Microsoft 365 Administrator MS-102 Exam Guide Master the Microsoft 365 Identity and Security Platform and Confidently Pass the MS-102 Exam
The MS-102: Microsoft 365 Administrator Exam Guide is meticulously crafted to empower readers with practical insights, starting with the essentials of provisioning a Microsoft 365 tenant, configuring identity synchronization and secure access, and deploying key Microsoft 365 Defender components. The...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England :
Packt Publishing
[2023]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009790332206719 |
Tabla de Contenidos:
- Cover
- FM
- Copyright
- Contributors
- Table of Contents
- Preface
- Chapter 1: Implementing and Managing a Microsoft 365 Tenant
- Making the Most out of This Book - Your Certification And Beyond
- Microsoft 365 Tenant
- Creating a Tenant
- Planning a Tenant
- Selecting a Tenant Type
- Selecting a Managed Domain
- Provisioning a Tenant
- Implementing and Managing Domains
- Acquiring a Domain Name
- Third-party Registrar
- Microsoft
- Configuring a Domain Name
- Managing DNS Records Manually
- Configuring a Default Domain
- Configuring Organizational Settings
- Services
- Security &
- Privacy
- Organization Profile
- Identifying and Responding to Service Health Issues
- Configuring Notifications for Service Health
- Monitoring Adoption and Usage
- Microsoft 365 Usage Reports
- Viva Insights
- Personal Insights
- Teamwork Habits
- Organization Trends
- Advanced Insights
- Adoption Score
- People Experiences
- Technology Experiences
- Special Reports
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 2: Managing Users and Groups
- Creating and Managing Users
- Creating and Managing Cloud Users
- Creating and Managing Synchronized Users
- Creating and Managing Guest Users
- Creating and Managing Contacts
- Microsoft 365 Admin Center
- Exchange Admin Center
- Creating and Managing Groups
- Microsoft 365 Admin Center
- Azure AD Portal
- Managing and Monitoring Microsoft 365 License Allocations
- Performing Bulk User Management
- Microsoft 365 Admin Center
- Azure AD Portal
- PowerShell
- Installing Modules
- Connecting to Azure AD
- Working with PowerShell
- Retrieving User Data
- Updating Users
- Updating Licenses
- Creating Users
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 3: Managing Roles in Microsoft 365.
- Managing Roles in Microsoft 365 and Azure AD
- Planning for Role Assignments
- Managing Roles in the Microsoft 365 Admin Center
- Managing Role Groups for Microsoft Defender, Microsoft Purview, and Microsoft 365 Workloads
- Microsoft Defender
- Microsoft Purview
- Microsoft 365 Workloads
- Managing Administrative Units
- Creating Administrative Units
- Viewing and Updating Administrative Units
- Planning and Implementing Privileged Identity Management
- Creating a Role Assignment
- Reviewing Role Assignments
- Alerting
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 4: Implementing and Managing Identity Synchronization with Azure AD
- Preparing for Identity Synchronization by Using IdFix
- Configuring and Managing Directory Synchronization by Using Azure AD Connect
- Planning and Sizing
- Installing the Synchronization Service
- Configuring Azure AD Connect Filters
- Domain and Organizational Unit-Based Filtering
- Group-Based Filtering
- Attribute-Based Filtering
- Monitoring Synchronization by Using Azure AD Connect Health
- Azure AD Connect Health
- Azure AD Connect Health for Sync
- Azure AD Connect Health for Directory Services
- Azure AD Connect Health for Active Directory Federation Services
- Troubleshooting Azure AD Connect Synchronization
- Configuring and Managing Directory Synchronization by Using Azure AD Connect Cloud Sync
- Installing the Provisioning Agent
- Configuring the Provisioning Service
- Customizing the Provisioning Service
- Scoping Filters
- Attribute Mapping
- Troubleshooting Azure AD Connect Cloud Sync Synchronization
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 5: Implementing and Managing Authentication
- Implementing and Managing Authentication Methods
- Choosing an Authentication Mechanism
- Windows Hello for Business.
- Microsoft Authenticator App
- FIDO2 Security Keys
- Comparison
- Configuring Windows Hello
- Configuring Microsoft Authenticator
- Configuring the Authentication Policy
- Registering Devices
- Configuring FIDO2
- Configuring the Authentication Policy
- Registering Devices
- Implementing and Managing Self-Service Password Reset
- Configuring SSPR
- Managing SSPR
- Authentication Methods
- Registration
- Notifications
- Customization
- On-premises integration
- Implementing and Managing Azure AD Password Protection
- Custom smart lockout
- Custom banned passwords
- Password protection for Windows Server Active Directory
- Configuring and Managing Multifactor Authentication
- Per-User Multifactor Authentication
- Security Defaults
- Conditional Access
- Additional Multifactor Authentication Behavior Settings
- Investigating and Resolving Authentication Issues
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 6: Implementing and Managing Secure Access
- Planning for Identity Protection
- Investigating Risks
- Remediating risks
- Implementing and Managing Azure Identity Protection
- Planning Conditional Access Policies
- Assignments
- Conditions
- Access Controls
- Implementing and Managing Conditional Access Policies
- Creating Conditional Access Policies
- Reporting on Conditional Access Policies
- Configuring a Log Analytics Workspace
- Integrating Azure AD or Entra ID Logs
- Reviewing the Workbook
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 7: Managing Security Reports and Alerts by Using the Microsoft 365 Defender Portal
- Instructions to Unlock the Free Practice Resources
- Reviewing and Taking Action to Improve the Microsoft Secure Score in the Microsoft 365 Defender Portal.
- Reviewing and Responding to Security Incidents and Alerts in Microsoft 365 Defender
- Reviewing alerts and incidents
- Attack story
- Alerts
- Assets
- Investigations
- Evidence and Response
- Responding to Alerts and Incidents
- Reviewing and Responding to Issues Identified in Security and Compliance Reports in Microsoft 365 Defender
- General
- Endpoints
- Email and Collaboration
- Cloud Apps
- Reviewing and Responding to Threats Identified in Threat Analytics
- Overview
- Analyst Report
- Related Incidents
- Impacted Assets
- Endpoints Exposure
- Recommended Actions
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 8: Implementing and Managing Email and Collaboration Protection Using Microsoft Defender for Office 365
- Implementing Policies and Rules in Defender for Office 365
- Deploying the Preset Security Policies
- Configuring Standalone Policies
- Anti-Phishing
- Anti-Spam
- Anti-Malware
- Safe Attachments
- Safe Links
- Configuring Rules
- Tenant Allow/Block Lists
- Email Authentication Settings
- Advanced Delivery
- Enhanced Filtering
- Quarantine Policies
- Using the Configuration Analyzer
- Reviewing and Responding to Threats Identified in Defender for Office 365
- Email &
- Collaboration Alerts
- Investigations
- Explorer and Real-Time Detections
- All Email
- Malware
- Phish
- Campaigns
- Content Malware
- URL Clicks
- Creating and Running Campaigns
- Creating a Phishing Campaign
- Creating a Training Simulation
- Reviewing Reports
- Unblocking Users
- Configuring Alerts
- Removing Restrictions
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 9: Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint
- Overview of Microsoft Defender for Endpoint
- Features
- Requirements
- Deployment Architectures.
- Configuring Defender for Endpoint Settings
- Configuring Defender for Endpoint Options
- Integrating Defender for Endpoint with Intune
- Establishing a Service-to-Service Connection
- Enabling Compliance Policy Evaluation
- Enabling App Protection Policy Evaluation
- Configuring a Compliance Policy
- Configuring a Conditional Access Policy
- Onboarding Devices to Defender for Endpoint
- Onboarding Windows Devices
- Onboarding with Intune
- Endpoint Detection and Response (EDR) Policy
- Other Onboarding Alternatives
- Onboarding macOS Devices
- Onboarding a Configuration Profile
- Extensions Configuration Profile
- Full Disk Access Configuration Profile
- Network Filter Configuration Profile
- Notifications Configuration Profile
- Background Services Configuration Profile
- Onboarding iOS Devices
- All Devices
- Supervised Devices
- Unsupervised Devices
- Onboarding Android Devices
- Bring Your Own Device
- Enterprise Enrolled Devices
- Reviewing and Responding to Endpoint Vulnerabilities
- Recommendations
- Remediation
- Inventories
- Weaknesses
- Event Timeline
- Baseline Assessment
- Creating a Security Profile
- Reviewing Assessment Results
- Creating and Managing Exceptions
- Reviewing and Responding to Risks
- Investigate
- Attack Story
- Alerts
- Assets
- Investigations
- Evidence and Response
- Respond
- Taking Actions
- Resolve
- Tuning
- Automate
- Summary
- Exam Readiness Drill - Chapter Review Questions
- Chapter 10: Implementing Microsoft Purview Information Protection and Data Lifecycle Management
- Implementing and managing sensitive info types using keywords, keyword lists, or regular expressions
- Managing sensitive information types
- Using keywords
- Using regular expressions
- Using built-in functions
- Using document fingerprinting
- Using Exact Data Match.
- Testing and editing sensitive information types.