What this book covers
Chapter 1, Preparing for Your Microsoft Exam, provides guidance on getting prepared for a Microsoft exam, along with the resources that can assist in your learning plans.
Chapter 2, Introduction to Information Protection, provides an introduction to information protection, including what it is and why it is so important. This chapter will also discuss the benefits of implementing information protection in your organization.
Chapter 3, Creating and Managing Sensitive Information Types, focuses on creating sensitive information types of data and how to manage these in an organization.
Chapter 4, Creating and Managing Trainable Classifiers, introduces trainable classifiers, and how to identify, create, and manage them. We will also look at how to verify that they are performing correctly and how to retrain a classifier.
Chapter 5, Implementing and Managing Sensitivity Labels, examines the roles and permissions required to administer sensitivity labels as well as create and manage policies and how to apply them to Microsoft 365 SaaS applications. We will also look at the integration of classification with on-premises data and the application of protections and restrictions to files.
Chapter 6, Planning and Implementing Encryption for Email Messages, provides an overview of what encryption in Microsoft 365 looks like and then focuses on email encryption specifically. We will look at defining requirements and then implementing Office 365 Message Encryption.
Chapter 7, Creating and Configuring Data Loss Prevention Policies, covers how to create data loss prevention policies in Microsoft 365 in order to discover, classify, and protect sensitive and business-critical content throughout its life cycle across your organization.
Chapter 8, Implementing and Monitoring Microsoft Endpoint Data Loss Prevention, examines the planning and implementation of Microsoft Endpoint data loss prevention, which extends the activity monitoring and protection capabilities of data loss prevention to sensitive items that are on Windows 10 devices.
Chapter 9, Managing and Monitoring Data Loss Prevention Policies and Activities, discusses how to respond to and mitigate data loss policy violations using the Microsoft Purview Compliance Portal and Microsoft Defender for Cloud Apps.
Chapter 10, Configuring Retention Policies and Labels, examines the planning and implementation of retention labels and policies. This will include deploying, managing, and configuring retention labels and policies for your Microsoft 365 tenant.
Chapter 11, Managing Data Retention in Microsoft 365, discusses how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services.
Chapter 12, Implementing Microsoft Purview Records Management, covers how to use intelligent classification to automate and simplify the retention schedule for regulatory and business-critical records in your organization.