MS-900 Fundamentals
MS-900 Fundamentals
FOR USE ONLY AS PART OF MICROSOFT VIRTUAL TRAINING DAYS PROGRAM. THESE MATERIALS ARE NOT AUTHORIZED
FOR DISTRIBUTION, REPRODUCTION OR OTHER USE BY NON-MICROSOFT PARTIES.
Microsoft 365 Virtual
Training Day:
Fundamentals
Module 1: Discuss cloud concepts
Module 1
Agenda • Discuss cloud concepts
Lesson 1:
Discuss cloud concepts
Lesson 1 Introduction
• Learned about the three different types of deployment models (public, private, and
hybrid) for cloud computing.
• Examined several of the benefits that cloud computing provides, such as high
availability, scalability, and geographic distribution.
• Learned about the three different cloud service models (IaaS, PaaS, SaaS) and some
of the advantages of each.
Module 2: Describe Microsoft 365 core
services and concepts (Part 1 of 2)
• What is Microsoft 365
• Describe the differences between Office 365, Microsoft 365, and Windows 365.
Secure sign-ins with multi-factor authentication (MFA) and built-in security features of
Microsoft 365 and Windows.
Manage your hybrid worker's devices from the cloud with security settings, allowed apps,
and to require compliance with system health.
Be collaborative and productive with online meetings, chat, shared workspaces, and tasks.
Office 365, Microsoft 365, and Windows 365
• Describe how the core tools in Microsoft 365 can increase productivity.
• Describe how the Microsoft 365 Apps help people craft compelling content in real-time.
• Describe how the capabilities of the work management tools optimize operations.
OneDrive Project
SharePoint Bookings
Outlook To Do
Microsoft 365 Apps has the benefits of the cloud: Some of the applications in Microsoft 365 Apps:
• Work across multiple devices. Teams PowerPoint
• Work with apps that are always up to date. Word Outlook
• Work intelligently through connected experiences. Excel OneNote
Work management tools in Microsoft 365
Microsoft To Do
Microsoft Planner
To Do is an intelligent task
Planner is an intuitive,
management app that
collaborative task
makes it easy to plan and
management tool.
manage your day.
Business class email and calendaring with Microsoft Exchange
• Describe how Teams helps people connect and collaborate to do their best work.
• Describe how Microsoft Viva helps organizations create thriving work cultures.
• Describe how the features of SharePoint and OneDrive provide a cohesive file-sharing experience.
• Describe how Yammer communities can help foster connections within your organization.
Collaboration workloads of Teams (1/2)
Teams comes with many features and functionalities to help your users connect and work together.
SharePoint OneDrive
Collaboration tool for creating websites, publishing Access, share, and collaborate on files from anywhere
content, and storing files
• Access files from all your devices
Helps organizations share and manage content,
• Manage files on the go
knowledge, and applications
• Seamless collaboration with files
Three main types of sites:
• Share inside or outside your organization
• Team sites
• Quickly find files that matter most
• Communication sites
• Protect your files with enterprise-grade security
• Hub sites
• Leader engagement
• Knowledge sharing
• Describe the different capabilities of Windows 365 and Azure Virtual Desktop.
• Describe the deployment and servicing methods for Microsoft 365 Apps.
Microsoft Endpoint Manager (MEM) lets you manage your users’ devices.
• Android and iOS mobile phones
• Windows and macOS PCs
• custom devices
Is a way to simplify the lives of IT pros and maintain a consistent Windows experience
• Describe how Viva Insights help organizations build better work habits.
• Describe the capabilities of the Microsoft 365 admin center and user portal.
• Describe the reports available in the Microsoft 365 admin center and other admin centers.
Now that you've completed this lesson, you should be able to:
• Describe the modern management capabilities of Microsoft Endpoint Manager.
• Describe the different capabilities of Windows 365 and Azure Virtual Desktop.
• Describe the deployment and release models for Windows-as-a-Service.
• Describe the deployment and servicing methods for Microsoft 365 Apps.
• Describe how Viva Insights helps organizations build better work habits.
• Describe the capabilities of the Microsoft 365 admin center and user portal.
• Describe the reports available in the Microsoft 365 admin center and other admin centers.
• Compute layer security such as securing access to virtual machines either on-
premises or in the cloud by closing certain ports.
• Application layer security ensures that applications are secure and free of
security vulnerabilities.
• Data layer security controls access to business and customer data, and
encryption to protect data.
Confidentiality, Integrity, Availability (CIA)
Data residency - When it comes to compliance, data residency regulations govern the physical
locations where data can be stored and how and when it can be transferred, processed, or accessed
internationally.
Data sovereignty - the concept that data, particularly personal data, is subject to the laws and
regulations of the country/region in which it's physically collected, held, or processed.
Data privacy - Providing notice and being transparent about the collection, processing, use, and
sharing of personal data are fundamental principles of privacy laws and regulations.
Lesson 2:
Authentication (AuthN)
Authentication is the process of proving that a person is
who they say they are. Authentication grants access.
Authorization (AuthZ)
Authorization determines the level of access or the
permissions an authenticated person has to your data
and resources.
Define Identity as the primary security perimeter
At the center of modern authentication is the role of the identity provider (IdP).
IdP enables organizations to establish authentication and authorization policies, monitor user behavior, and more.
A fundamental capability of an IdP and “modern authentication” is the support for single sign-on (SSO).
Active Directory Domain Services (AD DS) stores information about members of the
domain, including devices and users, verifies their credentials, and defines their access
rights.
Azure Active Directory is the next evolution of identity and access management
solutions. It provides organizations with an Identity as a Service (IDaaS) solution for all
their apps across cloud and on-premises.
Concept of Federation
• Describe how Microsoft 365 Defender provides integrated protection against sophisticated
attacks.
1 2 3 4
Threat protection Reports Threat investigation and Automated investigation
policies response capabilities and response capabilities
What is a Cloud Access Security Broker and its Office 365 Cloud App Security is a subset of
four pillars -Visibility, Threat protection, Data Microsoft Defender for Cloud Apps that provides
security and Compliance. enhanced visibility and control for Office 365.
Identify suspicious activities and advanced attacks across the cyberattack kill-chain
The Microsoft 365 Defender portal combines The Microsoft 365 Defender navigation pane include
protection, detection, investigation, and these options and more:
response to email, collaboration, identity,
and device threats, in a central portal.
• The Service Trust Portal provides information, tools, and other resources about Microsoft
security, privacy, and compliance practices.
• Sign in with your Microsoft cloud services account to access all the available
documentation.
• From the main menu, you access:
▪ Service Trust Portal, Compliance Manager, Trust Documents, Industries & Regions,
Trust Center, Resources, My Library and More
Demo Service Trust Portal
Microsoft's privacy principles
Strong legal protections: Respecting local
Control: Putting you, the customer, in
privacy laws and fighting for legal
control of your data and your privacy with
protection of privacy as a fundamental
easy-to-use tools and clear choices.
human right.
Security: Protecting the data that's Benefits to you: When Microsoft does
entrusted to Microsoft by using strong collect data, it's used to benefit you, the
security and encryption. customer, and to make your experiences
better.
Microsoft Priva
Priva Privacy Risk Management
• Overview dashboard provides automatic updates
about your data with important trends.
• Data profile provides a snapshot view of the
personal data your organization stores in
Microsoft 365 and where it lives.
• Set up policies that identify privacy risks in your
Microsoft 365 environment and enable easy
remediation.
• Describe the Cloud Solution Provider (CSP) pricing model for Microsoft cloud services.
• Describe the available base licensing and add-on licensing options for Microsoft 365.
Microsoft 365 for home Microsoft 365 Business Microsoft 365 Enterprise
Bring the same great Designed for small and Designed for large organizations.
productivity benefits into medium-sized organizations. • 4 subscription tiers: Apps for
your personal and family Enterprise, E3, E5, F3
life.
Microsoft 365 Education Microsoft 365 for frontline workers Microsoft 365 Government
Designed for educational Designed to empower frontline workers Designed for government
institutions and has two and optimize frontline impact. institutions and has two
subscription plans for subscription plans.
faculty and students.
Available licensing and management options (2/2)
• Describe support offerings available for Microsoft 365 and how to create a support request.
• Determine how to track the service health status by using the Microsoft 365 dashboard.
Web chat, email, and phone support Support through a Microsoft Partner
Pre-sales support
Support requests in the Microsoft 365
Demo admin center
Explain service level agreement (SLAs) concepts
• Microsoft protects and keeps your organization’s data available through data storage
redundancy, monitoring data and preventative measures
Explore how organizations can share feedback on Microsoft
365 services
The following list describes the ways you can communicate directly with Microsoft:
• Feedback
• In-product experiences
• Windows Feedback Hub
• Microsoft Tech Community
• Microsoft Store
• UserVoice forums
Lesson 3: