Module 1: Introduction to Information Protection and Data Lifecycle Management in Microsoft Purview
- Discuss information protection and data lifecycle management and why it’s important.
- Describe Microsoft’s approach to information protection and data lifecycle management.
- Define key terms associated with Microsoft’s information protection and data lifecycle management solutions.
- Identify the solutions that comprise information and data lifecycle management in Microsoft Purview.
Module 2: Classify data for protection and governance
- List the components of the Data Classification solution.
- Identify the cards available on the Data Classification overview tab.
- Explain the Content explorer and Activity explorer.
- Describe how to use sensitive information types and trainable classifiers.
Module 3: Create and manage sensitive information types
- Recognize the difference between built-in and custom sensitivity labels
- Configure sensitive information types with exact data match-based classification
- Implement document fingerprinting
- Create custom keyword dictionaries
Module 4: Understand Microsoft 365 Encryption
- Explain how encryption mitigates the risk of unauthorized data disclosure.
- Describe Microsoft data-at-rest and data-in-transit encryption solutions.
- Explain how Microsoft 365 implements service encryption to protect customer data at the application layer.
- Understand the differences between Microsoft managed keys and customer managed keys for use with service encryption.
Module 5: Deploy Microsoft Purview Message Encryption
- Configure Microsoft Purview Message Encryption for end users
- Implement Microsoft Purview Advanced Message Encryption
Module 6: Protect information in Microsoft Purview
- Discuss the information protection solution and its benefits.
- List the customer scenarios the information protection solution addresses.
- Describe the information protection configuration process.
- Explain what users will experience when the solution is implemented.
- Articulate deployment and adoption best practices.
Module 7: Apply and manage sensitivity labels
- Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites.
- Monitor label usage using label analytics.
- Configure on-premises labeling.
- Manage protection settings and marking for applied sensitivity labels.
- Apply protections and restrictions to email.
- Apply protections and restrictions to files.
Module 8: Prevent data loss in Microsoft Purview
- Discuss the data loss prevention solution and its benefits.
- Describe the data loss prevention configuration process.
- Explain what users experience when the solution is implemented.
Module 9: Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
- Describe the integration of DLP with Microsoft Defender for Cloud Apps.
- Configure policies in Microsoft Defender for Cloud Apps.
Module 10: Manage data loss prevention policies and reports in Microsoft 365
- Review and analyze DLP reports.
- Manage permissions for DLP reports.
- Identify and mitigate DLP policy violations.
- Mitigate DLP violations in Microsoft Defender for Cloud Apps.
Module 11: Manage the data lifecycle in Microsoft Purview
- Discuss the Data Lifecycle Management solution and its benefits.
- List the customer scenarios the Data Lifecycle Management solution addresses.
- Describe the Data Lifecycle Management configuration process.
- Explain what users will experience when the solution is implemented.
- Articulate deployment and adoption best practices.
Module 12: Manage data retention in Microsoft 365 workloads
- Describe the retention features in Microsoft 365 workloads.
- Configure retention settings in Microsoft Teams, Yammer, and SharePoint Online.
- Recover content protected by retention settings.
- Regain protected items from Exchange Mailboxes.
Module 13: Manage records in Microsoft Purview
- Discuss the Microsoft Purview Records Management solution and its benefits.
- List the customer scenarios the Microsoft Purview Records Management solution addresses.
- Describe the Microsoft Purview Records Management configuration process.
- Explain what users will experience when the solution is implemented.
- Articulate deployment and adoption best practices.
Module 14: Explore compliance in Microsoft 365
- Describe how Microsoft 365 helps organizations manage risks, protect data, and remain compliant with regulations and standards.
- Plan your beginning compliance tasks in Microsoft Purview.
- Manage your compliance requirements with Compliance Manager.
- Manage compliance posture and improvement actions using the Compliance Manager dashboard.
- Explain how an organization’s compliance score is determined.
Module 15: Search for content in the Microsoft Purview compliance portal
- Describe how to use content search in the Microsoft Purview compliance portal.
- Design and create a content search.
- Preview the search results.
- View the search statistics.
- Export the search results and search report.
- Configure search permission filtering.
Module 16: Manage Microsoft Purview eDiscovery (Standard)
- Describe how Microsoft Purview eDiscovery (Standard) builds on the basic search and export functionality of Content search.
- Describe the basic workflow of eDiscovery (Standard).
- Create an eDiscovery case.
- Create an eDiscovery hold for an eDiscovery case.
- Search for content in a case and then export that content.
- Close, reopen, and delete a case.
Module 17: Manage Microsoft Purview eDiscovery (Premium)
- Describe how Microsoft Purview eDiscovery (Premium) builds on eDiscovery (Standard).
- Describe the basic workflow of eDiscovery (Premium).
- Create and manage cases in eDiscovery (Premium).
- Manage custodians and non-custodial data sources.
- Analyze case content and use analytical tools to reduce the size of search result sets.
Module 18: Manage Microsoft Purview Audit (Standard)
- Describe the differences between Audit (Standard) and Audit (Premium).
- Identify the core features of the Audit (Standard) solution.
- Set up and implement audit log searching using the Audit (Standard) solution.
- Export, configure, and view audit log records.
- Use audit log searching to troubleshoot common support issues.
Module 19: Prepare Microsoft Purview Communication Compliance
- List the enhancements in communication compliance over Office 365 Supervision policies, which it will replace.
- Explain how to identify and remediate code-of-conduct policy violations.
- List the prerequisites that need to be met before creating communication compliance policies.
- Describe the types of built-in, pre-defined policy templates.
Module 20: Manage insider risk in Microsoft Purview
- Explain how Microsoft Purview Insider Risk Management can help prevent, detect, and contain internal risks in an organization.
- Describe the types of built-in, pre-defined policy templates.
- List the prerequisites that need to be met before creating insider risk policies.
- Explain the types of actions you can take on an insider risk management case.
Module 21: Implement Microsoft Purview Information Barriers
- Describe how information barriers can restrict or allow communication and collaboration among specific groups of users.
- Describe the components of an information barrier and how to enable information barriers.
- Understand how information barriers help organizations determine which users to add or remove from a Microsoft Team, OneDrive account, and SharePoint site.
- Describe how information barriers prevent users or groups from communicating and collaborating in Microsoft Teams, OneDrive, and SharePoint.
Module 22: Manage regulatory and privacy requirements with Microsoft Priva
- Create and manage risk management policies for data overexposure, data transfer, and data minimization
- Investigate and remediate risk alerts
- Send user notifications
- Create and manage Subject Rights Requests
- Estimate and retrieve subject data
- Review subject data
- Create subject rights reports
Module 23: Implement privileged access management
- Explain the difference between privileged access management and privileged identity management.
- Describe the privileged access management process flow.
- Describe how to configure and enable privileged access management.
Module 24: Manage Customer Lockbox
- Describe the Customer Lockbox workflow.
- Explain how to approve or deny a Customer Lockbox request.
- Explain how you can audit actions performed by Microsoft engineers when access requests are approved.