Home Page Icon
Home Page
Table of Contents for
Microsoft Information Protection Administrator SC-400 Certification Guide
Close
Microsoft Information Protection Administrator SC-400 Certification Guide
by Shabaz Darr, Viktor Hedberg
Microsoft Information Protection Administrator SC-400 Certification Guide
Microsoft Information Protection Administrator SC-400 Certification Guide
Foreword
Contributors
About the authors
About the reviewer
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Share Your Thoughts
Section 1: Exam Overview and Introduction to Information Protection
Chapter 1: Preparing for Your Microsoft Exam and SC-400 Exam Objectives
Technical requirements
Preparing for a Microsoft exam
Accessing resources to prepare for the exam
How to access a Microsoft 365 subscription
Exam locations
Microsoft exam format
Accessing resources and Microsoft Learn
Accessing Microsoft Learn
Microsoft exam information pages
Creating a Microsoft 365 trial account
Microsoft 365 or Office 365 trial subscription
Obtaining the relevant license
Introducing the SC-400 exam objectives
Why should I take this exam?
Summary
Chapter 2: Introduction to Information Protection
Technical requirements
What is Information Protection?
Identify your data
Provide protection for your data
Govern your data
Information protection use cases
Understanding the scope of Information Protection
Why is Information Protection important?
What are the benefits of implementing Information Protection in your organization?
Summary
Section 2: Implementing Information Protection
Chapter 3: Creating and Managing Sensitive Information Types
Technical requirements
Accessing the Microsoft 365 compliance center
Selecting a sensitive information type based on an organization's requirements
Sensitive information type components
Custom sensitive information type features
Creating and managing custom sensitive information types
Testing a sensitive information type
Modifying custom sensitive information types in the compliance center
Removing custom sensitive information types in the compliance center
Creating custom sensitive information types with exact data matches
Saving sensitive data in .csv or .tsv file format
Defining the schema for your database of sensitive information
Setting up a rule package
Modifying the schema for EDM-based classification
Removing the schema for EDM-based classification
Implementing document fingerprinting
Creating a keyword dictionary
Building a keyword dictionary using the Security & Compliance Center
Creating a keyword dictionary from a file using PowerShell
Summary
Chapter 4: Creating and Managing Trainable Classifiers
Technical requirements
What are trainable classifiers?
Pretrained classifiers
Custom classifiers
Identifying when to use trainable classifiers
Creating a trainable classifier
Verifying that a trainable classifier is performing properly
Retraining a classifier
Summary
Chapter 5: Implementing and Managing Sensitivity Labels
Technical requirements
Identifying roles and permissions for administering sensitivity labels
Security & Compliance Center permissions
Relationship between roles, members, and role groups
Role groups within the Security and Compliance Center
Providing users with access to the Security and Compliance Center
Utilizing the Security and Compliance Center PowerShell to grant another user permission to the Security and Compliance Center
Creating and managing sensitivity labels and applying sensitivity labels to Microsoft SaaS applications
Applying labels to SharePoint Online and Microsoft 365 Groups
Configuring automatic labeling policies and monitoring label usage
Creating an auto-labeling policy
Monitoring information protection
Applying bulk classification to on-premises data and managing protection settings
Unified the labeling scanner
Unified labeling best practice requirements
Configuring on-premises labeling
Utilizing label analytics to monitor label performance
Applying and managing protections and restrictions
Manual label application
Utilizing auto-apply to apply labels by default
Summary
Chapter 6: Planning and Implementing Encryption for Email Messages
Technical requirements
Introduction to encryption in Microsoft 365
BitLocker and how it encrypts data at rest
Service encryption
Defining requirements for implementing Office 365 Advanced Message Encryption
Implementing Office 365 Advanced Message Encryption
Using mail flow rules to apply OME templates
Summary
Section 3: Implementing Data Loss Prevention
Chapter 7: Creating and Configuring Data Loss Prevention Policies
Technical requirements
Configuring data loss prevention for policy precedence
Amending rule priority
Amending policy priority
Configuring policies for Exchange Online, SharePoint sites, OneDrive, and Microsoft Teams
Custom DLP policy in Exchange Online
Custom DLP policy with SharePoint sites, OneDrive, and Microsoft Teams
Integrating Information Protection with, and configuring policies in Microsoft Defender for Cloud Apps
Configuring file policies in Microsoft Defender for Cloud Apps
Implementing data loss prevention policies in test mode
Enabling test mode in an existing DLP policy
DLP rule – user notifications
DLP rule – incident reports
Summary
Chapter 8: Implementing and Monitoring Microsoft Endpoint Data Loss Prevention
Technical requirements
Onboarding devices to Endpoint DLP
Configuring Endpoint DLP settings
Configuring policies for endpoints
Monitoring endpoint activities
Summary
Chapter 9: Managing and Monitoring Data Loss Prevention Policies and Activities
Technical requirements
Managing and responding to DLP policy violations
Implementing DLP rule exclusion
Reviewing and analyzing DLP reports
Reviewing DLP policy matches
Reviewing DLP incidents
Reviewing DLP false positives and overrides
Managing permissions for DLP reports
Managing DLP violations in Microsoft Defender for Cloud Apps
Summary
Section 4: Implementing Information Governance
Chapter 10: Configuring Retention Policies and Labels
Technical requirements
Creating and applying retention label policies
Configuring retention policies
Creating and applying retention labels
Configuring and publishing auto-apply label policies
Summary
Chapter 11: Managing Data Retention in Microsoft 365
Technical requirements
Creating and applying retention policies in Microsoft SharePoint and OneDrive
Preservation Hold Library functionality
Retention with document versioning – how it works
Configuring a retention policy for SharePoint Online and OneDrive for Business
Creating and applying retention policies in Microsoft Teams
Retention functionality with Teams
Recovering content in SharePoint and OneDrive
OneDrive for Business
SharePoint Online
Previous versions
Implementing retention policies and tags in Microsoft Exchange
How to create a new retention tag
Modifying the default retention policy
Applying mailbox holds in Microsoft Exchange
Applying a litigation hold
Implementing Microsoft Exchange Online archiving policies
Summary
Chapter 12: Implementing Records Management in Microsoft 365
Technical requirements
Configuring labels for records management
Managing and migrating retention requirements with a file plan
Configuring automatic retention using file plan descriptors
Implementing in-place records management in Microsoft SharePoint
Configuring event-based retention
Managing the disposition of records
Viewing and disposing of content
Summary
Practice Exam
Test questions
Answer key
Why subscribe?
Other Books You May Enjoy
Packt is searching for authors like you
Share Your Thoughts
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Microsoft Information Protection Administrator SC-400 Certification Guide
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset