MS-4006

Copilot for Microsoft 365 for Administrators Training

This Copilot for Microsoft 365 for Administrators course examines the Microsoft Copilot for Microsoft 365 design and then focuses on Copilot's security and compliance features. Administrators learn how to configure their Microsoft 365 tenant to protect their company's organizational data before implementing Copilot for Microsoft 365.

Course Details

Duration

1 day

Skills Gained

  • Understand the Microsoft Copilot for Microsoft 365 design and how it works
  • Grasp the key tasks administrators must complete when implementing Microsoft Copilot for Microsoft 365
  • Understand how Microsoft Copilot for Microsoft 365 adheres to existing privacy and compliance obligations
  • Implement the various features provided in the Microsoft 365 ecosystem for securing user access
  • Use roles and role groups in the Microsoft 365 permission model
  • Use sensitivity labels from the Microsoft Information Protection solution to classify and protect data
  • Implement sensitivity labels and apply for proper administrative permissions
Course Outline
  • Examine the Copilot for Microsoft 365 design
    • Examine the Copilot for Microsoft 365 logical architecture
    • Examine the key components of Copilot for Microsoft 365
    • Explore the Copilot for Microsoft 365 service and tenant architecture
    • Extend Copilot for Microsoft 365 with plugins and Microsoft Graph connectors
  • Implement Copilot for Microsoft 365
    • Get ready for Copilot for Microsoft 365
    • Prepare your data for searches in Copilot for Microsoft 365
    • Protect your Copilot for Microsoft 365 data with Microsoft 365 security tools
    • Assign your Copilot for Microsoft 365 licenses
    • Drive Copilot for Microsoft 365 adoption with a Copilot Center of Excellence
  • Examine data security and compliance in Copilot for Microsoft 365
    • Examine how Copilot for Microsoft 365 uses your proprietary business data
    • Examine how Copilot for Microsoft 365 protects sensitive business data
    • Examine how Copilot for Microsoft 365 uses Microsoft 365 isolation and access controls
    • Examine how Copilot for Microsoft 365 meets regulatory compliance mandates
  • Manage secure user access in Microsoft 365
    • Examine the identity and access tools used in Microsoft 365
    • Manage user passwords
    • Implement Conditional Access policies
    • Enable pass-through authentication
    • Implement multifactor authentication
    • Enable passwordless sign-in with Microsoft Authenticator
    • Explore self-service password management
    • Explore Windows Hello for Business
    • Implement Microsoft Entra Smart Lockout
    • Explore Security Defaults in Microsoft Entra ID
    • Investigate authentication issues using sign-in logs
  • Manage permissions, roles, and role groups in Microsoft 365
    • Examine the use of roles in the Microsoft 365 permission model
    • Manage roles across the Microsoft 365 ecosystem
    • Explore administrator roles in Microsoft 365
    • Examine best practices when configuring administrative roles
    • Assign admin roles to users in Microsoft 365
    • Delegate admin roles to partners
    • Implement role groups in Microsoft 365
    • Manage permissions using administrative units in Microsoft Entra ID
    • Manage SharePoint permissions to prevent oversharing of data
    • Elevate privileges using Microsoft Entra Privileged Identity Management
  • Implement data classification of sensitive information
    • Explore data classification
    • Implement data classification in Microsoft 365
    • Explore trainable classifiers
    • Create and retrain a trainable classifier
    • View sensitive data using Content explorer and Activity explorer
    • Detect sensitive information documents using Document Fingerprinting
  • Explore sensitivity labels
    • Manage data protection using sensitivity labels
    • Explore what sensitivity labels can do
    • Determine a sensitivity label's scope
    • Apply sensitivity labels automatically
    • Explore sensitivity label policies
  • Implement sensitivity labels
    • Plan your deployment strategy for sensitivity labels
    • Examine the requirements to create a sensitivity label
    • Create sensitivity labels
    • Publish sensitivity labels
    • Remove and delete sensitivity labels