Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft 365 Mobility and Security – Exam Guide MS-101

You're reading from   Microsoft 365 Mobility and Security – Exam Guide MS-101 Explore threat management, governance, security, compliance, and device services in Microsoft 365

Arrow left icon
Product type Paperback
Published in Nov 2019
Publisher Packt
ISBN-13 9781838984656
Length 312 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Nate Chamberlain Nate Chamberlain
Author Profile Icon Nate Chamberlain
Nate Chamberlain
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Section 1: Modern Device Services FREE CHAPTER
2. Implementing Mobile Device Management (MDM) 3. Managing Device Compliance 4. Planning for Devices and Apps 5. Planning Windows 10 Deployment 6. Section 2: Microsoft 365 Security Threat Management
7. Implementing Cloud App Security (CAS) 8. Implementing Threat Management 9. Implementing Windows Defender ATP 10. Managing Security Reports and Alerts 11. Section 3: Microsoft 365 Governance Compliance
12. Configuring Data Loss Prevention (DLP) 13. Implementing Azure Information Protection (AIP) 14. Managing Data Governance 15. Managing Auditing 16. Managing eDiscovery 17. Section 4: Mock Exams
18. Mock Exam 1
19. Mock Exam 2
20. Assessments 21. Another Book You May Enjoy

How to get the most out of this book

While this book alone will introduce you to concepts and refresh your memory on topics you may be less familiar with, you can maximize your studies by practicing and exploring what you're learning first-hand in an actual tenant.

As you'll find in this book, it's recommended that you get a Microsoft 365 E5 subscription in order to explore, but you could also combine a Microsoft 365 E3 trial with an Enterprise Mobility and Security E5 trial to cover most of the book's topics. In the end, what matters most is that you make sure you get a trial or a subscription to the services and apps you feel least confident with so that you can spend time exploring them first hand.

Download the color images

Conventions used

There are a number of text conventions used throughout this book.

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."

Any command-line input or output is written as follows:

Set-Mailbox 'Nate Chamberlain' -AuditEnabled $true

Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Click on Site Collection Audit Settings under Site Collection Administration."

Warnings or important notes appear like this.
Tips and tricks appear like this.
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image