Summary

Completed

As a security administrator at Contoso, you've been involved with the early stages of planning for the control of critical corporate data during the transition to Microsoft 365. Having completed this module, you can now ensure that protection extends to all services and all users.

Now that you've completed this module, you should be able to:

  • Connect third party services to Microsoft Defender for Cloud Apps.
  • Protect storage apps and implement malware detection.
  • Implement information protection policies.
  • Configure read-only mode for external users.
  • Block unauthorized browsers form accessing corporate web apps.
  • Use admin quarantine to investigate files.
  • Automatically apply labels to sensitive files.

Learn more