Categories: Certifications

MS-500 Microsoft 365 Security Administration Exam Preparation

Table of Contents

MS-500 Microsoft 365 Security Administration Exam Preparation

I’ve recently joined a Facebook group for Microsoft cloud technologies and notice that many people are looking to take this exam (MS-500: Microsoft 365 Security Administration Certification) which has just passed and added a new badge to my Acclaim (Microsoft 365 Certified: Security Administrator Associate), while the original preparation guide available on the exam registration page (link) as well as my previous blog about (Microsoft 365 Fundamentals 4 hours Learning Path), I thought that I can add some more deep insights to target the core exam objectives that needed to be addressed. Below I’m sharing with you the preparation notes and the current objectives as of the time of posting exam, along with resources that should help you prepare.

However, for starters, I would recommend taking the fundamentals first. by considering MS-900 and MS-101 if you have the time, But if you haven’t – or you just decide to go for it, then better to give it a try by hands-on experiences on Microsoft E5 security bundle like (Windows Defender ATP, Office 365 ATPs, AIP & Unified Labeling, DLP, PIM, Intune or Cloud App Security just get your Microsoft E5 trial tenant using this (link) and get into the deep dive and technologies details


Domains Covered in MS-500 Exam

This exam measures your ability to accomplish the following technical tasks:

  • Implement and manage identity and access (30-35%)
  • Implement and manage threat protection (20-25%)
  • Implement and manage information protection (15-20%)
  • Manage governance and compliance features in Microsoft 365 (25-30%)

Exam Core topics

URL Title Description
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#mfa-service-settings Configure Azure Multi-Factor Authentication – Azure Active Directory Learn how to configure settings for Azure Multi-Factor Authentication in the Azure portal
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition Location condition in Azure Active Directory Conditional Access Learn how to use the location condition to control access to your cloud apps based on a user’s network location.
https://docs.microsoft.com/en-us/azure/active-directory/devices/device-management-azure-portal How to manage devices using the Azure portal Learn how to use the Azure portal to manage devices.
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-device-writeback Azure AD Connect: Enabling device writeback This document details how to enable device writeback using Azure AD Connect
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-user-risk-policy Risk policies – Azure Active Directory Identity Protection Enable and configure risk policies in Azure Active Directory Identity Protection
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-sign-ins Sign-in activity reports in the Azure Active Directory portal Introduction to sign-in activity reports in the Azure Active Directory portal
https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-lifecycle Set expiration for Office 365 groups – Azure Active Directory How to set up expiration for Office 365 groups in Azure Active Directory
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-protection Configure an Azure Information Protection label for protection – AIP You can protect your most sensitive documents and emails when you configure a label to use Rights Management protection.
https://docs.microsoft.com/en-us/azure/information-protection/prepare Prepare users and groups for Azure Information Protection Check that you have the user and group accounts that you need to start classifying, labeling, and protecting your organization’s documents and emails.
https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity Secure your Azure AD identity infrastructure – Azure Active Directory This document outlines a list of important actions administrators should implement to help them secure their organization using Azure AD capabilities
https://docs.microsoft.com/en-us/exchange/policy-and-compliance/ediscovery/ediscovery?view=exchserver-2019 In-Place eDiscovery in Exchange Server Summary: Learn about In-Place eDiscovery in Exchange Server 2016 and Exchange Server 2019.
https://docs.microsoft.com/en-us/exchange/security-and-compliance/messaging-records-management/apply-retention-policy#use-the-eac-to-apply-a-retention-policy-to-multiple-mailboxes Apply a retention policy to mailboxes You can use retention policies to group one or more retention tags and apply them to mailboxes to enforce message retention settings. A mailbox can’t have more than one retention policy.
https://docs.microsoft.com/en-us/exchange/security-and-compliance/messaging-records-management/create-a-retention-policy#step-2-create-a-retention-policy Create a Retention Policy In Exchange Online, you can use retention policies to manage email lifecycle. Retention policies are applied by creating retention tags, adding them to a retention policy, and applying the policy to mailbox users.
https://docs.microsoft.com/en-us/mem/intune/apps/app-protection-policy App protection policies overview – Microsoft Intune Learn how Microsoft Intune app protection policies help protect your company data and prevent data loss.
https://docs.microsoft.com/en-us/mem/intune/configuration/device-restrictions-windows-10#reporting-and-telemetry Device restriction settings for Windows 10 in Microsoft Intune – Azure See a list of all the settings and their descriptions for creating device restrictions on Windows 10 and later devices. Use these settings in a configuration profile to control screenshots, password requirements, kiosk settings, apps in the store, Microsoft Edge browser, Microsoft Defender, access to the cloud, start menu, and more in Microsoft Intune.
https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection Use Microsoft Defender ATP in Microsoft Intune – Azure Use Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) with Intune, including setup and configuration, onboarding of your Intune devices with ATP, and then use a devices ATP risk assessment with your Intune device compliance and conditional access policies to protect network resources.
https://docs.microsoft.com/en-us/mem/intune/protect/conditional-access-integrate-jamf Integrate Jamf Pro with Microsoft Intune for compliance – Microsoft Intune Use Microsoft Intune compliance policies with Azure Active Directory Conditional Access to help integrate and secure Jamf-managed devices.
https://docs.microsoft.com/en-us/mem/intune/protect/endpoint-protection-windows-10 Protection settings for Windows 10 devices in Microsoft Intune – Azure On Windows 10 devices, use or configure endpoint protection settings to enable Microsoft Defender features, including Application Guard, Firewall, SmartScreen, encryption and BitLocker, Exploit Guard, Application Control, Security Center, and security on local devices in Microsoft Intune.
https://docs.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide Set up multi-factor authentication for users – Microsoft 365 admin Learn how to set up multi-factor authentication for your organization.
https://docs.microsoft.com/en-us/microsoft-365/compliance/supervision-policies?view=o365-worldwide Supervision policies – Microsoft 365 Compliance Learn about using supervision policies in Microsoft 365 to capture employee communications for examination by designated reviewers.
https://docs.microsoft.com/en-us/microsoft-365/compliance/use-your-free-azure-ad-subscription-in-office-365?view=o365-worldwide Use your free Azure Active Directory subscription – Microsoft 365 Compliance Learn how to access Azure Active Directory, which is included in your organization’s paid subscription.
https://docs.microsoft.com/en-us/microsoft-365/compliance/what-the-dlp-policy-templates-include?view=o365-worldwide What the DLP policy templates include – Microsoft 365 Compliance Data loss prevention (DLP) in the Security & Compliance Center includes ready-to-use policy templates that address common compliance requirements, such as helping you to protect sensitive information subject to the U.S. Health Insurance Act (HIPAA), U.S. Gramm-Leach-Bliley Act (GLBA), or U.S. Patriot Act. This topic lists all of the policy templates, what types of sensitive information they look for, and what the default conditions and actions are.
https://docs.microsoft.com/en-us/microsoft-365/compliance/working-with-compliance-manager?view=o365-worldwide Work with Microsoft Compliance Manager (Preview) – Microsoft 365 Compliance Microsoft Compliance Manager is a free workflow-based risk assessment tool. Use it to track, assign, and verify regulatory compliance activities related to Microsoft products.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/attack-simulator?view=o365-worldwide Attack Simulator in ATP – Office 365 Learn how to use Attack Simulator to run simulated phishing and password attacks in your Microsoft 365 E5 or ATP Plan 2 organization.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/dynamic-delivery-and-previewing?view=o365-worldwide Dynamic Delivery and previewing with ATP Safe Attachments – Office 365 When you set up your ATP safe attachments policies, you choose Dynamic Delivery to avoid message delays and enable people to preview attachments that are being scanned.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/integrate-office-365-ti-with-wdatp?view=o365-worldwide Integrate Office 365 ATP with Microsoft Defender ATP – Office 365 Integrate Office 365 Advanced Threat Protection with Microsoft Defender Advanced Threat Protection to see more detailed threat management information.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/manage-quarantined-messages-and-files?view=o365-worldwide Manage quarantined messages and files as an admin – Office 365 Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Office 365 Advanced Threat Protection (Office 365 ATP) can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center?view=o365-worldwide Permissions – Microsoft 365 Security & Compliance Center – Office 365 Admins can learn about the permissions that are available in the Microsoft 365 Security & Compliance Center.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-a-custom-blocked-urls-list-atp?view=o365-worldwide Set up a custom blocked URLs list using ATP Safe Links – Office 365 Learn how to set up a list of blocked URLs for your organization using Office 365 Advanced Threat Protection.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-anti-phishing-policies?view=o365-worldwide Anti-phishing policies – Office 365 Admins can learn about the anti-phishing policies that are available in Exchange Online Protection (EOP) and Office 365 Advanced Threat Protection (Office 365 ATP).
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-links-policies?view=o365-worldwide Set up Office 365 ATP Safe Links policies – Office 365 Set up Safe Links policies to protect your organization from malicious links in Word, Excel, PowerPoint, and Visio files, as well as in email messages.
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/view-reports-for-atp?view=o365-worldwide#what-permissions-are-needed-to-view-the-atp-reports View reports for Advanced Threat Protection – Office 365 Find and use reports for Office 365 Advanced Threat Protection in the Security & Compliance Center.
https://docs.microsoft.com/en-us/office365/enterprise/fix-problems-with-directory-synchronization Fixing problems with directory synchronization for Microsoft 365 Describes common causes of problems with directory synchronization in Office 365 and provides a few methods to help troubleshoot and resolve them.
https://docs.microsoft.com/en-us/office365/enterprise/view-service-health How to check Microsoft 365 service health View the health status of Microsoft 365 services before you call support to see if there is an active service interruption.
https://docs.microsoft.com/en-us/onedrive/user-external-sharing-settings Change the external sharing setting for a user’s OneDrive – OneDrive Learn how to change the OneDrive external sharing setting for a user in the Microsoft 365 admin center.
https://docs.microsoft.com/en-us/powershell/module/exchange/set-auditconfig?view=exchange-ps Set-AuditConfig You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see Permissions in the Security & Compliance Center.
https://docs.microsoft.com/en-us/powershell/module/exchange/set-mailbox?view=exchange-ps Set-Mailbox You can use this cmdlet for one mailbox at a time. To perform bulk management, you can pipeline the output of various Get- cmdlets (for example, the Get-Mailbox or Get-User cmdlets) and configure several mailboxes in a single-line command. You can also use the Set-Mailbox cmdlet in scripts. You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they’re not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see Find the permissions required to run any Exchange cmdlet.
https://sharepointmaven.com/how-to-set-a-retention-policy-on-a-sharepoint-site/ How to set a Retention Policy on a SharePoint site – SharePoint Maven If you are looking for an explanation and instructions on how to set up a Retention Policy on a SharePoint site – this article will help.
https://support.microsoft.com/en-us/office/create-and-manage-sensitivity-labels-2fb96b54-7dd2-4f0c-ac8d-170790d4b8b9?ui=en-us&rs=en-us&ad=us Create and manage sensitivity labels – Office Support Sensitivity labels allow you to classify and protect content that is sensitive to your business. Learn how to create a sensitivity label and make it available to your users.
https://support.microsoft.com/en-us/office/overview-of-data-loss-prevention-in-sharepoint-server-2016-80f907bb-b944-448d-b83d-8fec4abcc24c?ui=en-us&rs=en-us&ad=us Overview of data loss prevention in SharePoint Server 2016 – SharePoint Learn how you can use data loss prevention (DLP) features such as DLP queries and DLP policies to identify, monitor, and automatically protect your sensitive information from inadvertent leaks.
https://support.microsoft.com/en-us/office/protect-against-phishing-attempts-in-microsoft-365-86c425e1-1686-430a-9151-f7176cce4f2c?ui=en-us&rs=en-us&ad=us#ID0EAABAAA=Try_it Protect against phishing attempts in Microsoft 365 – Office Support Protect your email from phishing attacks by setting up ATP anti-phishing in Microsoft 365 Business and Enterprise.
https://support.pingidentity.com/s/article/PingOne-How-to-troubleshoot-an-AD-Connect-Instance PingOne: How to troubleshoot an AD Connect Instance Helpful information for an Administrator that is troubleshooting AD Connect. Includes information on how to review the log data in Event Viewer and how to use the config.aspx page.
https://www.maadarani.com/office-365-classification-and-retention-labels/ Office 365: Classification and Retention Labels – O365 Mike Office 365: Classification and Retention Labels – O365 Mike
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-advanced-audit-policy Azure Advanced Threat Protection Advanced Audit Policy check This article provides an overview of Azure ATP’s Advanced Audit Policy check.
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/configure-event-forwarding Configure Windows Event Forwarding in Azure Advanced Threat Protection Describes your options for configuring Windows Event Forwarding with Azure ATP
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/configure-port-mirroring Configure Port Mirroring when deploying Azure Advanced Threat Protection Describes port mirroring options and how to configure them for Azure ATP
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5 Configure Azure ATP sensor settings conceptual Step five of installing Azure ATP helps you configure settings for your Azure ATP standalone sensor.
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step6-vpn Install Azure Advanced Threat Protection VPN Integration Collect accounting information for Azure ATP by integrating a VPN.
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/workspace-portal Understanding the Azure Advanced Threat Protection portal Describes how to log into the Azure ATP portal and the components of the portal
https://docs.microsoft.com/en-us/cloud-app-security/activity-filters Visibility into cloud app activities – Cloud App Security This article provides a list of activities, filters and match parameters that can be applied to activity policies.
https://docs.microsoft.com/en-us/cloud-app-security/file-filters Understanding file data and filters available in Cloud App Security This reference article provides information about the types of files and file filters used by Cloud App Security.
https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad Create session policies in Cloud App Security This article describes the procedure for setting up a Cloud App Security Conditional Access App Control session policy gain deep visibility into user session activities and block downloads using reverse proxy capabilities.
https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo Permissions in Exchange Online Exchange Online in Office 365 includes a large set of predefined permissions, based on the Role Based Access Control (RBAC) permissions model, which you can use right away to easily grant permissions to your administrators and users. You can use the permissions features in Exchange Online so that you can get your new organization up and running quickly.
https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies?view=o365-worldwide Alert policies in the security and compliance centers – Microsoft 365 Compliance Create alert policies in the security and compliance center in Office 365 and Microsoft 365 to monitor potential threats, data loss, and permissions issues.
https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-labels-to-personal-data-in-office-365?view=o365-worldwide Apply labels to personal data – Microsoft 365 Compliance Learn how to use Office labels as part of your General Data Protection Regulation (GDPR) protection plan.
https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide Apply a sensitivity label to content automatically – Microsoft 365 Compliance When you create a sensitivity label, you can automatically assign a label to a document or email, or you can prompt users to select the label that you recommend.
https://docs.microsoft.com/en-us/microsoft-365/compliance/assign-ediscovery-permissions?view=o365-worldwide Assign eDiscovery permissions in the Security & Compliance Center – Microsoft 365 Compliance Assign the permissions required to perform eDiscovery-related tasks using the Security & Compliance Center.
https://docs.microsoft.com/en-us/microsoft-365/compliance/content-search?view=o365-worldwide Content Search – Microsoft 365 Compliance Use the Content Search tool in the compliance center in Office 365 or Microsoft 365 to search for content in a variety of Office 365 services.
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-activity-alerts?view=o365-worldwide Create activity alerts – Microsoft 365 Compliance Add and manage activity alerts in the Security & Compliance Center so that Microsoft 365 will send you email notifications when users perform specific activities
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-report-on-and-delete-multiple-content-searches?view=o365-worldwide Create, report on, and delete multiple Content Searches – Microsoft 365 Compliance Learn how to automate Content Search tasks like creating searches and running reports via PowerShell scripts in the Security & Compliance Center in Office 365.
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp-policy?view=o365-worldwide Create, test, and tune a DLP policy – Microsoft 365 Compliance In this article, you’ll learn how to create, test, and tune a DLP policy according to your organizational needs.
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide Overview of data loss prevention – Microsoft 365 Compliance With a data loss prevention (DLP) policy in the Security & Compliance Center, you can identify, monitor, and automatically protect sensitive information across Office 365.
https://docs.microsoft.com/en-us/microsoft-365/compliance/enable-mailbox-auditing?view=o365-worldwide Manage mailbox auditing – Microsoft 365 Compliance Mailbox audit logging is turned on by default (also called default mailbox auditing or mailbox auditing on by default). This means that certain actions performed by mailbox owners, delegates, and admins are automatically logged in a mailbox audit log, where you can search for activities performed on the mailbox.
https://docs.microsoft.com/en-us/powershell/module/sharepoint-online/set-spotenant?view=sharepoint-ps Set-SPOTenant You can use the Set-SPOTenant cmdlet to enable external services and to specify the versions in which site collections can be created. You can also use the Set-SPOSite cmdlet together with the Set-SPOTenant cmdlet to block access to a site in your organization and redirect traffic to another site. You must be a SharePoint Online administrator or Global Administrator to run the cmdlet.
https://docs.microsoft.com/en-us/sharepoint/control-access-from-unmanaged-devices Control access from unmanaged devices – SharePoint in Microsoft 365 Learn how to block or limit access to SharePoint and OneDrive content on devices that aren’t compliant or joined to a domain.
https://docs.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off Manage sharing settings – SharePoint in Microsoft 365 Learn how global and SharePoint admins can change the organization-level sharing settings for SharePoint and OneDrive in Microsoft 365.
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-groups Create and manage machine groups in Microsoft Defender ATP – Windows security Create machine groups and set automated remediation levels on them by confiring the rules that apply on the group
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/ad-ca-vpn-connectivity-windows10 Conditional access for VPN connectivity using Azure AD In this optional step, you can fine-tune how authorized VPN users access your resources using Azure Active Directory (Azure AD) conditional access.
https://events.collab365.community/configure-data-loss-prevention-policies-in-exchange-online-in-office-365/ Configure Data Loss Prevention policies in Exchange Online in Office 365 – Collab365 Events
https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md azure-docs/pim-how-to-change-default-settings.md at master · MicrosoftDocs/azure-docs · GitHub Open source documentation of Microsoft Azure. Contribute to MicrosoftDocs/azure-docs development by creating an account on GitHub.
https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/active-directory/users-groups-roles/groups-dynamic-membership.md azure-docs/groups-dynamic-membership.md at master · MicrosoftDocs/azure-docs · GitHub Open source documentation of Microsoft Azure. Contribute to MicrosoftDocs/azure-docs development by creating an account on GitHub.
https://help.bittitan.com/hc/en-us/articles/115008104507-How-do-I-assign-the-elevated-admin-role-Organization-Management-to-the-account-that-is-performing-a-Public-Folder-migration- How do I assign the elevated admin role ‘Organization Management’ to the account that is performing a Public Folder migration? – BitTitan Help Center ​How do I assign the elevated admin role ‘Organization Management’ to the administrative account that is performing a Public Folder…
https://lazyadmin.nl/office-365/how-to-setup-mfa-in-office-365/ How-to Setup Multi-Factor Authentication in Office 365 — LazyAdmin Howto enable Office 365 MFA, tips on rolling it out in your organisation and Office 365 MFA License details explained.
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-search-results?view=o365-worldwide Export Content Search results – Microsoft 365 Compliance Export the search results from a Content Search in the Security & Compliance Center to a local computer. Email results are exported as PST files. Content from SharePoint and OneDrive for Business sites are exported as native Office documents.
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-core-ediscovery?view=o365-worldwide Get started with core eDiscovery cases in Microsoft 365 – Microsoft 365 Compliance This article describes how to get started using core eDiscovery in Microsoft 365. After you assign eDiscovery permissions and create a case, you can add members, create eDiscovery holds, and then search for and export data that’s relevant to your investigation.
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-core-ediscovery?view=o365-worldwide#step-4-place-content-locations-on-hold Get started with core eDiscovery cases in Microsoft 365 – Microsoft 365 Compliance This article describes how to get started using core eDiscovery in Microsoft 365. After you assign eDiscovery permissions and create a case, you can add members, create eDiscovery holds, and then search for and export data that’s relevant to your investigation.
https://docs.microsoft.com/en-us/microsoft-365/compliance/keyword-queries-and-search-conditions?view=o365-worldwide Keyword queries and search conditions for Content Search – Microsoft 365 Compliance Learn about email and file properties that you can search in Exchange Online mailboxes and in SharePoint or OneDrive for Business sites using the Content Search tool in the Security & Compliance Center.
https://docs.microsoft.com/en-us/microsoft-365/compliance/labels?view=o365-worldwide Learn about retention labels – Microsoft 365 Compliance Learn how retention labels classify data across your organization for governance, and enforce retention rules based on that classification. You can also use retention labels to implement a records management solution for Microsoft 365.
https://docs.microsoft.com/en-us/microsoft-365/compliance/manage-gdpr-data-subject-requests-with-the-dsr-case-tool?view=o365-worldwide#more-information-about-using-the-dsr-case-tool Manage GDPR data subject requests with DSR case tool in Security & Compliance Center – Microsoft 365 Compliance The GDPR gives EU citizens (called data subjects) specific rights to their personal data; these rights include obtaining copies of it, requesting changes to it, restricting the processing of it, deleting it, or receiving it in an electronic format. A formal request by a data subject to take an action on their personal data is called a Data Subject Request or DSR. You can use DSR Cases in the compliance center in Office 365 and Microsoft 365 to manage your organization’s DSR investigations.
https://docs.microsoft.com/en-us/microsoft-365/compliance/meet-data-protection-and-regulatory-reqs-using-microsoft-cloud?view=o365-worldwide Meet data protection and regulatory requirements with Compliance Manager for Microsoft cloud services – Microsoft 365 Compliance The Compliance Manager in the Microsoft Service Trust Portal provides tools to track, implement, and manage the controls to help your organization reach compliance with security and data protection industry standards (such as GDPR, ISO 27001 and 27018, and HIPAA) when measured against Microsoft cloud services, such as Office 365 and Microsoft Azure. The Compliance Manager helps the person who oversees the data protection and privacy strategy for your organization manage your compliance and risk assessment process.
https://docs.microsoft.com/en-us/microsoft-365/compliance/retention-policies?view=o365-worldwide Learn about retention policies to automatically retain or delete content – Microsoft 365 Compliance Use a retention policy to decide proactively whether to retain content, delete content, or both – retain and then delete the content; apply a single policy to the entire organization or specific locations or users; and apply a policy to all content or content meeting specific conditions.
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance?view=o365-worldwide Search the audit log in the Security & Compliance Center – Microsoft 365 Compliance Use the Security & Compliance Center to search the unified audit log to view user and administrator activity in your organization.
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide Learn about sensitivity labels – Microsoft 365 Compliance Use sensitivity labels from the Microsoft Information Protection framework to classify and protect your organization’s data, without hindering user productivity and collaboration.

Also, please share the post within your circles so it helps them to prepare for the exam.

The free online CSS cleaner tool helps you to organize style files for websites.

Mahmoud A. ATALLAH

Microsoft MVP | Speaker | Azure Service Delivery Lead at Bespin Global MEA, helping customers build successful Azure practices. Talks about #AzureCloud and #AI

Recent Posts

Gitex – Ensuring a Secure & Scalable AI-powered Solution with Azure

In this session, we will explore the architecture and best practices for building secure and…

2 months ago

Part 4: Data Exfiltration Playbook – Azure WAF Security Lab

Introduction Welcome to our comprehensive series on Azure Web Application Firewall (WAF) security! In this…

4 months ago

Part 3: Vulnerability Exploitation Playbook – Azure WAF vs XSS

Introduction Welcome to the third installment of our Azure Web Application Firewall (WAF) Security Lab…

4 months ago

Part 2: Reconnaissance Playbook – Testing Azure WAF Protection

Introduction Welcome to the second installment of our Azure Web Application Firewall (WAF) Security Lab…

5 months ago

Part 1: Lab Setup – Building Your Azure WAF Testing Environment

Introduction Welcome to the first installment of our four-part Azure Web Application Firewall (WAF) Security…

5 months ago

Azure Web Application Firewall: A Hands-on Security Lab Series

Introduction In today's digital landscape, protecting web applications from sophisticated attacks is crucial. Azure Web…

5 months ago