and analyze the case data with go.l or
~udng the d1na set to wl\at is mou reltvMt to the use
S.
&port o11nd downi<Nd ColSCI d;~~ta
.....
Cleate and 1\.11\ ~arch~ for cont~t thlllr-~ates to the
).
-•
-..........
............
...
-..........
0 •..+ 0 p
&port and download .seaf<h tM\IIts.
Stor~go locatM)n.. The dat;) is rcind41:Kc:d t'lg~n to
optimcto fOt f•S1 seatchc:s
Audit capabilities of Microsoft 365
Core Audit
Allows organizations to view user and
administrator Ktivity.
An audited activity generate s an audit record t hat
Is stored in the audit log.
Searching the audit log requires the search
capability 10 be turned on and assigned the
appropri ate role.
The results can be filtered and exported to a CSV
file.
'
Advanced Audit - Core Audi~ plus:
Long-term retention of audit logs
Custormzed audit retentiOn poficies
High-bandwidth access to Office 365 Managem ent
Activity API
Acce-ss to crucial events for investjgations
M•dltemsAc:Ce$-Md
Sef1d
Searc.hQoerylnitiattdExc.hange
SearchQuerylnhiatedSI\arePoint
Lesson 5: Describe resource governance
capabilities in Azure
Lesson 5 Introduction
After completing this module, you should be able to:
• Describe some of the resource governance capabilities in Azure.
Azure Resource Manager locks
Azure Resource Manager Jocks
Prevent resources from being accidentally
deleted or changed.
Apply a lock at a parent scope, all resources
within that scope inherit that lock.
Apply only to operations that happen in the
management plane.
Changes to the actual resource are restricted, but
resource operations aren't restricted.
A lock level
CanNotOelete
ReadOnly
Azure Blueprints
Azure Blueprints provide a way to define a repeatable set of Azure resources.
Rapidly provision environments, that are in line with the organization's compliance requirements.
Provision Azure resources across several subscriptions simultaneously for quicker delivery.
Declarative way to orchestrate the deployment of various resource templates and artifacts, including:
-
Role Assignments
- Policy Assignments
-
Azure Resource Manager templates (ARM templales)
-
Resource Groups
Blueprint objects are replicated to multiple Azure regions.
The relationship between the blueprint definition and the blueprint assignment is preserved.
Azure Policy
Trigger a Policy
•valuation
•
0
00
0
0
0
0
()
0
00
0
0
0
0
0
Azure Policy
•
0 •••••
0
0
0
.••......·0.
Respons.sto
non-compliant
resources
H~lp
enforce standards and ass~·ss
com~i.lnct .x:ross your organization.
A comphance dashboard. to evilluate
tM owralt statr of the envtronmet'lt.
•• 0 ••••••
0
0
0
fiv
0
0
Ev•luatts resoutefl. rn Al1Jre and Arc
en~bltd
resourcu.
Otny •
······
0
}
0
•••
(~ to • l't'SOUI'(e_.
log dlalliljfS to • mourc:e.
Ah~ a teSOUI"Ce bereft Ot
ad\ange.
Depoy .....,od • ..,..,.
"""'"'...
.tter
Microsoft Se<:urity
Demo
Azure policy
Module Summary
In this lesson, you have:
•
Learned about the compliance management capabilities in M icrosoft. including the Service Trust
Portal, Microsoft 365 compliance center, M icrosoft privacy principles, and more.
•
Learned about the information protection and governance capabilities of Microsoft 365,
including sensitivity & retention labels, DLP, and more.
•
Learned about insider risk capabilities in Microsoft 365
•
Learned about eDiscovery & audit capabilities of Microsoft 365
•
Describe resource governance capabilities in Azure, including Azure policy, resource locks,
Blueprints, and more.
Descargar