SC 200: Mitigate threats using Microsoft Purview
- Offered byMicrosoft
SC 200: Mitigate threats using Microsoft Purview at Microsoft Overview
Duration | 4 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
SC 200: Mitigate threats using Microsoft Purview at Microsoft Highlights
- Earn a certificate of completion
SC 200: Mitigate threats using Microsoft Purview at Microsoft Course details
- Respond to data loss prevention alerts using Microsoft 365
- Manage insider risk in Microsoft Purview
- Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview Standard
- Investigate threats using audit in Microsoft 365 Defender and Microsoft Purview (Premium)
- Investigate threats with Content search in Microsoft Purview
- In this Learning Path we focus on Microsoft Purview's risk and compliance solutions that assist security operations analysts detect threats to organizations and identify, classify, and protect sensitive data, as well as monitor and report on compliance. This learning path aligns with exam SC-200: Microsoft Security Operations Analyst.
SC 200: Mitigate threats using Microsoft Purview at Microsoft Curriculum
Respond to data loss prevention alerts using Microsoft 365
Introduction
Describe data loss prevention alerts
Investigate data loss prevention alerts in Microsoft Purview
Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps
Knowledge check
Summary and resources
Manage insider risk in Microsoft Purview
Insider risk management overview
Introduction to managing insider risk policies
Create and manage insider risk policies
Knowledge check
Investigate insider risk alerts
Take action on insider risk alerts through cases
Manage insider risk management forensic evidence
Create insider risk management notice templates
Summary and knowledge check
Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview Standard
Introduction to threat investigation with the Unified Audit Log (UAL)
Explore Microsoft Purview Audit solutions
Implement Microsoft Purview Audit (Standard)
Start recording activity in the Unified Audit Log
Search the Unified Audit Log (UAL)
Export, configure, and view audit log records
Use audit log searching to investigate common support issues
Knowledge check
Summary and resources
Investigate threats using audit in Microsoft 365 Defender and Microsoft Purview (Premium)
Introduction to threat investigation with Microsoft Purview Audit (Premium)
Explore Microsoft Purview Audit (Premium)
Implement Microsoft Purview Audit (Premium)
Manage audit log retention policies
Investigate compromised email accounts using Purview Audit (Premium)
Knowledge check
Summary
Investigate threats with Content search in Microsoft Purview
Introduction
Explore Microsoft Purview eDiscovery solutions
Create a content search
View the search results and statistics
Export the search results and search report
Configure search permissions filtering
Search for and delete email messages
Knowledge check
Summary