Four Expert-Led Sessions
The training is divided into four sessions covering different aspects of M365. The sessions are held online from 3 pm to 5 pm CET, and presented in Swedish. Dates: April 23, April 24, May 7, and May 8.
The first session will focus on Entra ID, where we will talk about the importance of Zero trust and why you need to change many of the default settings in Entra ID to secure your identities.
The second session will cover how to protect your infrastructure using Microsoft Defender XDR. We will cover the different defender services to ensure that we can protect our endpoints and identities from threats and how we can use the capabilities of MD XDR to investigate suspicious activity in the environment.
The third session will focus on endpoints and how we can ensure that our devices can be secure and managed in the new hybrid work era. We will look at how Intune can help us secure both desktop and mobile operating systems.
In the fourth session, we will examine data security features within Microsoft 365. Many organizations store sensitive information in Office 365, which makes it important to ensure that the information does not end up in the wrong place. We will use Microsoft Purview services to classify and protect sensitive information.
After these sessions, you will have a unique and deep understanding of the threat-protection and compliance stack in Microsoft 365, how you can leverage it in your own environment, and prepare for when the worst happens.
Course Description:
Session 1 – Securing Entra ID
Entra ID is the identity platform used by all Microsoft 365 services. In this module you will learn why it’s so important to have good security controls in place and how to configure Entra ID to ensure your users and sign-ins are protected.
- Why the default settings in Entra ID needs to be changed.
- Start your Zero Trust journey with Conditional Access.
- Secure your MFA registrations.
- Understand the possibilities (and dangers) with Enterprise Applications.
- Protect your sign-ins with Identity Protection.
- Protect your administrative roles with Privileged Identity Management.
- Understand why logging is so important and how Entra ID logs will help your investigations.
- Is it time to replace traditional VPN solutions with Microsoft Entra Private Access?
Session 2 – Understanding Microsoft Defender XDR
Microsoft 365 contains a lot of powerful security features. Microsoft Defender XDR is a collection of multiple security services aimed at different parts of your IT infrastructure. In this module, you will learn how the Defender XDR suite help to secure your modern workplace and how to get the most out of the services.
- Protect your Endpoints with Defender for Endpoint.
- Get insight into your domain controller traffic with Defender for Identity.
- Ensure that your organization is protected from e-mail-originating threats with Defender for Office365.
- Monitor and control your cloud application usage with Defender for Cloud Apps.
Session 3 – Protect your endpoints with Microsoft Intune
With the new hybrid-work era, it’s important to have good management abilities on your endpoints wherever in the world they are located and whether you are using Windows, Mac, iOS, or Android devices. All of them need to be managed and monitored so your users can feel safe while performing their day-to-day work. In this module, you will learn how Intune can be used to properly manage and enforce security controls across your device platform.
- Configure Windows Autopilot.
- Onboard your mobile devices.
- What is Apple Business Manager and why is it important?
- Enforce security settings on your devices.
- Safeguard your corporate data on private and corporate-owned mobile devices.
- Use your devices to strengthen your Zero Trust configuration.
- Ensure that only the devices you approve can be enrolled.
Session 4 – Data Security in Microsoft 365
With a lot of potential sensitive information used and stored within Microsoft 365, it’s important as an organization to ensure that this information does not end up in the wrong hands. In this module you will learn how to use the available Purview features to protect your sensitive data. You will also learn why it is important to be in control of your data before implementing AI tools such as Microsoft Copilot.
- How Microsoft Purview Information Protection will classify and protect your documents and email messages.
- Use Purview Data Loss Protection to prevent information leakage to external parties.
- What you need to do before implementing Microsoft Copilot in your organization.
- Understand how Data Lifecycle Management ensures that you are in control of your data.
- Why it is so important to enable the Unified Audit Log, and how should you use it in case of a breach.
Sign up here!
Dates: April 23, April 24, May 7, and May 8.
Times: 15:00-17:00
Place: Online