Chapter 3: Deploy and manage a Microsoft 365 tenant -Implement and manage a Microsoft 365 tenant-Configure org settings, including Security & privacy and Organizational profile
Chapter 9: Deploy and manage a Microsoft 365 tenant -Manage users and groups-Create and manage users in Microsoft Entra, including external users and guests
Chapter 11: Deploy and manage a Microsoft 365 tenant -Manage users and groups-Create and manage groups, including Microsoft 365 groups and shared mailboxes
Chapter 12: Deploy and manage a Microsoft 365 tenant -Manage users and groups-Manage and monitor Microsoft 365 licenses, including group-based licensing
Chapter 14: Deploy and manage a Microsoft 365 tenant -Manage roles and role groups-Implement and manage built-in roles in Microsoft 365 and Microsoft Entra
Chapter 16: Deploy and manage a Microsoft 365 tenant -Manage roles and role groups-Manage role groups in Microsoft Defender XDR, Microsoft Purview, and Microsoft 365 workloads
Chapter 19: Implement and manage Microsoft Entra identity and access-Implement and manage identity synchronization with Microsoft Entra tenant-Prepare for identity synchronization by using IdFix
Chapter 20: Implement and manage Microsoft Entra identity and access-Implement and manage identity synchronization with Microsoft Entra tenant-Implement and manage directory synchronization by using Microsoft Entra Connect Sync or Microsoft Entra Cloud Sync
Chapter 21: Implement and manage Microsoft Entra identity and access-Implement and manage identity synchronization with Microsoft Entra tenant-Implement and manage directory synchronization by using Microsoft Entra Connect
Chapter 22: Implement and manage Microsoft Entra identity and access-Implement and manage identity synchronization with Microsoft Entra tenant-Monitor synchronization by using Microsoft Entra Connect Health
Chapter 23: Implement and manage Microsoft Entra identity and access-Implement and manage identity synchronization with Microsoft Entra tenant-Troubleshoot synchronization, including Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync
Chapter 25: Implement and manage Microsoft Entra identity and access-Implement and manage authentication-Implement and manage self-service password reset (SSPR)
Chapter 26: Implement and manage Microsoft Entra identity and access-Implement and manage authentication-Implement and manage Microsoft Entra Password Protection
Chapter 29: Implement and manage Microsoft Entra identity and access-Implement and manage secure access-Implement and manage Microsoft Entra ID Protection
Chapter 31: Implement and manage Microsoft Entra identity and access-Implement and manage secure access-Implement and manage Conditional Access policies
Chapter 32: Implement and manage Microsoft Entra identity and access-Implement and manage secure access-Implement and manage multi-factor authentication (MFA) by using conditional access policies
Chapter 33: Implement and manage Microsoft Entra identity and access-Review and respond to security reports and alerts generated by Microsoft Defender XDR-Review and take actions to improve the Microsoft Secure Score
Chapter 34: Implement and manage Microsoft Entra identity and access-Review and respond to security reports and alerts generated by Microsoft Defender XDR-Review and respond to security incidents and alerts
Chapter 35: Implement and manage Microsoft Entra identity and access-Review and respond to security reports and alerts generated by Microsoft Defender XDR-Review and respond to issues identified in security and compliance reports
Chapter 36: Implement and manage Microsoft Entra identity and access-Review and respond to security reports and alerts generated by Microsoft Defender XDR-Review and respond to threats identified in threat analytics
Chapter 37: Implement and manage Microsoft Entra identity and access-Implement and manage email and collaboration protection by using Microsoft Defender for Office 365-Implement policies and rules in Defender for Office 365
Chapter 39: Implement and manage Microsoft Entra identity and access-Implement and manage email and collaboration protection by using Microsoft Defender for Office 365-Create and run campaigns, such as attack simulation
Chapter 40: Implement and manage Microsoft Entra identity and access-Implement and manage email and collaboration protection by using Microsoft Defender for Office 365-Unblock users
Chapter 41: Implement and manage Microsoft Entra identity and access-Implement and manage endpoint protection by using Microsoft Defender for Endpoint-Onboard devices to Defender for Endpoint
Chapter 42: Implement and manage Microsoft Entra identity and access-Implement and manage endpoint protection by using Microsoft Defender for Endpoint-Configure endpoint settings
Chapter 43: Implement and manage Microsoft Entra identity and access-Implement and manage endpoint protection by using Microsoft Defender for Endpoint-Review and respond to endpoint vulnerabilities
Chapter 44: Implement and manage Microsoft Entra identity and access-Implement and manage endpoint protection by using Microsoft Defender for Endpoint-Review and respond to risks identified in the Microsoft Defender Vulnerability Management dashboard
Chapter 45: Implement and manage Microsoft Entra identity and access-Implement, and manage Microsoft Defender for Cloud Apps-Configure the app connector for Microsoft 365
Chapter 46: Implement and manage Microsoft Entra identity and access-Implement, and manage Microsoft Defender for Cloud Apps-Configure Microsoft Defender for Cloud Apps policies
Chapter 47: Implement and manage Microsoft Entra identity and access-Implement, and manage Microsoft Defender for Cloud Apps-Review and respond to Microsoft Defender for Cloud Apps alerts
Chapter 49: Implement and manage Microsoft Entra identity and access-Implement, and manage Microsoft Defender for Cloud Apps-Configure Cloud App Discovery
Chapter 50: Implement and manage Microsoft Entra identity and access-Implement, and manage Microsoft Defender for Cloud Apps-Review and respond to issues identified in Cloud App Discovery
Chapter 51: Manage compliance by using Microsoft Purview -Implement Microsoft Purview information protection and data lifecycle management-Implement and manage sensitive information types by using keywords, keyword lists, or regular expressions
Chapter 52: Manage compliance by using Microsoft Purview -Implement Microsoft Purview information protection and data lifecycle management-Implement retention labels, retention label policies, and retention policies
Chapter 53: Manage compliance by using Microsoft Purview -Implement Microsoft Purview information protection and data lifecycle management-Implement sensitivity labels and sensitivity label policies
Chapter 54: Manage compliance by using Microsoft Purview -Implement Microsoft Purview information protection and data lifecycle management-Monitor label usage by using Content explorer, Activity explorer, and label reports
Chapter 55: Manage compliance by using Microsoft Purview -Implement Microsoft Purview data loss prevention (DLP)-Configure DLP policies for Exchange, SharePoint, OneDrive, and Teams
Chapter 57: Manage compliance by using Microsoft Purview -Implement Microsoft Purview data loss prevention (DLP)-Review and respond to DLP alerts, events, and reports