Chapter 1: Implement information protection -Create and manage sensitive info types-Identify sensitive information requirements for an organization's data
Chapter 2: Implement information protection -Create and manage sensitive info types-Translate sensitive information requirements into built-in or custom sensitive info types
Chapter 10: Implement information protection -Implement and manage sensitivity labels-Implement roles and permissions for administering sensitivity labels
Chapter 14: Implement information protection -Implement and manage sensitivity labels-Monitor data classification and label usage by using Content explorer, Activity explorer, and audit search
Chapter 15: Implement information protection -Implement and manage sensitivity labels-Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner
Chapter 16: Implement information protection -Implement and manage sensitivity labels-Manage protection settings and marking for applied sensitivity labels
Chapter 17: Implement information protection -Design and implement encryption for email messages-Design an email encryption solution based on methods available in Microsoft 365
Chapter 19: Implement information protection -Design and implement encryption for email messages-Implement Microsoft Purview Advanced Message Encryption
Chapter 35: Implement data lifecycle and records management-Retain and delete data by using retention labels-Plan for information retention and disposition by using retention labels
Chapter 36: Implement data lifecycle and records management-Retain and delete data by using retention labels-Create retention labels for data lifecycle management
Chapter 38: Implement data lifecycle and records management-Retain and delete data by using retention labels-Configure a retention label policy to publish labels
Chapter 39: Implement data lifecycle and records management-Retain and delete data by using retention labels-Configure a retention label policy to auto-apply labels
Chapter 40: Implement data lifecycle and records management-Retain and delete data by using retention labels-Interpret the results of policy precedence, including using Policy lookup
Chapter 41: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for SharePoint and OneDrive
Chapter 42: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Microsoft 365 groups
Chapter 43: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Teams
Chapter 44: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Yammer
Chapter 45: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Create and apply retention policies for Exchange Online
Chapter 47: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Implement Exchange Online archiving policies
Chapter 48: Implement data lifecycle and records management-Manage data retention in Microsoft 365 workloads-Configure preservation locks for retention policies and retention label policies
Chapter 50: Implement data lifecycle and records management-Implement Microsoft Purview records management-Create and configure retention labels for records management
Chapter 51: Implement data lifecycle and records management-Implement Microsoft Purview records management-Manage retention labels by using a file plan, including file plan descriptors
Chapter 52: Implement data lifecycle and records management-Implement Microsoft Purview records management-Classify records by using retention labels and retention label policies
Chapter 54: Implement data lifecycle and records management-Implement Microsoft Purview records management-Manage the disposition of content in records management
Chapter 55: Implement data lifecycle and records management-Implement Microsoft Purview records management-Configure records management settings, including retention label settings and disposition settings
Chapter 56: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Plan for regulatory compliance in Microsoft 365
Chapter 57: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Create and manage assessments
Chapter 58: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Create and modify custom templates
Chapter 59: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Interpret and manage improvement actions
Chapter 60: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager-Create and manage alert policies for assessments
Chapter 61: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Choose between eDiscovery (Standard) and eDiscovery (Premium) based on an organization’s requirements
Chapter 62: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Plan and implement eDiscovery
Chapter 63: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Delegate permissions to use eDiscovery and Content search
Chapter 64: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Perform searches and respond to results from eDiscovery
Chapter 65: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Manage eDiscovery cases
Chapter 66: Monitor and investigate data and activities by using Microsoft Purview -Plan and manage eDiscovery and Content search-Perform searches by using Content search
Chapter 67: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Choose between Audit (Standard) and Audit (Premium) based on an organization’s requirements
Chapter 68: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Plan for and configure auditing
Chapter 69: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Investigate activities by using the unified audit log
Chapter 70: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Review and interpret compliance reports and dashboards
Chapter 71: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Configure alert policies
Chapter 72: Monitor and investigate data and activities by using Microsoft Purview -Manage and analyze audit logs and reports in Microsoft Purview-Configure audit retention policies
Chapter 73: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Communication Compliance-Plan for communication compliance
Chapter 74: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Communication Compliance-Create and manage communication compliance policies
Chapter 75: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Communication Compliance-Investigate and remediate communication compliance alerts and reports
Chapter 76: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Plan for insider risk management
Chapter 77: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Create and manage insider risk management policies
Chapter 78: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Investigate and remediate insider risk activities, alerts, and reports
Chapter 80: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Insider Risk Management-Manage forensic evidence settings
Chapter 83: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Information Barriers (IBs)-Create and manage IB segments and policies
Chapter 84: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Information Barriers (IBs)-Configure Teams, SharePoint, and OneDrive to enforce IBs, including setting barrier modes
Chapter 85: Manage insider and privacy risk in Microsoft 365 -Implement and manage Microsoft Purview Information Barriers (IBs)-Investigate issues with IB policies
Chapter 86: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Configure and maintain privacy risk management
Chapter 87: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Create and manage Privacy Risk Management policies
Chapter 88: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Identify and monitor potential risks involving personal data
Chapter 89: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Evaluate and remediate alerts and issues
Chapter 90: Manage insider and privacy risk in Microsoft 365 -Implement and manage privacy requirements by using Microsoft Priva-Implement and manage subject rights requests