Book Image

Microsoft 365 Administrator MS-102 Exam Guide

By : Aaron Guilmette
5 (3)
Book Image

Microsoft 365 Administrator MS-102 Exam Guide

5 (3)
By: Aaron Guilmette

Overview of this book

The MS-102: Microsoft 365 Administrator Exam Guide is meticulously crafted to empower readers with practical insights, starting with the essentials of provisioning a Microsoft 365 tenant, configuring identity synchronization and secure access, and deploying key Microsoft 365 Defender components. The book's purpose is clear—to guide professionals through the complexities of the MS-102 exam, ensuring not just exam success but mastery of the subject matter. This comprehensive exam guide comes with lifetime access to supplementary resources on an online platform, including flashcards, mock exams, and exam tips from experts. With unlimited access to the website, you'll have the flexibility to practice as many times as you desire, maximizing your exam readiness. As you progress through each chapter, the book unveils the layers of Microsoft 365 workloads, equipping you with the skills to manage role-based administration, deploy identity synchronization using Entra ID Connect, implement modern authentication methods, manage secure access through Conditional Access policies, and analyze security threats using Microsoft 365 Defender. By the end of this book, you'll have the proficiency to implement data loss prevention, configure information and data protection features, and approach the MS-102 exam with confidence.
Table of Contents (13 chapters)

Creating and Managing Users

Creating and managing users is central to administrating an information system—whether that system is an application on a small network, an enterprise-scale directory, or a cloud service hosted by a SaaS provider. In any instance, identities are used by people, applications, and devices to authenticate and perform activities.

In the context of Azure AD, there are three core types of identity:

  • Cloud-based users
  • Synchronized users
  • Guest users

When planning out identity scenarios, it’s important to understand the benefits, features, drawbacks, and capabilities associated with each type of identity and authentication scheme—including ease of provisioning, integration with existing directory or security products, requirements for on-premises infrastructure, and network availability.

In this section, you’ll learn about managing each of these user types.

Creating and Managing Cloud Users

From an Azure...