Book Image

Microsoft 365 Security Administration: MS-500 Exam Guide

By : Peter Rising
Book Image

Microsoft 365 Security Administration: MS-500 Exam Guide

By: Peter Rising

Overview of this book

The Microsoft 365 Security Administration (MS-500) exam is designed to measure your ability to perform technical tasks such as managing, implementing, and monitoring security and compliance solutions for Microsoft 365 environments. This book starts by showing you how to configure and administer identity and access within Microsoft 365. You will learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, the book shows you how RBAC and Azure AD Identity Protection can be used to help you detect risks and secure information in your organization. You will also explore concepts, such as Advanced Threat Protection, Windows Defender ATP, and Threat Intelligence. As you progress, you will learn about additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention, and Cloud App Discovery and Security. The book also ensures you are well prepared to take the exam by giving you the opportunity to work through a mock paper, topic summaries, illustrations that briefly review key points, and real-world scenarios. By the end of this Microsoft 365 book, you will be able to apply your skills in the real world, while also being well prepared to achieve Microsoft certification.
Table of Contents (29 chapters)
1
Section 1: Configuring and Administering Identity and Access in Microsoft 365
7
Section 2: Implementing and Managing Threat Protection
13
Section 3: Information Protection in Microsoft 365
18
Section 4: Data Governance and Compliance in Microsoft 365
24
Section 5: Mock Exam and Assessment
25
Chapter 20: Mock Exam
26
Chapter 21: Mock Exam Answers

Performing an audit log search

Now that we have auditing log searches enabled on our Microsoft 365 tenant, we can search a unified audit log to view a wide range of user or administrator actions. Some examples of these actions include the following:

  • A user renames a file.
  • A user creates a list in SharePoint.
  • An administrator changes a device's access policy.
  • A user removes a sensitivity label from a file.

These are only a few examples from an extremely comprehensive list of possible activities that can be interrogated using the audit log.

In the following example, we will interrogate the audit log to show us when a user has downloaded files to their computer. In order to do this, we need to carry out the following steps:

  1. From the Security & Compliance Center, navigate to Search | Audit log search. You will see the Audit log search tool, as in the following screenshot:

    Figure 15.12 – Audit log search

  2. Under Activities, click on...