Microsoft 365 Mobility and Security: Governance and Compliance
Explore the broad range of Microsoft 365 technologies that facilitate addressing governance and compliance requirements in this course.
The topics of security on one side and governance and compliance on the other are similar in scope, but uniquely different in what they aim to accomplish. In a Microsoft 365 environment, you generally implement security controls to protect against bad behaviors from the outside. It’s the bad behaviors from the inside that are generally the purview of governance and compliance controls. In this course, Microsoft 365 Mobility and Security: Governance and Compliance, the final course in this learning path, you’ll learn about the quite broad range of tools Microsoft supplies to handle the compliance and governance issues in a Microsoft 365 tenant. First, you’ll explore the compliance regulations themselves, down to the very specific configurations required by each regulatory control, and how Microsoft 365 Compliance Center surfaces an easy-to-use interface for identifying and resolving each requirement. Next, you’ll dig into information governance by way of retention policies and retention labels. Then, you’ll learn about the broad range of information protection solutions in Microsoft 365 that can extend across both cloud and on-premises infrastructure components, including the use of Data Loss Protection policies for, among other things, preventing the exfiltration of data. Finally, you’ll discover the search, eDiscovery, and other investigation solutions Microsoft 365 surfaces for helping you, and others, find data wherever it might hide. By the end of this course, you’ll have the skills and knowledge to be able to handle the governance and compliance issues in Microsoft 365.
Author Name: Greg Shields
Author Description:
Greg Shields is Sr. Director of IT Ops Skills at Pluralsight and formerly Principal Author Evangelist. Reach him on Twitter @ConcentratdGreg.
Table of Contents
- Course Overview
2mins - Introduction
4mins - Plan for Compliance Requirements
15mins - Manage Information Governance
33mins - Implement Information Protection
49mins - Plan and Implement Data Loss Prevention
28mins - Manage Search and Investigation
26mins
There are no reviews yet.