Examine the Copilot for Microsoft 365 design
- Introduction
- Examine the Copilot for Microsoft 365 logical architecture
- Examine the key components of Copilot for Microsoft 365
- Explore the Copilot for Microsoft 365 service and tenant architecture
- Extend Copilot for Microsoft 365 with plugins and Microsoft Graph connectors
Implement Copilot for Microsoft 365
- Introduction
- Get ready for Copilot for Microsoft 365
- Prepare your data for searches in Copilot for Microsoft 365
- Protect your Copilot for Microsoft 365 data with Microsoft 365 security tools
- Assign your Copilot for Microsoft 365 licenses
- Drive Copilot for Microsoft 365 adoption with a Copilot Center of Excellence
Examine data security and compliance in Copilot for Microsoft 365
- Introduction
- Examine how Copilot for Microsoft 365 uses your proprietary business data
- Examine how Copilot for Microsoft 365 protects sensitive business data
- Examine how Copilot for Microsoft 365 uses Microsoft 365 isolation and access controls
- Examine how Copilot for Microsoft 365 meets regulatory compliance mandates
Manage secure user access in Microsoft 365
- Introduction
- Examine the identity and access tools used in Microsoft 365
- Manage user passwords
- Implement Conditional Access policies
- Enable pass-through authentication
- Implement multifactor authentication
- Enable passwordless sign-in with Microsoft Authenticator
- Explore self-service password management
- Explore Windows Hello for Business
- Implement Microsoft Entra Smart Lockout
- Explore Security Defaults in Microsoft Entra ID
- Investigate authentication issues using sign-in logs
Manage permissions, roles, and role groups in Microsoft 365
- Introduction
- Examine the use of roles in the Microsoft 365 permission model
- Manage roles across the Microsoft 365 ecosystem
- Explore administrator roles in Microsoft 365
- Examine best practices when configuring administrative roles
- Assign admin roles to users in Microsoft 365
- Delegate admin roles to partners
- Implement role groups in Microsoft 365
- Manage permissions using administrative units in Microsoft Entra ID
- Manage SharePoint permissions to prevent oversharing of data
- Elevate privileges using Microsoft Entra Privileged Identity Management
Implement data classification of sensitive information
- Introduction
- Explore data classification
- Implement data classification in Microsoft 365
- Explore trainable classifiers
- Create and retrain a trainable classifier
- View sensitive data using Content explorer and Activity explorer
- Detect sensitive information documents using Document Fingerprinting
Explore sensitivity labels
- Introduction
- Manage data protection using sensitivity labels
- Explore what sensitivity labels can do
- Determine a sensitivity label's scope
- Apply sensitivity labels automatically
- Explore sensitivity label policies
Implement sensitivity labels
- Introduction
- Plan your deployment strategy for sensitivity labels
- Enable sensitivity labels for files in SharePoint and OneDrive
- Examine the requirements to create a sensitivity label
- Create sensitivity labels
- Publish sensitivity labels
- Remove and delete sensitivity labels