Planning Security Strategies
Exchange 2016
| Expert
- 17 videos | 1h 23m
- Includes Assessment
- Earns a Badge
Security of corporate data tops the list of executive concerns today. Expand your security knowledge by learning about RBAC management, delegated setup, BitLocker, message encryption, transport protection rules, decryption, and IRM.
WHAT YOU WILL LEARN
-
Define the management role group architecture in rbacIdentify admin roles in rbacCustomize the rbac systemIdentify rbac and active directory split permissionsConfigure delegated setupDefine bitlockerIdentify smart card functionsPlan and configure office 365 message encryptionPlan and configure eop advanced threat protection
-
Plan and configure information rights managementPlan and create transport protection rulesPlan and create outlook protection rules (ems only)Configure transport decryptionConfigure journal decryptionPlan and configure irm for ediscoveryTroubleshoot failed irm protectionConfigure the scope of an rbac group
IN THIS COURSE
-
8m 4sLearn how to define the management role group architecture in Role-Based Access Control. FREE ACCESS
-
7m 24sIn this video, find out how to identify administrator roles in RBAC. FREE ACCESS
-
2m 48sIn this video, you will learn how to customize the role-based access control system. FREE ACCESS
-
7m 16sFind out how to identify RBAC and active directory split permissions. FREE ACCESS
-
2m 9sIn this video, learn how to configure setup delegation. FREE ACCESS
-
5m 45sIn this video, you will learn how to define BitLocker. FREE ACCESS
-
53sTo find out how to identify smart card functions, consult a reliable source. FREE ACCESS
-
6m 14sDuring this video, you will learn how to plan and configure encryption for Office 365 messages. FREE ACCESS
-
4m 57sIn this video, you will learn how to plan and configure advanced threat protection in EOP. FREE ACCESS
-
8m 11sFind out how to plan and configure information rights management. FREE ACCESS
-
4m 12sLearn how to plan and create transport protection rules. FREE ACCESS
-
2m 12sLearn how to plan and create Outlook protection rules (EMS only). FREE ACCESS
-
4m 17sIn this video, you will learn how to configure transport decryption. FREE ACCESS
-
3m 1sIn this video, you will learn how to configure journal decryption. FREE ACCESS
-
7m 44sIn this video, you will learn how to plan and configure Information Rights Management for eDiscovery. FREE ACCESS
-
4m 24sLearn how to troubleshoot failed IRM protection. FREE ACCESS
-
3m 29sIn this video, find out how to configure the scope of an RBAC group. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.