Hoofdstukken
Les 4 Exchange Online Protection
- 4.1 What is Exchange Online Protection
- 4.2 Understanding Zero Hour Auto Purge
- 4.3 Spoofing and Phishing Protection
- 4.4 Configuring with Exchange AntiSpam
- 4.5 Configuring Exchange AntiMalware
- 4.6 Creating a Safe Attachment Policy
- 4.7 Creating a Transport Rule to Bypass Safe Attachments
- 4.8 Creating a Safe Links Policy
- 4.9 Creating a Transport Rule to Bypass Safe Links
- 4.10 Monitoring and Reporting
Les 6 Microsoft Data Governance
- 6.1 In-Place Archive in Exchange
- 6.2 Enabling In-Place Archiving
- 6.3 In-Place Records Management in SharePoint
- 6.4 Activating In-Place Records Management
- 6.5 Messaging Records Management
- 6.6 Creating MRM Policy and Tags
- 6.7 Troubleshooting MRM Policies that Don't Run
- 6.8 Information Rights Management in Exchange
- 6.9 Information Rights Management in SharePoint
- 6.10 Office 365 Message Encryption
Les 7 Security and Compliance
- 7.1 Planning Security and Compliance Roles
- 7.2 Reviewing GDPR Needs
- 7.3 Building an Ethical Wall
- 7.4 Working with a Retention Policy
- 7.5 Creating a Retention Policy
- 7.6 Data Loss Prevention
- 7.7 Creating a DLP Policy
- 7.8 Troubleshooting Policy Tips
- 7.9 What is Azure Information Protection
- 7.10 Planning Azure Information Protection
- 7.11 Configuring Super User for AIP
- 7.12 Implementing the AIP Labels and Policies
- 7.13 Working with AIP Labels and Policies
- 7.14 What is Windows Information Protection
- 7.15 Planning for Windows Information Protection
- 7.16 Implementing Windows Information Protection
Les 9 Planning for Device Management
- 9.1 Planning for Device Management
- 9.2 Prerequisites for Using Co-Management
- 9.3 Enabling Co-Management
- 9.4 Transferring Service to Intune
- 9.5 What is the Microsoft Store for Business
- 9.6 Configuring the Microsoft Store for Business
- 9.7 Managing Settings for the Microsoft Store for Business
- 9.8 What is the Mobile Application Management
- 9.9 Configuring Mobile Application Management
- 9.10 Using Azure Ad for Apps