By browsing this site, you agree to the use of cookies, which enhance your experience, analyze how you integrate with our site and customize our content to your personal needs and search. Saiba mais
0
Español
English
Select country:
Antigua & Barbuda
Argentina
Bahamas
Barbados
Belize
Bolivia
Brazil
Chile
Colombia
Costa Rica
Cuba
Dominica
Dominican Republic
Ecuador
El Salvador
Grenada
Guatemala
Guyana
Honduras
Jamaica
Mexico
Nicaragua
Panama
Paraguay
Peru
Puerto Rico
Saint Kitts & Nevis
Saint Lucia
Saint Vincent & Grenadines
Suriname
Trinidad & Tobago
Uruguay
Venezuela
Albania
Austria
Belgium
Bosnia & Herzegovina
Bulgaria
Croatia
Cyprus
Czech Republic
Denmark
Estonia
Finland
France
Germany
Greece
Hungary
Iceland
Ireland
Italy
Latvia
Lithuania
Luxembourg
Malta
Montenegro
Netherlands
North Macedonia
Norway
Poland
Portugal
Romania
Serbia
Slovakia
Slovenia
Spain
Sweden
Switzerland
Turkey
Ukraine
United Kingdom
Canada
United States
Australia
Cambodia
China
Hong Kong
India
Indonesia
Japan
Malaysia
Micronesia
New Zealand
Pakistan
Philippines
Singapore
South Korea
Taiwan
Thailand
Vietnam
Bahrain
Iran
Iraq
Israel
Jordan
Kuwait
Lebanon
Oman
Qatar
Saudi Arabia
Syria
United Arab Emirates
Algeria
Egypt
Kenya
Morocco
Nigeria
Senegal
South Africa
Sudan
Tunisia
Ficaremos felizes em atendê-lo!
Contato
Microsoft 365 Security Administrator (MS-500) – Outline
Outline detalhado do curso
User and Group Security
User Accounts in Microsoft 365 Administrator Roles and Security Groups in Microsoft 365 Password Management in Microsoft 365 Azure AD Identity Protection Identity Synchronization
Introduction to Identity Synchronization Planning for Azure AD Connect Implementing Azure AD Connect Managing Synchronized Identities Federated Identities
Introduction to Federated Identities Planning an AD FS Deployment Implementing AD FS Access Management
Conditional Access Managing Device Access Role Based Access Control (RBAC) Solutions for External Access Security in Microsoft 365
Threat Vectors and Data Breaches Security Solutions for Microsoft 365 Microsoft Secure Score Advanced Threat Protection
Exchange Online Protection Office 365 Advanced Threat Protection Managing Safe Attachments Managing Safe Links Azure Advanced Threat Protection Windows Defender Advanced Threat Protection Threat Intelligence
Microsoft 365 Threat Intelligence Using the Security Dashboard Configuring Advanced Threat Analytics Mobility
Plan for Mobile Application Management Plan for Mobile Device Management Deploy Mobile Device Management Enroll Devices to Mobile Device Management Information Protection
Information Rights Management Secure Multipurpose Internet Mail Extension Office 365 Message Encryption Azure Information Protection Advanced Information Protection Windows Information Protection Data Loss Prevention
Data Loss Prevention Explained Data Loss Prevention Policies Custom DLP Policies Creating a DLP Policy to Protect Documents Policy Tips Cloud Application Security
Cloud Application Security Explained Using Cloud Application Security Information Office 365 Cloud App Security Archiving and Retention
Archiving in Microsoft 365 Retention in Microsoft 365 Retention Policies in the Security and Compliance Center Archiving and Retention in Exchange In-place Records Management in SharePoint Data Governance in Microsoft 365
Planning Security and Compliance Needs Building Ethical Walls in Exchange Online Manage Retention in Email Troubleshooting Data Governance Analytics and Telemetry Managing Search and Investigations
Searching for Content in the Security and Compliance Center Audit Log Investigations Advanced eDiscovery