Book Image

Microsoft 365 Administrator MS-102 Exam Guide

By : Aaron Guilmette
5 (3)
Book Image

Microsoft 365 Administrator MS-102 Exam Guide

5 (3)
By: Aaron Guilmette

Overview of this book

The MS-102: Microsoft 365 Administrator Exam Guide is meticulously crafted to empower readers with practical insights, starting with the essentials of provisioning a Microsoft 365 tenant, configuring identity synchronization and secure access, and deploying key Microsoft 365 Defender components. The book's purpose is clear—to guide professionals through the complexities of the MS-102 exam, ensuring not just exam success but mastery of the subject matter. This comprehensive exam guide comes with lifetime access to supplementary resources on an online platform, including flashcards, mock exams, and exam tips from experts. With unlimited access to the website, you'll have the flexibility to practice as many times as you desire, maximizing your exam readiness. As you progress through each chapter, the book unveils the layers of Microsoft 365 workloads, equipping you with the skills to manage role-based administration, deploy identity synchronization using Entra ID Connect, implement modern authentication methods, manage secure access through Conditional Access policies, and analyze security threats using Microsoft 365 Defender. By the end of this book, you'll have the proficiency to implement data loss prevention, configure information and data protection features, and approach the MS-102 exam with confidence.
Table of Contents (13 chapters)

Implementing and Managing Azure Identity Protection

Identity Protection has three policy configuration nodes on the Identity Protection blade:

  • User risk policy
  • Sign-in risk policy
  • Multifactor authentication registration policy

The Identity Protection User risk policy pane, depicted in Figure 6.5, is used to scope the Identity Protection features and enable the settings to control access enforcement:

Figure 6.5 – User risk policy

Figure 6.5 – User risk policy

The term user risk represents the likelihood that an identity (user account, service, or workload identity) is somehow compromised. User risk is determined based on all available signal data.

Sign-in risk, while similar to user risk, is a more restricted view of the signal data. Sign-in risk assertions are used to represent the likelihood that a sign-in or authentication request wasn’t authorized by the identity owner. The Sign-in risk policy pane features similar scoping and control policy...