sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
Learning Path 3 - Mitigate threats using Microsoft Purview

Learning Path 3 - Mitigate threats using Microsoft Purview

These pages offer a summary of the official "SC-200: Mitigate threats using Microsoft Purview" Learning Path, along with related notes, code, and illustrations. Feel free to explore the capabilities of Microsoft Purview. Microsoft Link:
wwlpublish SC-200: Mitigate threats using Microsoft Purview - Trainingwwlpublish SC-200: Mitigate threats using Microsoft Purview - Training

Mitigate threats using Microsoft Purview

3.0 Pre-Course Essentials: Key Notes and Guide3.0 Pre-Course Essentials: Key Notes and Guide
3.0 Pre-Course Essentials: Key Notes and Guide
3.1 Respond to data loss prevention alerts using Microsoft 3653.1 Respond to data loss prevention alerts using Microsoft 365
3.1 Respond to data loss prevention alerts using Microsoft 365
3.2 Manage insider risk in Microsoft Purview3.2 Manage insider risk in Microsoft Purview
3.2 Manage insider risk in Microsoft Purview
3.3 Search and investigate with Microsoft Purview Audit3.3 Search and investigate with Microsoft Purview Audit
3.3 Search and investigate with Microsoft Purview Audit
3.4 Investigate threats with Content search in Microsoft Purview3.4 Investigate threats with Content search in Microsoft Purview
3.4 Investigate threats with Content search in Microsoft Purview
Mind Maps for Mitigating Threats Using Microsoft PurviewMind Maps for Mitigating Threats Using Microsoft Purview
Mind Maps for Mitigating Threats Using Microsoft Purview

©sameer fakhoury

GitHubLinkedIn