Configuring and Managing Office 365 Security

In this course, you'll learn how to configure and manage the security features of Microsoft Office 365 and Azure Active Directory to protect your organization's identities, endpoints, and information in the cloud.
Course info
Rating
(25)
Level
Intermediate
Updated
May 8, 2018
Duration
6h 23m
Table of contents
Course Overview
Course Introduction
Protecting Office 365 Mailboxes with Exchange Online Protection
Protecting Office 365 Services with Advanced Threat Protection
Protecting Endpoints with Windows Defender Advanced Threat Protection
Securing User and Admin Access with Identity Protection in Office 365
Protecting Corporate Data with Information Protection in Office 365
Detecting Intrusions with Azure Advanced Threat Protection (ATP)
Investigating and Responding to Office 365 Security Events
Course Wrap Up
Description
Course info
Rating
(25)
Level
Intermediate
Updated
May 8, 2018
Duration
6h 23m
Description

Moving applications and data to the cloud presents new security challenges for organizations that need a new approach to IT security. In this course, Configuring and Managing Office 365 Security, you will gain the ability to secure your Microsoft Office 365 cloud services and data from attackers. First, you will learn about the three pillars of modern IT security. Next, you will discover the Office 365 and Azure security features that secure your organization's identities, endpoints, and information. Finally, you will explore how to leverage your new skills to detect and respond to security incidents. When you’re finished with this course, you will have the skills and knowledge of Office 365 security needed to keep your organization safe in the cloud.

About the author
About the author

Paul Cunningham is a Microsoft MVP, consultant, trainer and author, specializing in Office 365 and Exchange Server. Paul lives in Brisbane, Australia and has over 20 years of experience deploying and managing Microsoft systems and services for enterprise and government customers. Paul has authored and co-authored several books about Office 365 and Microsoft Exchange Server.

More from the author
Preparing to Migrate to Office 365
Beginner
2h 32m
6 Aug 2018
Office 365 Administration Playbook
Intermediate
3h 0m
18 Oct 2017
More courses by Paul Cunningham
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello everyone. My name is Paul Cunningham, and welcome to Configuring and Managing Office 365 Security. Security is one of the top concerns for organizations who are moving to the cloud, and it requires a whole new way of thinking about how you protect your business in a world of permanent connectivity, mobile workforces, and cloud-based productivity. Customers are surprised to find their old approach to securing IT doesn't fit the new cloud reality. In Office 365, Microsoft has made security a top priority, from their highly secure data centers to their secure development lifecycle for building and maintaining the cloud services you rely on, all the way to you, as the customer, providing you with the tools you need to secure your organization from modern threats. Now it's on to you to do the work. Securing your Office 365 applications and data requires you to take what Microsoft has provided and apply it to your unique requirements. And in this course, I'm going to show you how. We're going to look at a broad range of security features in Office 365 and how they each address the requirements to secure the 3 main pillars of security in modern IT: identities, devices, and information. At the end of this course, you'll understand how you can implement Office 365 security features to apply a layered, defense in depth strategy to reduce the risks that your organization faces in the cloud. This is Configuring and Managing Office 365 Security at Pluralsight. Now let's get started.

Detecting Intrusions with Azure Advanced Threat Protection (ATP)
In this module, we're going to look at the features of Azure Advanced Threat Protection. We're going to cover the role that Azure ATP plays in your overall security strategy, how to provision Azure ATP for your on premises Active Directory environment, how to configure Azure ATP, and how to use Azure ATP to investigate intrusions in your on premises environment. So let's start with a few quick points about Azure ATP, and yes, Microsoft has created another service with the ATP naming. But Azure ATP is not to be confused with Office 365 ATP or Windows Defender ATP. Azure ATP is the cloud-based version of Advanced Threat Analytics or ATA for short. ATA is an on premises product. Deploying ATA involves installing an ATA server in your environment. Azure ATP is cloud-based and requires no additional on premises service. Azure ATP is designed for hybrid environments, customers who are using Office 365, but still have on premises Active Directory infrastructure in place. Like ATA, Azure ATP detects suspicious activity in your on premises Active Directory environment. You can use Azure ATP if you have Enterprise Mobility and Security E5 licenses, so if you want to trial Azure ATP, a great way to do that is to start an EMS E5 trial. EMS has a lot of other features in it though, so make sure you research and plan what you're going to actually test during the trial period so you can give Azure ATP the attention it deserves without missing out on the other great EMS features as well.