Anmeldung zum Seminar
Wenn Sie an diesem Seminar teilnehmen wollen, füllen Sie folgendes Formular aus.Die mit * gekennzeichneten Felder müssen ausgefüllt werden.
- Microsoft 365 Tenant Management
- Microsoft 365 Identity Synchronization
- Microsoft 365 Security and Compliance
- Configure your Microsoft 365 experience
- Manage users, contacts, and licenses in Microsoft 365
- Manage groups in Microsoft 365
- Add a custom domain in Microsoft 365
- Configure client connectivity to Microsoft 365
- Configure administrative roles in Microsoft 365
- Manage tenant health and services in Microsoft 365
- Deploy Microsoft 365 Apps for enterprise
- Analyze your Microsoft 365 workplace data using Microsoft Viva Insights
- Explore identity synchronization
- Prepare for identity synchronization to Microsoft 365
- Implement directory synchronization tools
- Manage synchronized identities
- Manage secure user access in Microsoft 365
- Examine threat vectors and data breaches
- Explore the Zero Trust security model
- Explore security solutions in Microsoft 365 Defender
- Examine Microsoft Secure Score
- Examine Privileged Identity Management
- Examine Microsoft Entra ID Protection
- Examine email protection in Microsoft 365
- Enhance your email protection using Microsoft Defender for Office 365
- Manage Safe Attachments
- Manage Safe Links
- Explore threat intelligence in Microsoft Defender XDR
- Implement app protection by using Microsoft Defender for Cloud Apps
- Implement endpoint protection by using Microsoft Defender for Endpoint
- Implement threat protection by using Microsoft Defender for Office 365
- Examine data governance solutions in Microsoft Purview
- Explore archiving and records management in Microsoft 365
- Explore retention in Microsoft 365
- Explore Microsoft Purview Message Encryption
- Explore compliance in Microsoft 365
- Implement Microsoft Purview Insider Risk Management
- Implement Microsoft Purview Information Barriers
- Explore Microsoft Purview Data Loss Prevention
- Implement Microsoft Purview Data Loss Prevention
- Implement data classification of sensitive information
- Explore sensitivity labels
- Implement sensitivity labels