
{"id":8154,"date":"2022-09-01T09:44:57","date_gmt":"2022-09-01T09:44:57","guid":{"rendered":"https:\/\/www.cloudthat.com\/dev-training\/?post_type=stm-courses&#038;p=8154"},"modified":"2025-03-19T08:26:21","modified_gmt":"2025-03-19T08:26:21","slug":"exam-ms-101-microsoft-365-mobility-and-security","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/modernworkplace\/ms-101-microsoft-365-mobility-and-security","title":{"rendered":"MS-101: Microsoft 365 Mobility and Security"},"content":{"rendered":"<p><span style=\"color: #ff0000;\"><strong><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Note- This exam retired on September 30, 2023. A replacement exam, <a href=\"https:\/\/stage.cloudthat.com\/training\/modernworkplace\/ms-102-certification-microsoft-365-administrator\">Exam MS-102: Microsoft 365 Administrator<\/a>, is available for those who are earning the certification for the first time.<\/span><\/strong><\/span><\/p>\n<p>The Microsoft 365 Mobility and Security certification training course from CloudThat offers candidates proper training and relevant study material to prepare and successfully clear the MS-101 exam. This course covers three central elements of Microsoft 365 enterprise administration \u2013 Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, candidates will examine all the common types of threat vectors and data breaches facing organizations today, and they will learn how Microsoft 365\u2019s security solutions address these security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note- This exam retired on September 30, 2023. A replacement exam, Exam MS-102: Microsoft 365 Administrator, is available for those who are earning the certification for the first time. The Microsoft 365 Mobility and Security certification training course from CloudThat offers candidates proper training and relevant study material to prepare and successfully clear the MS-101 [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":12638,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[63],"metadata":{"permalink_customizer_regenerate_status":["1"],"stm_lms_product_id":["13484"],"_edit_last":["2"],"day_1":["19700101"],"_thumbnail_id":["12638"],"_wp_page_template":["default"],"apss_content_flag":["0"],"lsq_tracking":["a:2:{s:8:\"tracking\";s:0:\"\";s:5:\"score\";s:0:\"\";}"],"scorm_package":[""],"curriculum":[""],"shareware":[""],"featured":["on"],"views":["2380"],"level":["associate"],"current_students":["0"],"duration_info":["5 Days"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["44900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":[""],"course_files_pack":[""],"course_certificate":[""],"type":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_video_poster":[""],"lesson_video_url":[""],"lesson_video":[""],"lesson_files_pack":[""],"stream_start_date":[""],"stream_start_time":[""],"stream_end_date":[""],"stream_end_time":[""],"timezone":[""],"stm_password":[""],"join_before_host":[""],"option_host_video":[""],"option_participants_video":[""],"option_mute_participants":[""],"option_enforce_login":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"assignment_tries":[""],"assignment_files":[""],"editor_comment":[""],"try_num":[""],"start_time":[""],"assignment_id":[""],"student_id":[""],"course_id":[""],"course_mark_average":["5"],"course_marks":["a:1:{i:29;s:1:\"5\";}"],"_wp_old_date":["2021-02-10","2021-09-01"],"_duration":["field_5fa0f3f0c86eb"],"_day_1":["field_5fce082f42f1e"],"time":[""],"_time":["field_5fce084742f1f"],"day_2":[""],"_day_2":["field_5fce085142f20"],"time_2":[""],"_time_2":["field_5fce089942f21"],"day_3":[""],"_day_3":["field_5fce08df42f22"],"time_3":[""],"_time_3":["field_5fce08f842f23"],"after_completing_course":["12"],"_after_completing_course":["field_6103aae828228"],"key_features":["6"],"_key_features":["field_6103aaff28229"],"who_should_attend":["1"],"_who_should_attend":["field_6103ab0d2822a"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":["15378"],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"banner_description":["This MS-101 Microsoft certification training equips the aspirants with hands-on skills and technical expertise to diligently prepare for exam MS-101 and earn certification."],"_banner_description":["field_612c733ed3564"],"prerequisites_text":["<ul>\r\n<li>Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.<\/li>\r\n<li>A proficient understanding of DNS and basic functional experience with Microsoft 365 services.<\/li>\r\n<li>A proficient understanding of general IT practices.<\/li>\r\n<\/ul>"],"_prerequisites_text":["field_612c7498c4b84"],"after_completing_course_0_desciption":["Device management"],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Threat protection with Microsoft Cloud App security"],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Threat protection with Microsoft Defender"],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Microsoft365 security metrics"],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"key_features_0_lists":["Our MS-101 Microsoft training modules have 50% -60% hands-on lab sessions to encourage Thinking-Based Learning (TBL)."],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["Interactive-rich virtual and face-to-face classroom teaching to inculcate Problem-Based Learning (PBL)."],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["Microsoft certified instructor-led training and mentoring sessions to develop Competency-Based Learning (CBL)."],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["Well-structured use-cases to simulate challenges encountered in a Real-World environment."],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["Integrated teaching assistance and support through experts designed Learning Management System (LMS) and ExamReady platform."],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["Being a Microsoft Learning Partner provides us with the edge over competition."],"_key_features_5_lists":["field_6103ad559f5b3"],"who_should_attend_0_attend_lists":["This Microsoft MS-101 certification course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths."],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["<ul>\r\n<li>By earning MS-101: Microsoft 365 Mobility and Security certification, you can be competent Microsoft certified professional.<\/li>\r\n<li>Demonstrate essential digital skills at workspace.<\/li>\r\n<li>On successful completion of Microsoft 365 Mobility and Security training, aspirants receive a Course Completion Certificate from us.<\/li>\r\n<li>By successfully clearing the MS-101 exam, aspirants earn Microsoft Certification.<\/li>\r\n<\/ul>"],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":[""],"_certification_0_image":["field_6103ab5b2822e"],"after_completing_course_4_desciption":["Information protection"],"_after_completing_course_4_desciption":["field_6103ad2f9f5b2"],"after_completing_course_5_desciption":["Information governance"],"_after_completing_course_5_desciption":["field_6103ad2f9f5b2"],"after_completing_course_6_desciption":["Data loss prevention"],"_after_completing_course_6_desciption":["field_6103ad2f9f5b2"],"after_completing_course_7_desciption":["Security reports and alerts"],"_after_completing_course_7_desciption":["field_6103ad2f9f5b2"],"after_completing_course_8_desciption":["Windows 10 deployment"],"_after_completing_course_8_desciption":["field_6103ad2f9f5b2"],"after_completing_course_9_desciption":["Device enrolment"],"_after_completing_course_9_desciption":["field_6103ad2f9f5b2"],"after_completing_course_10_desciption":["Device Compliance"],"_after_completing_course_10_desciption":["field_6103ad2f9f5b2"],"after_completing_course_11_desciption":["Search and Investigation"],"_after_completing_course_11_desciption":["field_6103ad2f9f5b2"],"course_section_0_module_title":["Introduction to Microsoft 365 Security Metrics"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":["In this module, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365\u2019s security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Active Directory Identity Protection."],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":["Lessons"],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Threat Vectors and Data Breaches"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["The Zero Trust Model"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Security Solutions in Microsoft 365"],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_3_lession_title":["Introduction to Microsoft Secure Score"],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_4_lession_title":["Privileged Identity Management"],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_5_lession_title":["Introduction to Azure Active Directory Identity Protection"],"_course_section_0_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["6"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section_1_title":["Hands-On:\u00a0Tenant Setup and PIM"],"_course_section_0_section_1_title":["field_612f5233b0278"],"course_section_0_section_1_lesson_list_0_lession_title":["Initialize your Microsoft 365 Tenant"],"_course_section_0_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_1_lession_title":["PIM Resource Workflows"],"_course_section_0_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list":["2"],"_course_section_0_section_1_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["2"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["Managing Your Microsoft 365 Security Services"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":["This module examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. You will be introduced to the various reports that monitor your security health."],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":["Lessons"],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Introduction to Exchange Online Protection"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Introduction to Advanced Threat Protection"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Managing Safe Attachments"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Managing Safe Links"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_4_lession_title":["Monitoring and Reports"],"_course_section_1_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["5"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section_1_title":["Hands-On:\u00a0Manage Microsoft 365 Security Services"],"_course_section_1_section_1_title":["field_612f5233b0278"],"course_section_1_section_1_lesson_list_0_lession_title":["Implement a Safe Attachments policy"],"_course_section_1_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_1_lession_title":["Implement a Safe Links policy"],"_course_section_1_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list":["2"],"_course_section_1_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["2"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Microsoft 365 Threat Intelligence"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":["In this module, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches."],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":["Lessons"],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Overview of Microsoft 365 Threat Intelligence"],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Using the Security Dashboard"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Configuring Advanced Threat Analytics"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Implementing Your Cloud Application Security"],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["4"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Hands-On:\u00a0Implement Threat Intelligence"],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Conduct a Spear Phishing attack using the Attack Simulator"],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_1_lession_title":["Conduct Password attacks using the Attack Simulator"],"_course_section_2_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_2_lession_title":["Prepare for Alert Policies"],"_course_section_2_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_3_lession_title":["Implement a Mailbox Permission Alert"],"_course_section_2_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_4_lession_title":["Implement a SharePoint Permission Alert"],"_course_section_2_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_5_lession_title":["Test the Default eDiscovery Alert"],"_course_section_2_section_1_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["6"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["2"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Introduction to Data Governance in Microsoft 365"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":["This module examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S\/MIME), Office 365 message encryption, and data loss prevention (DLP)."],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":["Lessons"],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Introduction to Archiving in Microsoft 365"],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Introduction to Retention in Microsoft 365"],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Introduction to Information Rights Management"],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Introduction to Secure Multipurpose Internet Mail Extension"],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_4_lession_title":["Introduction to Office 365 Message Encryption"],"_course_section_3_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_5_lession_title":["Introduction to Data Loss Prevention"],"_course_section_3_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["6"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section_1_title":["Hands-On:\u00a0Implement Message Encryption and IRM"],"_course_section_3_section_1_title":["field_612f5233b0278"],"course_section_3_section_1_lesson_list_0_lession_title":["Configure Microsoft 365 Message Encryption"],"_course_section_3_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_1_lession_title":["Validate Information Rights Management"],"_course_section_3_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list":["2"],"_course_section_3_section_1_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["2"],"_course_section_3_section":["field_612f51e6b0277"],"course_section_4_module_title":["Archiving and Retention in Microsoft 365"],"_course_section_4_module_title":["field_612f5535940c3"],"course_section_4_module_description":["This module delves deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center."],"_course_section_4_module_description":["field_612f564c921af"],"course_section_4_section_0_title":["Lessons"],"_course_section_4_section_0_title":["field_612f5233b0278"],"course_section_4_section_0_lesson_list_0_lession_title":["In-Place Records Management in SharePoint"],"_course_section_4_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_1_lession_title":["Archiving and Retention in Exchange"],"_course_section_4_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_2_lession_title":["Retention Policies in the SCC"],"_course_section_4_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list":["3"],"_course_section_4_section_0_lesson_list":["field_612f530a0ac40"],"course_section_4_section_1_title":["Hands-On:\u00a0Implement Archiving and Retention"],"_course_section_4_section_1_title":["field_612f5233b0278"],"course_section_4_section_1_lesson_list_0_lession_title":["Initialize Compliance"],"_course_section_4_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_1_lesson_list_1_lession_title":["Configure Retention Tags and Policies"],"_course_section_4_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_1_lesson_list":["2"],"_course_section_4_section_1_lesson_list":["field_612f530a0ac40"],"course_section_4_section":["2"],"_course_section_4_section":["field_612f51e6b0277"],"course_section_5_module_title":["Implementing Data Governance in Microsoft 365 Intelligence"],"_course_section_5_module_title":["field_612f5535940c3"],"course_section_5_module_description":["This module examines how to implement the key aspects of data governance, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips."],"_course_section_5_module_description":["field_612f564c921af"],"course_section_5_section_0_title":["Lessons"],"_course_section_5_section_0_title":["field_612f5233b0278"],"course_section_5_section_0_lesson_list_0_lession_title":["Evaluating Your Compliance Readiness"],"_course_section_5_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_1_lession_title":["Implementing Compliance Center Solutions"],"_course_section_5_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_2_lession_title":["Building Ethical Walls in Exchange Online"],"_course_section_5_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_3_lession_title":["Creating a Simple DLP Policy from a Built-in Template"],"_course_section_5_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_4_lession_title":["Creating a Custom DLP Policy"],"_course_section_5_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_5_lession_title":["Creating a DLP Policy to Protect Documents"],"_course_section_5_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_6_lession_title":["Working with Policy Tips"],"_course_section_5_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list":["7"],"_course_section_5_section_0_lesson_list":["field_612f530a0ac40"],"course_section_5_section_1_title":["Hands-On:\u00a0Implement DLP Policies"],"_course_section_5_section_1_title":["field_612f5233b0278"],"course_section_5_section_1_lesson_list_0_lession_title":["Manage DLP Policies"],"_course_section_5_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list_1_lession_title":["Test MRM and DLP Policies"],"_course_section_5_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list":["2"],"_course_section_5_section_1_lesson_list":["field_612f530a0ac40"],"course_section_5_section":["2"],"_course_section_5_section":["field_612f51e6b0277"],"course_section_6_module_title":["Managing Data Governance in Microsoft 365"],"_course_section_6_module_title":["field_612f5535940c3"],"course_section_6_module_description":["This module focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection."],"_course_section_6_module_description":["field_612f564c921af"],"course_section_6_section_0_title":["Lessons"],"_course_section_6_section_0_title":["field_612f5233b0278"],"course_section_6_section_0_lesson_list_0_lession_title":["Managing Retention in Email"],"_course_section_6_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_1_lession_title":["Troubleshooting Data Governance"],"_course_section_6_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_2_lession_title":["Implementing Azure Information Protection"],"_course_section_6_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_3_lession_title":["Implementing Advanced Features of AIP"],"_course_section_6_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_4_lession_title":["Implementing Windows Information Protection"],"_course_section_6_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list":["5"],"_course_section_6_section_0_lesson_list":["field_612f530a0ac40"],"course_section_6_section_1_title":["Hands-On:\u00a0Implement AIP and WIP"],"_course_section_6_section_1_title":["field_612f5233b0278"],"course_section_6_section_1_lesson_list_0_lession_title":["Implement Azure Information Protection"],"_course_section_6_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list_1_lession_title":["Implement Windows Information Protection"],"_course_section_6_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list":["2"],"_course_section_6_section_1_lesson_list":["field_612f530a0ac40"],"course_section_6_section":["2"],"_course_section_6_section":["field_612f51e6b0277"],"course_section_7_module_title":["Managing Search and Investigations"],"_course_section_7_module_title":["field_612f5535940c3"],"course_section_7_module_description":["This module concludes this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery."],"_course_section_7_module_description":["field_612f564c921af"],"course_section_7_section_0_title":["Lessons"],"_course_section_7_section_0_title":["field_612f5233b0278"],"course_section_7_section_0_lesson_list_0_lession_title":["Searching for Content in the Security and Compliance Center"],"_course_section_7_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_1_lession_title":["Auditing Log Investigations"],"_course_section_7_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_2_lession_title":["Managing Advanced eDiscovery"],"_course_section_7_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list":["3"],"_course_section_7_section_0_lesson_list":["field_612f530a0ac40"],"course_section_7_section_1_title":["Hands-On:\u00a0Manage Search and Investigations"],"_course_section_7_section_1_title":["field_612f5233b0278"],"course_section_7_section_1_lesson_list_0_lession_title":["Implement a Data Subject Request"],"_course_section_7_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_7_section_1_lesson_list_1_lession_title":["Investigate Your Microsoft 365 Data"],"_course_section_7_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_7_section_1_lesson_list":["2"],"_course_section_7_section_1_lesson_list":["field_612f530a0ac40"],"course_section_7_section":["2"],"_course_section_7_section":["field_612f51e6b0277"],"course_section_8_module_title":["Planning for Device Management"],"_course_section_8_module_title":["field_612f5535940c3"],"course_section_8_module_description":["This module provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management."],"_course_section_8_module_description":["field_612f564c921af"],"course_section_8_section_0_title":["Lessons"],"_course_section_8_section_0_title":["field_612f5233b0278"],"course_section_8_section_0_lesson_list_0_lession_title":["Introduction to Co-management"],"_course_section_8_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_1_lession_title":["Preparing Your Windows 10 Devices for Co-management"],"_course_section_8_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_2_lession_title":["Transitioning from Configuration Manager to Intune"],"_course_section_8_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_3_lession_title":["Introduction to Microsoft Store for Business"],"_course_section_8_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list_4_lession_title":["Planning for Mobile Application Management"],"_course_section_8_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list":["5"],"_course_section_8_section_0_lesson_list":["field_612f530a0ac40"],"course_section_8_section_1_title":["Hands-On:\u00a0Implement the Microsoft Store for Business"],"_course_section_8_section_1_title":["field_612f5233b0278"],"course_section_8_section_1_lesson_list_0_lession_title":["Configure the Microsoft Store for Business"],"_course_section_8_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_8_section_1_lesson_list_1_lession_title":["Manage the Microsoft Store for Business"],"_course_section_8_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_8_section_1_lesson_list":["2"],"_course_section_8_section_1_lesson_list":["field_612f530a0ac40"],"course_section_8_section":["2"],"_course_section_8_section":["field_612f51e6b0277"],"course_section_9_module_title":["Planning Your Windows 10 Deployment Strategy"],"_course_section_9_module_title":["field_612f5535940c3"],"course_section_9_module_description":["This module focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Windows Analytics, and planning your Windows 10 subscription activation service.,"],"_course_section_9_module_description":["field_612f564c921af"],"course_section_9_section_0_title":["Lessons"],"_course_section_9_section_0_title":["field_612f5233b0278"],"course_section_9_section_0_lesson_list_0_lession_title":["Windows 10 Deployment Scenarios"],"_course_section_9_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_1_lession_title":["Implementing and Managing Windows Autopilot"],"_course_section_9_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_2_lession_title":["Planning Your Windows 10 Subscription Activation Strategy"],"_course_section_9_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_3_lession_title":["Resolving Windows 10 Upgrade Errors"],"_course_section_9_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list_4_lession_title":["Introduction to Windows Analytics"],"_course_section_9_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list":["5"],"_course_section_9_section_0_lesson_list":["field_612f530a0ac40"],"course_section_9_section":["1"],"_course_section_9_section":["field_612f51e6b0277"],"course_section_10_module_title":["Implementing Mobile Device Management"],"_course_section_10_module_title":["field_612f5535940c3"],"course_section_10_module_description":["This module focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance."],"_course_section_10_module_description":["field_612f564c921af"],"course_section_10_section_0_title":["Lessons"],"_course_section_10_section_0_title":["field_612f5233b0278"],"course_section_10_section_0_lesson_list_0_lession_title":["Planning Mobile Device Management"],"_course_section_10_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list_1_lession_title":["Deploying Mobile Device Management"],"_course_section_10_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list_2_lession_title":["Enrolling Devices to MDM"],"_course_section_10_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list_3_lession_title":["Managing Device Compliance"],"_course_section_10_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list":["4"],"_course_section_10_section_0_lesson_list":["field_612f530a0ac40"],"course_section_10_section_1_title":["Hands-On:\u00a0Manage Devices with Intune"],"_course_section_10_section_1_title":["field_612f5233b0278"],"course_section_10_section_1_lesson_list_0_lession_title":["Enable Device Management"],"_course_section_10_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_10_section_1_lesson_list_1_lession_title":["Configure Azure AD for Intune"],"_course_section_10_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_10_section_1_lesson_list_2_lession_title":["Create Intune Policies"],"_course_section_10_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_10_section_1_lesson_list_3_lession_title":["Enroll a Windows 10 Device"],"_course_section_10_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_10_section_1_lesson_list_4_lession_title":["Manage and Monitor a Device in Intune"],"_course_section_10_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_10_section_1_lesson_list":["5"],"_course_section_10_section_1_lesson_list":["field_612f530a0ac40"],"course_section_10_section":["2"],"_course_section_10_section":["field_612f51e6b0277"],"course_section":["11"],"_course_section":["field_612f4f27b0276"],"custom_permalink":["modernworkplace\/exam-ms-101-microsoft-365-mobility-and-security\/"],"note_section":["Note- This exam retired on September 30, 2023. A replacement exam, Exam MS-102: Microsoft 365 Administrator, is available for those who are earning the certification for the first time."],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":["a:3:{i:0;s:4:\"1447\";i:1;s:4:\"9293\";i:2;s:4:\"8152\";}"],"_related_courses":["field_61c453ca6b2dd"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"banner_image":[""],"_banner_image":["field_621873548f922"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["2074"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":["5"],"_average_review_count":["field_62b00367d2de6"],"_yoast_wpseo_canonical":["https:\/\/stage.cloudthat.com\/training\/modernworkplace\/exam-ms-101-microsoft-365-mobility-and-security"],"_edit_lock":["1758791727:5091"],"_wpb_vc_js_status":["false"],"_yoast_wpseo_wordproof_timestamp":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"question_view_type":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"banner_url":[""],"_banner_url":["field_63c69a9681cf2"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"wpdocs-meta-bdt":["44900"],"wpdocs-meta-gbp":["1399"],"wpdocs-meta-usd":["1599"],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"overview_section_heading":[""],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":[""],"_after_completing_course_heading":["field_645c78ade3f50"],"key_features_heading":[""],"_key_features_heading":["field_645388ceffdd1"],"who_should_attend_heading":[""],"_who_should_attend_heading":["field_645388faffdd2"],"prerequisites_heading":[""],"_prerequisites_heading":["field_64538a51ffdd3"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":[""],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list":[""],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":[""],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["1"],"_course_features":["field_644a0fa10e67d"],"certification_heading":[""],"_certification_heading":["field_64538bffffdd5"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_outline_heading":[""],"_course_outline_heading":["field_64538a8effdd4"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"permalink_customizer":["modernworkplace\/ms-101-microsoft-365-mobility-and-security"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"_regular_price_wmcp":["{\"USD\":\"1599\",\"GBP\":\"1399\",\"BDT\":\"44900\"}"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":[""]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8154"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":0,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8154\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/12638"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=8154"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=8154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}