SpireTecSolutions
MS - 102 : Microsoft 365 Administrator
SpireTecSolutions, Jackson, Mississippi, United States
MS - 102 : Microsoft 365 Administrator
This course equips IT professionals with the skills to manage Microsoft 365 services, including user identities, security, compliance, and supporting technologies for seamless organizational operations.
Overview of Course Content:
Configure Your Microsoft 365 Experience
– Configure your organization’s profile and manage subscriptions and services. Ensure your Microsoft Entra tenant meets business needs.
Manage Users, Licenses, and Mail Contacts
– Choose and manage user identity models; create, recover, and bulk‑manage user accounts; manage mail contacts via Exchange admin center and PowerShell.
Manage Groups in Microsoft 365
– Understand and manage different group types; create and manage groups through various tools.
Add a Custom Domain
– Consider factors and plan DNS zones and records for custom domains; add a custom domain to Microsoft 365.
Configure Client Connectivity
– Identify required DNS records and connectivity protocols; troubleshoot connectivity issues.
Configure Administrative Roles
– Understand Azure RBAC and common admin roles; delegate roles, manage permissions, and use Privileged Identity Management.
Manage Tenant Health and Services
– Monitor service health, develop incident response plans, and request Microsoft support.
Deploy Microsoft 365 Apps for Enterprise
– Configure deployment strategies and manage updates for Microsoft 365 Apps.
Analyze Workplace Data with Microsoft Viva Insights
– Utilize insights for improving collaboration, identifying stressors, and assessing work culture.
Explore Identity Synchronization
– Understand authentication models and directory synchronization.
Prepare for Identity Synchronization
– Configure Azure AD and plan directory synchronization.
Implement Directory Synchronization Tools
– Set up and monitor Microsoft Entra Connect Sync and Cloud Sync; ensure efficient synchronization, manage groups, and use Identity Manager.
Manage Secure User Access
– Configure password policies, self‑service management, MFA, and conditional access.
Examine Threat Vectors and Data Breaches
– Understand attack methods, mitigate breaches, and prevent data exfiltration.
Explore Zero Trust Security Model
– Implement Zero Trust principles and Microsoft’s strategy.
Explore Security Solutions in Microsoft Defender XDR
– Utilize Microsoft Defender for email, identity, endpoint protection, and Threat Intelligence; use Secure Score to identify security gaps and actions to improve security.
Examine Privileged Identity Management
– Manage and monitor access to resources and use Privileged Access Management; protect identities, enable policies, and manage security breaches.
Examine Email Protection in Microsoft 365
– Utilize Exchange Online Protection to safeguard against spam and malware.
Enhance Email Protection with Microsoft Defender for Office 365
– Use Safe Attachments and Safe Links features for added security.
Manage Safe Attachments
– Create and configure Safe Attachments policies and manage end‑user experiences.
Manage Safe Links
– Create and configure Safe Links policies and manage user interactions.
Explore Threat Intelligence in Microsoft Defender XDR
– Use threat intelligence, alerts, and advanced hunting for cybersecurity.
Implement App Protection with Microsoft Defender for Cloud Apps
– Improve visibility, control, and manage cloud app protection.
Implement Endpoint Protection with Microsoft Defender for Endpoint
– Onboard devices, manage vulnerabilities, and configure threat management.
Implement Threat Protection with Microsoft Defender for Office 365
– Use protection stacks, Threat Explorer, and Attack Simulator.
Examine Data Governance Solutions in Microsoft Purview
– Manage data protection, lifecycle, insider risks, and eDiscovery.
Explore Archiving and Records Management
– Enable archive mailboxes, configure retention labels, and restore deleted data.
Explore Retention in Microsoft 365
– Manage retention policies and labels, and understand retention principles.
Explore Microsoft Purview Message Encryption
– Configure message encryption and branding templates.
Explore Compliance in Microsoft 365
– Manage risks and compliance with Microsoft Purview and Compliance Manager; create and manage insider risk policies and alerts; restrict or allow communications and collaborations with information barriers.
Explore Microsoft Purview Data Loss Prevention
– Manage DLP policies and monitor data protection; create and manage custom DLP policies and notifications.
Implement Data Classification of Sensitive Information
– Develop a data classification framework and use trainable classifiers.
Explore Sensitivity Labels
– Understand and configure sensitivity labels for data protection.
Implement Sensitivity Labels
– Create, configure, and publish sensitivity labels and manage label policies.
Audience Profile This course is designed for individuals aspiring to become Microsoft 365 Administrators who have completed at least one Microsoft 365 role‑based administrator certification path.
Prerequisites None.
Benefits Benefit from our 1‑On‑1 Training for personalized, focused, and effective learning experiences.
Customized Training Experience our Customized Training service tailored to meet your specific learning needs and goals. Join our class featuring 4‑hour weekend sessions for in‑depth learning and expert training.
Free Demo Class Join our Free Demo Class to experience top‑notch training and expert guidance first hand!
Purchase This Course Live Online Training (Duration: 40 Hours) – Guaranteed to run classes as per your convenient time zone. Industry‑experienced & certified trainers. Query handling session by technical expert after 2 months completion of training. Custom tailored training as per the requirement. Exam assistance. Exam mock papers. 100% quality assurance with certified & industry experienced trainer. 4 hours weekday.
Request More Information Certificate.
Get Ahead With SpireTec Solutions Training Certificate Earn Your Certificate Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.
Differentiate Yourself with Masters Certificate Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.
Share Your Achievement Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.
#J-18808-Ljbffr
Overview of Course Content:
Configure Your Microsoft 365 Experience
– Configure your organization’s profile and manage subscriptions and services. Ensure your Microsoft Entra tenant meets business needs.
Manage Users, Licenses, and Mail Contacts
– Choose and manage user identity models; create, recover, and bulk‑manage user accounts; manage mail contacts via Exchange admin center and PowerShell.
Manage Groups in Microsoft 365
– Understand and manage different group types; create and manage groups through various tools.
Add a Custom Domain
– Consider factors and plan DNS zones and records for custom domains; add a custom domain to Microsoft 365.
Configure Client Connectivity
– Identify required DNS records and connectivity protocols; troubleshoot connectivity issues.
Configure Administrative Roles
– Understand Azure RBAC and common admin roles; delegate roles, manage permissions, and use Privileged Identity Management.
Manage Tenant Health and Services
– Monitor service health, develop incident response plans, and request Microsoft support.
Deploy Microsoft 365 Apps for Enterprise
– Configure deployment strategies and manage updates for Microsoft 365 Apps.
Analyze Workplace Data with Microsoft Viva Insights
– Utilize insights for improving collaboration, identifying stressors, and assessing work culture.
Explore Identity Synchronization
– Understand authentication models and directory synchronization.
Prepare for Identity Synchronization
– Configure Azure AD and plan directory synchronization.
Implement Directory Synchronization Tools
– Set up and monitor Microsoft Entra Connect Sync and Cloud Sync; ensure efficient synchronization, manage groups, and use Identity Manager.
Manage Secure User Access
– Configure password policies, self‑service management, MFA, and conditional access.
Examine Threat Vectors and Data Breaches
– Understand attack methods, mitigate breaches, and prevent data exfiltration.
Explore Zero Trust Security Model
– Implement Zero Trust principles and Microsoft’s strategy.
Explore Security Solutions in Microsoft Defender XDR
– Utilize Microsoft Defender for email, identity, endpoint protection, and Threat Intelligence; use Secure Score to identify security gaps and actions to improve security.
Examine Privileged Identity Management
– Manage and monitor access to resources and use Privileged Access Management; protect identities, enable policies, and manage security breaches.
Examine Email Protection in Microsoft 365
– Utilize Exchange Online Protection to safeguard against spam and malware.
Enhance Email Protection with Microsoft Defender for Office 365
– Use Safe Attachments and Safe Links features for added security.
Manage Safe Attachments
– Create and configure Safe Attachments policies and manage end‑user experiences.
Manage Safe Links
– Create and configure Safe Links policies and manage user interactions.
Explore Threat Intelligence in Microsoft Defender XDR
– Use threat intelligence, alerts, and advanced hunting for cybersecurity.
Implement App Protection with Microsoft Defender for Cloud Apps
– Improve visibility, control, and manage cloud app protection.
Implement Endpoint Protection with Microsoft Defender for Endpoint
– Onboard devices, manage vulnerabilities, and configure threat management.
Implement Threat Protection with Microsoft Defender for Office 365
– Use protection stacks, Threat Explorer, and Attack Simulator.
Examine Data Governance Solutions in Microsoft Purview
– Manage data protection, lifecycle, insider risks, and eDiscovery.
Explore Archiving and Records Management
– Enable archive mailboxes, configure retention labels, and restore deleted data.
Explore Retention in Microsoft 365
– Manage retention policies and labels, and understand retention principles.
Explore Microsoft Purview Message Encryption
– Configure message encryption and branding templates.
Explore Compliance in Microsoft 365
– Manage risks and compliance with Microsoft Purview and Compliance Manager; create and manage insider risk policies and alerts; restrict or allow communications and collaborations with information barriers.
Explore Microsoft Purview Data Loss Prevention
– Manage DLP policies and monitor data protection; create and manage custom DLP policies and notifications.
Implement Data Classification of Sensitive Information
– Develop a data classification framework and use trainable classifiers.
Explore Sensitivity Labels
– Understand and configure sensitivity labels for data protection.
Implement Sensitivity Labels
– Create, configure, and publish sensitivity labels and manage label policies.
Audience Profile This course is designed for individuals aspiring to become Microsoft 365 Administrators who have completed at least one Microsoft 365 role‑based administrator certification path.
Prerequisites None.
Benefits Benefit from our 1‑On‑1 Training for personalized, focused, and effective learning experiences.
Customized Training Experience our Customized Training service tailored to meet your specific learning needs and goals. Join our class featuring 4‑hour weekend sessions for in‑depth learning and expert training.
Free Demo Class Join our Free Demo Class to experience top‑notch training and expert guidance first hand!
Purchase This Course Live Online Training (Duration: 40 Hours) – Guaranteed to run classes as per your convenient time zone. Industry‑experienced & certified trainers. Query handling session by technical expert after 2 months completion of training. Custom tailored training as per the requirement. Exam assistance. Exam mock papers. 100% quality assurance with certified & industry experienced trainer. 4 hours weekday.
Request More Information Certificate.
Get Ahead With SpireTec Solutions Training Certificate Earn Your Certificate Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.
Differentiate Yourself with Masters Certificate Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.
Share Your Achievement Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.
#J-18808-Ljbffr