Uncategorized
Microsoft SC-900 – Module 4 : Describe the capabilities of Microsoft compliance solutions part 5
Lesson Summary So far. We know that organizations get into situations where they need to collect information for legal reasons. You want to know how you could enable your organization to meet this goal. We looked at Ediscovery as a onestop shop that would help organizations to identify and collect information in a rapid and effective manner to meet eat those legal requirements. So what did we understand here?We looked at the purpose of Ediscovery, looked at the capabilities of the content search tool, then we looked at the core…
Microsoft SC-900 – Module 4 : Describe the capabilities of Microsoft compliance solutions part 4
Customer Lockbox Sometimes your organization might need Microsoft engineers to help troubleshoot and fix any kind of reported issues. Usually, issues are fixed through extensive telemetry, logging and debugging tools Microsoft already has in place for its services. However, in certain cases, Microsoft Engineer would require access to organizations content to determine the root cause and fix those issues. Customer Lockbox will ensure that Microsoft cannot access the content to perform a service operation without explicit approval. Customer Lockbox will also bring the organization into an approval workflow for requests…
Microsoft SC-900 – Module 4 : Describe the capabilities of Microsoft compliance solutions part 3
Retention Polices and Retention Labels There are situations when labels and policies needs to be kept only for certain duration of time, and then they need to be permanently deleted. That’s when retention labels and policies will help organization to do just that. Applying retention labels and assigning retention policies help organizations to comply proactively with industry regulations, relations and internal policies. It can also reduce risk when there is litigation or a security breach. At times, it will also ensure users work with content that’s current and relevant to…
Microsoft SC-900 – Module 4 : Describe the capabilities of Microsoft compliance solutions part 2
Data classification capabilities of compliance Center Let’s talk and understand about the data classification capabilities of the Compliance Center. Organizations need to know the data to identify important information across the estate of services and the estate of data. To ensure that the data is handled in line with compliance requirements, administrators can enable their organization to know know it’s data through data classification capabilities and tools. Inside the Microsoft 365 Compliance Center. You will get to know about the information like sensitive Information Types, Trainable Classifiers, Content Explorers and…
Microsoft SC-900 – Module 4 : Describe the capabilities of Microsoft compliance solutions part 1
Module 4 introduction This is the module four of SC 900 certification. If you have read so far, it means that you now have a solid understanding of the security features provided with Microsoft Azure. Things around Microsoft three, six, five Azure Security Center and the security features in Azure Active Directory are not new to you. Now those are the security angle of Microsoft services. Now there is another angle to it the compliance, legal and the regulatory standards. This module is all about various services and features provided…
Microsoft MTA 98-366 Networking Fundamentals – Understanding Protocols and Services Part 2
Names Resolution. DNS concepts MTA networking fundamentals. Let’s talk about IPV Six. Let’s not yeah, we have to. I do not like IPV Six, the next generation IP address. I’m not sure if I’m just alone. I don’t think so. I found a lot of people online who agree with me, and every time I teach networking, I say I do not like IPV Six. I think it was a big mistake to create it like that. They tried to create a protocol that would be okay for I don’t…
Microsoft MTA 98-366 Networking Fundamentals – Understanding Protocols and Services
Subnetting in action! Let’s learn some basics MTA networking fundamentals. IPV four subnetting. I will be honest with you, it is not an easy topic. I was really surprised a few years ago when I started teaching MTA networking Fundamentals for the first time. I was really surprised that Microsoft decided to add that topic, and I am very happy they did that, because I do the same. I like to introduce subnetting straight away, because you need time. That’s all I have to say. In a few minutes, when…
Microsoft MTA 98-366 Networking Fundamentals – Bonus videos Part 2
Create a network with Windows Server 2008/2012 What is a server? I want to make sure we’re on the same page here. That’s why I decided to record a video and show you some basics. Make sure that you understand what a server is, what a peer to peer network is. We’ll talk about some previous versions of Windows servers as well. There are two solutions that you can go for. You can have a peer to peer network or a server based network. As you can imagine, this is…
Microsoft MTA 98-366 Networking Fundamentals – Bonus videos
Windows Server 2016 Monitoring PRTG? No, they don’t pay me to show you this application. I really like PRTG. I’ve been using it for a while. And every time I teach Cisco, Windows Seven networking, I show PRTG as a great example of an application that you can install on your laptop and play with monitoring and all protocols that are important for you as a network engineer or as a systems administrator. PRTG is for free. You can download it off the Internet. I have PRTG up and running…
Microsoft Excel 77-727 – 3.3 Filter and Sort a Table
3.3.1 Filter Records Worksheets are often used to store large amounts of data. The term filter is used to describe the process by which you can extract data from a large amount of information by specifying criteria which will allow you to pinpoint exactly the data you wish to see, rather than seeing all of the available data. Filtering does not change the content of your worksheet, only what you see of the worksheet. No information is deleted, only the view of the data is changed. We’ve already seen that…