Get from here to there

Completed 100 XP

This final unit brings everything together and focuses on guiding leaders like you to make your own actionable plan for addressing cybersecurity risks and moving further. You identify existing tools, including Microsoft solutions, you can leverage to meet your goals. You also gain access to additional resources you can use to support your journey after completing the module.

Set up for success

This module has equipped you with the essential information and tools necessary to navigate today's complex digital landscape. From minimizing online exposure to prioritizing known vulnerabilities, you explored a wide array of cybersecurity tools and solutions available to safeguard your students' personal information and protect your school against cyber threats. Throughout the module, you encountered key recommendations and actionable steps to develop a school-wide cybersecurity culture and build a robust cybersecurity plan.

Microsoft's suite of productivity and management tools includes options for built-in security and risk mitigation solutions. Learn more about Microsoft 365 A5, which your school may already have, and how you can leverage the included features to align more closely to your Cybersecurity Performance Goals.

With A5 Security, you get all of these solutions:

Threat protection

  • Microsoft Defender Antimalware
  • Microsoft Defender Firewall
  • Microsoft Defender Exploit Guard
  • Microsoft Defender Credential Guard
  • BitLocker and BitLocker To Go
  • Windows Information Protection
  • Microsoft Defender for Endpoint Plans 1 & 2
  • Microsoft Defender for Identity
  • Microsoft Defender for Office 365
  • Microsoft Defender Application Guard for Microsoft Edge
  • Microsoft Defender Application Guard for Office
  • Safe Documents

Endpoint and app management

  • Microsoft Intune for Education
  • Microsoft Intune Remote Help
  • Mobile Device Management
  • Windows Autopilot
  • Mobile application management
  • Group Policy support
  • Microsoft Cloud Policy support
  • Shared computer activation for Microsoft 365 apps
  • Cortana management
  • Endpoint Analytics

Identity and access management

  • Microsoft Entra ID P2
  • User Provisioning
  • Cloud user self-service password change and reset
  • Advanced Security Reports
  • Multifactor authentication
  • Microsoft Defender for Cloud Apps
  • Office 365 Cloud App Security
  • Risk Based Conditional Access/Identity Protection
  • Privileged Identity Management
  • Access Reviews
  • On-premises Active Directory sync for SSO
  • Microsoft Advanced Threat Analytics
  • School Data Sync

Information and data protection

  • Azure Information Protection Plan 2
  • Automatic sensitivity labeling in Microsoft 365 apps, Exchange, SharePoint, and OneDrive
  • Automatic labeling in the AIP plugin
  • Advanced message encryption
  • Customer Key
  • Personal data encryption

Data loss prevention (DLP)

  • DLP for emails and files
  • DLP for Teams chat
  • Endpoint DLP

Security and compliance

  • Microsoft 365 A5 Compliance
  • Microsoft 365 A5 Info Protection and Governance
  • Microsoft 365 A5 eDiscovery and Audit
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Endpoint
  • Microsoft Entra ID P1 or P2
  • Microsoft Purview Data Loss Protection
  • Exchange Online Archiving

Next steps

  1. Take a minute to look back on your Cybersecurity Self-Assessment from the Heightening K-12 cybersecurity awareness unit. In this report, you identified your school's areas of highest need and most critical importance. After exploring the CISA Key Findings and Recommendations throughout this module, where can you make connections with your self-assessment report? Which actionable items and recommendations from the module best align to your unique areas of need?
  2. Review the tools and solutions you have encountered throughout the module. Which tools and solutions emerged in perfect balance—aligning with your school's unique needs, CISA key recommendations, and Cybersecurity Performance Goals? Which of these tools and solutions do you already have in place? Which ones would you like to explore further? How might Microsoft 365 A5 support your security needs?

Unidade seguinte: Knowledge check

Anterior Avançar