MS-101: Microsoft 365 Mobility and Security
MS-101: Microsoft 365 Mobility and Security are part of the requirements for the Microsoft 365 Enterprise Administrator Expert certification
Exam requirements
The official exam document are published here: https://www.microsoft.com/en-us/learning/exam-ms-101.aspx
Exam preparation
Books covering the exam
Exam Ref MS-101 Microsoft 365 Mobility and Security, 1st Edition
- Author: Brian Svidergol and Robert Clements
- ISBN-13: 978-0135574898
- ISBN-10: 0135574897
Pre-order on Amazon.com
Video training for the exam
Pluralsight
These courses on Pluralsight are for the old 70-346 and 70-347 exams, but covers a lot of the exam objectives in the MS-101 exam:
- 70-346: Managing Office 365 Identities and Requirements
https://www.pluralsight.com/paths/office-365-70-346 - 70-347: Enabling Office 365 Services
https://www.pluralsight.com/paths/enabling-office-365-services-70-347
Udemy
- MS-101: Microsoft 365 Mobility and Security
by Intellezy Trainers
https://www.udemy.com/course/microsoft-365-mobility-and-security-exam-ms-101/
Microsoft Ignite
- THR2130 – Deploy and manage Cloud App Security in Office 365
https://myignite.techcommunity.microsoft.com/sessions/66404 - BRK3411 – Secure enterprise productivity with Office 365 threat protection services including EOP, ATP, and Threat Intelligence
https://myignite.techcommunity.microsoft.com/sessions/64345
- BRK4002 – Securing your Office 365 environment from advanced phishing campaigns with Office 365 Advanced Threat Protection
https://myignite.techcommunity.microsoft.com/sessions/64525 - BRK3148 – Securing Exchange Online from modern threats
https://myignite.techcommunity.microsoft.com/sessions/65645 - BRK3279 – So long and thanks for all the (email) phish
https://myignite.techcommunity.microsoft.com/sessions/66495 - BRK3237 – Securing your hybrid cloud environments with Azure ATP and AAD Identity Protection
https://myignite.techcommunity.microsoft.com/sessions/64523
- BRK3117 – SecOps and incident response with Azure Advanced Threat Protection: Protect, detect, and respond
https://myignite.techcommunity.microsoft.com/sessions/65780 - THR3037 – Attack discovery and investigation with Azure Advanced Threat Protection
https://myignite.techcommunity.microsoft.com/sessions/64534 - Security at scale with Azure Advanced Threat Protection
https://www.youtube.com/watch?v=EGY2m8yU_KE - THR3076 – Azure Information Protection and Exchange Online
https://myignite.techcommunity.microsoft.com/sessions/66372?source=sessions - BRK3011 – Deploying and managing Windows Information Protection
https://myignite.techcommunity.microsoft.com/sessions/64331?source=sessions
Other
- Configuring Azure Information Protection
https://www.youtube.com/watch?v=_yBg1Ti3ZMc
Online training
Open edX (free)
- Microsoft 365 Security Management
https://aka.ms/openedx-MS-101.1-about - Microsoft 365 Compliance Management
https://aka.ms/openedx-MS-101.2-about - Microsoft 365 Device Management
https://aka.ms/openedx-MS-101.3-about
Instructor-led training
Microsoft Learning Partner
- MS-101T01: Microsoft 365 Security Management
https://www.microsoft.com/en-us/learning/course.aspx?cid=MS-101T01 - MS-101T02: Microsoft 365 Compliance Management
https://www.microsoft.com/en-us/learning/course.aspx?cid=MS-101T02 - MS-101T03: Microsoft 365 Device Management
https://www.microsoft.com/en-us/learning/course.aspx?cid=MS-101T03
Exam Objectives
Implement Modern Device Services (30-35%)
- Implement Mobile Device Management (MDM)
- Plan for MDM
https://docs.microsoft.com/en-us/intune/planning-guide - Configure MDM integration with Azure AD
https://docs.microsoft.com/en-us/azure/active-directory/devices/overview
https://docs.microsoft.com/en-us/intune/quickstart-setup-auto-enrollment - Set an MDM authority
https://docs.microsoft.com/en-us/intune/mdm-authority-set - Set device enrollment limit for users
https://docs.microsoft.com/en-us/intune/enrollment-restrictions-set
- Plan for MDM
- Manage device compliance
- Plan for device Compliance
https://docs.microsoft.com/en-us/intune/device-compliance-get-started
https://docs.microsoft.com/en-us/intune/quickstart-set-password-length-android#create-a-device-compliance-policy - Design Conditional Access Policies
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
https://docs.microsoft.com/en-us/intune/conditional-access-intune-common-ways-use - Create Conditional Access Policies
https://docs.microsoft.com/en-us/intune/conditional-access-exchange-create - Configure device compliance policy
https://docs.microsoft.com/en-us/intune/compliance-policy-create-android
https://docs.microsoft.com/en-us/intune/compliance-policy-create-android-for-work
https://docs.microsoft.com/en-us/intune/compliance-policy-create-ios
https://docs.microsoft.com/en-us/intune/compliance-policy-create-windows
https://docs.microsoft.com/en-us/intune/compliance-policy-create-mac-os - Manage Conditional Access Policies
https://docs.microsoft.com/en-us/intune/conditional-access
- Plan for device Compliance
- Plan for devices and apps
- Create and configure Microsoft Store for Business
https://docs.microsoft.com/en-us/microsoft-store/microsoft-store-for-business-overview - Plan app deployment
https://docs.microsoft.com/en-us/microsoft-store/distribute-apps-with-management-tool
https://docs.microsoft.com/en-us/microsoft-store/distribute-apps-from-your-private-store
https://docs.microsoft.com/en-us/microsoft-store/assign-apps-to-employees - Plan device co-management
https://docs.microsoft.com/en-us/sccm/comanage/how-to-prepare-Win10 - Plan device monitoring
https://docs.microsoft.com/en-us/intune/device-management-capabilities - Plan for device profiles
https://docs.microsoft.com/en-us/intune/device-profile-assign - Plan for Mobile Application Management
https://docs.microsoft.com/en-us/intune/byod-technology-decisions - Plan mobile device security
https://docs.microsoft.com/en-us/intune/device-protect
- Create and configure Microsoft Store for Business
- Plan Windows 10 deployment
- Plan for Windows as a Service (WaaS)
https://docs.microsoft.com/en-us/windows/deployment/update/waas-overview - Plan the appropriate Windows 10 Enterprise deployment method
https://docs.microsoft.com/en-us/windows/deployment/planning/windows-10-deployment-considerations - Analyze upgrade readiness for Windows 10
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started - Evaluate and deploy additional Windows 10 Enterprise security features
https://docs.microsoft.com/en-us/windows/security/
- Plan for Windows as a Service (WaaS)
Implement Microsoft 365 Security and Threat Management (30-35%)
- Implement Cloud App Security (CAS)
- Configure Cloud App Security (CAS)
https://docs.microsoft.com/en-us/cloud-app-security/general-setup - Configure Cloud App Security (CAS) policies
https://docs.microsoft.com/en-us/cloud-app-security/control-cloud-apps-with-policies - Configure Connected apps
https://docs.microsoft.com/en-us/cloud-app-security/enable-instant-visibility-protection-and-governance-actions-for-your-apps - Design cloud app security (CAS) Solution
https://docs.microsoft.com/en-us/cloud-app-security/editions-cloud-app-security-o365 - Manage Cloud App Security (CAS) alerts
https://docs.microsoft.com/en-us/cloud-app-security/managing-alerts - Upload cloud app security (CAS) traffic logs
https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker
- Configure Cloud App Security (CAS)
- Implement threat management
- Plan a threat management solution
https://docs.microsoft.com/en-us/Office365/SecurityCompliance/protect-against-threats - Design Azure Advanced Threat Protection (ATP) Policies
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning - Design Microsoft 365 ATP Policies
https://docs.microsoft.com/en-us/office365/securitycompliance/office-365-atp
https://docs.microsoft.com/en-us/office365/securitycompliance/atp-safe-links
https://docs.microsoft.com/en-us/office365/securitycompliance/atp-safe-attachments
https://docs.microsoft.com/en-us/office365/securitycompliance/atp-for-spo-odb-and-teams - Configure Azure ATP Policies
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5 - Configure Microsoft 365 ATP Policies
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-atp-safe-links-policies
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-atp-safe-attachments-policies
https://docs.microsoft.com/en-us/office365/securitycompliance/turn-on-atp-for-spo-odb-and-teams - Monitor Advanced Threat Analytics (ATA) incidents
https://docs.microsoft.com/en-us/advanced-threat-analytics/reports
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/working-with-suspicious-activities
- Plan a threat management solution
- Implement Windows Defender Advanced Threat Protection (ATP)
- Plan Windows Defender ATP Solution
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/get-started - Configure preferences
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/onboard
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config - Implement Windows Defender ATP Policies
https://docs.microsoft.com/en-us/intune/advanced-threat-protection - Enable and configure security features of Windows 10 Enterprise
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features
- Plan Windows Defender ATP Solution
- Manage security reports and alerts
- Manage service assurance dashboard
https://docs.microsoft.com/en-us/office365/securitycompliance/service-assurance - Manage tracing and reporting on Azure AD Identity Protection
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview - Configure and manage Microsoft 365 security alerts
https://docs.microsoft.com/en-us/office365/securitycompliance/alerts - Configure and manage Azure Identity Protection dashboard and alerts
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-close-active-risk-events
- Manage service assurance dashboard
Manage Microsoft 365 Governance and Compliance (35-40%)
- Configure Data Loss Prevention (DLP)
- Configure DLP Policies
https://docs.microsoft.com/en-us/office365/securitycompliance/get-started-with-dlp-policy-recommendations - Design data retention policies in Microsoft 365
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies - Manage DLP exceptions
https://docs.microsoft.com/en-us/office365/securitycompliance/create-test-tune-dlp-policy - Monitor DLP policy matches
https://docs.microsoft.com/en-us/office365/securitycompliance/view-the-dlp-reports - Manage DLP policy matches
https://docs.microsoft.com/en-us/office365/securitycompliance/what-the-dlp-functions-look-for
- Configure DLP Policies
- Implement Azure Information Protection (AIP)
- Plan AIP solution
https://docs.microsoft.com/en-au/azure/information-protection/deployment-roadmap - Plan for deployment On-Prem rights management Connector
https://docs.microsoft.com/en-au/azure/information-protection/deploy-rms-connector - Plan for Windows information Protection (WIP) implementation
https://docs.microsoft.com/en-us/intune/windows-information-protection-configure - Plan for classification labeling
https://docs.microsoft.com/en-au/azure/information-protection/quickstart-label-dnf-protectedemail - Configure Information Rights Management (IRM) for Workloads
https://docs.microsoft.com/en-au/azure/information-protection/applications-support - Configure Super User
https://docs.microsoft.com/en-au/azure/information-protection/configure-super-users - Deploy AIP Clients
https://docs.microsoft.com/en-au/azure/information-protection/configure-client - Implement Azure Information Protection policies
https://docs.microsoft.com/en-au/azure/information-protection/configure-policy - Implement AIP tenant key
https://docs.microsoft.com/en-au/azure/information-protection/plan-implement-tenant-key
- Plan AIP solution
- Manage data governance
- Configure information retention
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies - Plan for Microsoft 365 backup
https://docs.microsoft.com/en-us/office365/admin/subscriptions-and-billing/back-up-data-before-switching-plans?view=o365-worldwide - Plan for restoring deleted content
https://support.office.com/en-us/article/restore-items-in-the-recycle-bin-of-a-sharepoint-site-6df466b6-55f2-4898-8d6e-c0dff851a0be#ID0EAADAAA=Online
https://support.office.com/en-us/article/restore-deleted-items-from-the-site-collection-recycle-bin-5fa924ee-16d7-487b-9a0a-021b9062d14b
https://support.office.com/en-us/article/restore-deleted-files-or-folders-in-onedrive-949ada80-0026-4db3-a953-c99083e6a84f
https://docs.microsoft.com/en-us/office365/securitycompliance/inactive-mailboxes-in-office-365 - Plan information Retention Policies
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies
- Configure information retention
- Manage auditing
- Configure audit log retention
https://docs.microsoft.com/en-us/office365/securitycompliance/turn-audit-log-search-on-or-off - Configure audit policy
https://docs.microsoft.com/en-us/office365/securitycompliance/tenant-wide-setup-for-increased-security
https://docs.microsoft.com/en-us/office365/securitycompliance/enable-mailbox-auditing - Monitor Unified Audit Logs
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance
- Configure audit log retention
- Manage eDiscovery
- Search content by using Security and Compliance Center
https://docs.microsoft.com/en-us/office365/securitycompliance/content-search - Plan for in-place and legal hold
https://docs.microsoft.com/en-us/exchange/security-and-compliance/in-place-and-litigation-holds
https://docs.microsoft.com/en-us/exchange/security-and-compliance/create-or-remove-in-place-holds - Configure eDiscovery
https://docs.microsoft.com/en-us/office365/securitycompliance/ediscovery-cases
https://docs.microsoft.com/en-us/exchange/security-and-compliance/in-place-ediscovery/in-place-ediscovery
- Search content by using Security and Compliance Center