Book Image

Microsoft 365 Administrator MS-102 Exam Guide

By : Aaron Guilmette
5 (3)
Book Image

Microsoft 365 Administrator MS-102 Exam Guide

5 (3)
By: Aaron Guilmette

Overview of this book

The MS-102: Microsoft 365 Administrator Exam Guide is meticulously crafted to empower readers with practical insights, starting with the essentials of provisioning a Microsoft 365 tenant, configuring identity synchronization and secure access, and deploying key Microsoft 365 Defender components. The book's purpose is clear—to guide professionals through the complexities of the MS-102 exam, ensuring not just exam success but mastery of the subject matter. This comprehensive exam guide comes with lifetime access to supplementary resources on an online platform, including flashcards, mock exams, and exam tips from experts. With unlimited access to the website, you'll have the flexibility to practice as many times as you desire, maximizing your exam readiness. As you progress through each chapter, the book unveils the layers of Microsoft 365 workloads, equipping you with the skills to manage role-based administration, deploy identity synchronization using Entra ID Connect, implement modern authentication methods, manage secure access through Conditional Access policies, and analyze security threats using Microsoft 365 Defender. By the end of this book, you'll have the proficiency to implement data loss prevention, configure information and data protection features, and approach the MS-102 exam with confidence.
Table of Contents (13 chapters)

Implementing and Managing Secure Access

Securing access and identity is one of the most important parts of managing a Microsoft 365 tenant.

As an administrator, you may need to configure the environment to restrict application and data access from secure locations or devices. Planning an access strategy for both internal and external access is critical to maintaining a secure operating environment.

This chapter will look at the following areas:

  • Planning for Identity Protection
  • Implementing and managing Azure AD Identity Protection
  • Planning Conditional Access policies
  • Implementing and managing Conditional Access policies

By the end of this chapter, you should be able to describe and configure Identity Protection and Conditional Access policies.