MS-102 2023
MS-102 2023
Administrator
Orin Thomas
Exam Ref MS-102 Microsoft 365 Administrator
ISBN-13: 978-0-13-819946-3
ISBN-10: 0-13-819946-9
$PrintCode
TRADEMARKS
Every effort has been made to make this book as complete and
as accurate as possible, but no warranty or fitness is implied.
The information provided is on an “as is” basis. The author, the
publisher, and Microsoft Corporation shall have neither liability
nor responsibility to any person or entity with respect to any
loss or damages arising from the information contained in this
book or from the use of the programs accompanying it.
SPECIAL SALES
EDITOR-IN-CHIEF
Brett Bartow
EXECUTIVE EDITOR
Loretta Yates
ASSOCIATE EDITOR
Shourav Bose
DEVELOPMENT EDITOR
Rick Kughen
MANAGING EDITOR
Sandra Schroeder
Tracey Croom
PRODUCTION EDITOR
Dan Foster
COPY EDITOR
Rick Kughen
INDEXER
PROOFREADER
Dan Foster
TECHNICAL EDITOR
Ed Fisher
EDITORIAL ASSISTANT
Cindy Teeters
COVER DESIGNER
COMPOSITOR
Danielle Foster
Pearson’s commitment to diversity, equity,
and inclusion
Introduction
Organization of this book
Preparing for the exam
Microsoft certifications
Access the exam updates chapter and online
references
Errata, updates, and book support
Stay in touch
Chapter 1 Deploy and configure Microsoft 365 tenants
Skill 1.1: Deploy a Microsoft 365 tenant
Plan and create a tenant
Plan and create subscriptions
Skill 1.2: Manage Microsoft 365 DNS domains
Implement a domain name strategy
Manage domains
Configure workloads for a new domain name
Skill 1.3: Manage Microsoft 365 organizational settings
Configure organizational settings
Complete the organization profile
Add a Microsoft partner or work with Microsoft
FastTrack
Edit an organizational profile
Skill 1.4: Manage Microsoft 365 subscription and tenant
health
Manage service health alerts
Create an internal service health response plan
Monitor service health
Skill 1.5: Monitor adoption and usage
Configure and review reports
Schedule and review security and compliance
reports
Schedule and review usage metrics
Chapter summary
Thought experiment
Deploying a Microsoft 365 tenancy at Tailwind
Traders
Thought experiment answers
Chapter 2 Managing M365 users, groups, and identity
synchronization
Skill 2.1: Manage Microsoft 365 identities
Plan Microsoft 365 and Microsoft Entra ID
identities
Manage users
Manage groups
Manage external identities by using Microsoft
Entra External ID
Manage Microsoft 365 contacts
Manage product licenses
Skill 2.2: Prepare for identity synchronization
Evaluate synchronization requirements
Prepare for directory synchronization
Skill 2.3: Manage identity synchronization by using
Microsoft Entra Connect
Microsoft Entra Connect
Microsoft Entra Connect user sign-in options
Installing Microsoft Entra Connect
Monitor Microsoft Entra Connect Health
Manage Microsoft Entra Connect synchronization
Implement multiforest AD DS scenarios
Skill 2.4: Manage identity synchronization by using
Microsoft Entra Cloud Sync
Microsoft Entra Cloud Sync
Installing Microsoft Entra Cloud Sync
Comparing Microsoft Entra Cloud Sync with
Microsoft Entra Connect
Troubleshooting Microsoft Entra Cloud Sync
Chapter summary
Thought experiment
Thought experiment answers
Chapter 3 Managing Microsoft 365 Roles
Skill 3.1: Manage role membership
Manage admin roles
Manage role allocations by using Microsoft Entra
ID
Skill 3.2: Microsoft 365 administrative roles
Global Administrator
Global Reader
Service Support Administrator
Exchange Administrator (Exchange Online
Administrator)
Helpdesk Administrator
SharePoint Administrator
Teams Administrator
User Administrator
Delegated Administrator
Skill 3.3: Microsoft Defender roles and role groups
Microsoft 365 Defender and AAD global roles
Microsoft Defender for Endpoint roles
Microsoft Defender for Office 365 roles
Defender for Office 365 administrative role groups
Defender for Cloud Apps roles
Microsoft Defender for Identity administrative
roles
Microsoft Defender for Business administrative
roles
Creating custom roles in Microsoft 365 Defender
Skill 3.4: Microsoft Purview roles
Collection Administrators
Data Curators
Data Readers
Data Source Administrator
Insights Reader
Policy Author
Workflow Administrator
Assigning Purview roles
Manage administrative units
Configure Microsoft Entra ID Privileged Identity
Management (PIM)
Skill 3.5: Microsoft Entra ID role-based access control
Delegate admin rights
Configure administrative accounts
Plan security and compliance roles for Microsoft
365
Chapter summary
Thought experiment
Managing compliance at Contoso
Thought experiment answers
Chapter 4 Manage secure access and authentication
Skill 4.1: Implement and manage authentication
Basic and modern authentication
Implement an authentication method
Certificate-based Microsoft Entra ID authentication
Implement passwordless authentication
Skill 4.2: Managing passwords
Manage password policies
Resetting passwords
Skill 4.3: Microsoft Entra ID Password Protection
Configure banned password lists
Microsoft Entra ID Smart Lockout
Skill 4.4: Multifactor authentication (MFA)
Enable MFA
Administer MFA users
Account lockout
Block/unblock users
Fraud alert settings
OATH tokens
Phone call settings
Report MFA utilization
Skill 4.5: Self-service password reset
Password reset registration
Enable self-service password reset
Skill 4.6: Microsoft Entra ID Identity Protection
Skill 4.7: Conditional access policies
Preparing for conditional access
Create a conditional access policy
What If tool
Skill 4.8: Resolving authentication issues
Audit logs
Sign-in event logs
Self-service password reset activity
Chapter summary
Thought experiment
Thought experiment answers
Chapter 5 Manage security and threats using Microsoft 365
Defender
Skill 5.1: Security reports and alerts
Secure Score
Incidents
Alerts
Threat analytics
Skill 5.2: Collaboration protection
Defender for Office Policies and Rules
Configuration analyzer
Managing threats with Defender for Office
Managing attack simulations
Blocked users
Skill 5.3: Endpoint protection
Defender for Endpoint
Onboarding devices
Manage Defender for Endpoint settings
Chapter summary
Thought experiment
Configuring Microsoft 365 Defender settings and
policies
Thought experiment answers
Chapter 6 Manage Microsoft Purview compliance
Skill 6.1: Sensitive information types
Data Lifecycle Management
Manage sensitive information types
Compliance-related roles
Skill 6.2: Sensitivity labels and policies
Sensitivity labels
Sensitivity label policies
Skill 6.3: Retention labels and policies
Retention policies
Retention labels
Preservation locks
Inactive mailbox retention
Skill 6.4: Data Loss Prevention
DLP policies
DLP alerts
Chapter summary
Thought experiment
Compliance at Tailwind Traders
Thought experiment answers
Chapter 7 MS-102 Microsoft 365 Administrator exam updates
The purpose of this chapter
About possible exam updates
Impact on you and your study plan
Exam objective updates
Updated technical content
Objective mapping
Index
Acknowledgments
This book covers every major topic area on the exam but does
not cover every exam question. Only the Microsoft exam team
has access to the exam questions, and Microsoft regularly adds
new questions to the exam, making it impossible to cover
specific questions. You should consider this book a supplement
to your relevant real-world experience and other study
materials. If you encounter a topic in this book that you do not
feel completely comfortable with, use the “Need more review?”
links you’ll find in the text to find more information and take
the time to research and study the topic. Great information is
available on learn.microsoft.com and in blogs and forums.
Microsoft certifications
MicrosoftPressStore.com/ERMS102/downloads
MicrosoftPressStore.com/ERMS102/errata
Stay in touch
The old saying goes, “Measure twice; cut once.” When it comes
to Microsoft 365, it’s better to understand the decisions you
must make and choose the appropriate path before deploying
Microsoft 365 than to realize you’ve made an unsuitable choice
after your organization is already using the service. In this
chapter, you’ll learn about the decisions you must make when
deploying a Microsoft 365 tenancy, how to integrate DNS
domain names into Microsoft 365, how to manage
organizational settings, how to monitor subscription health,
and how to determine how the people in your organization use
Microsoft 365 services.
The most important initial decisions you will make about your
Microsoft 365 tenancy will be the tenant’s name and region.
When you create a Microsoft 365 subscription, the subscription
tenancy is automatically assigned a custom onmicrosoft.com
domain. The tenant name is in the name.onmicrosoft.com
format, where name is the name you want to assign to your
organization’s tenancy. This name must be unique; no two
organizations can share the same tenant name. When creating
the tenancy, a check is performed against your proposed name.
You must select an alternative if a tenant with that name
already exists.
For example, if you select the United States as the tenant region,
your organization’s Microsoft 365 tenancy will be allocated
resources in a US data center. Selecting Australia means your
organization’s Microsoft 365 tenancy will be allocated resources
in a data center in Australia.
Unlike with other Microsoft 365 settings, you cannot change the
tenant region after you have selected it. The only way to alter a
tenant region is to cancel your existing subscription and create
a new one. It is possible to migrate tenant data to a new region,
but this is not a simple operation.
Multi-geo functionality
You can learn more about moving data to a new data center at
https://learn.microsoft.com/microsoft-365/enterprise/m365-dr-
overview.
Deploying the Microsoft 365 tenancy that will be used for the
pilot
Creating user accounts for pilot users
Configuring active use of email for pilot users
Deploying Microsoft 365 Apps for enterprise software
Enabling pilot user access to Microsoft 365 services
Soliciting pilot user feedback about the experience
You can learn more about using the Microsoft 365 trial edition if
you have an existing Office 365 subscription at
https://learn.microsoft.com/microsoft-365/commerce/try-or-buy-
microsoft-365.
Note
Exam Tip
Manage domains
You can assign the tenant a domain name that you own so that
you don’t have to use the tenant name regularly. For example,
you might sign up for a Microsoft 365 subscription with the
contoso.onmicrosoft.com tenant name. Any account you create
will use the contoso.onmicrosoft.com email suffix for the
account’s Office 365 Exchange mailbox.
.biz
.com
.info
.me
.mobi
.net
.org
.tv
.co.uk
.org.uk
This begins the process of adding the domain. You will need to
confirm ownership before you can use the domain. See the next
section for instructions.
You can only use a custom domain name with Microsoft 365 if
your organization owns that domain name. Microsoft requires
you to perform a series of DNS configuration changes to the
domain name to prove that your organization owns and
controls the domain. After you specify the domain you want to
add, you verify it on the Domain Verification page, which
opens automatically when you select Use This Domain.
4. Select Verify.
5. Microsoft 365 will attempt to confirm the presence of the
record. Depending on how the DNS is configured, the
verification process may take as long as 15 minutes to
complete.
You can check DNS settings at any time. To do so, select the
Microsoft 365 admin center domain, select Refresh, and note
whether the domain status is listed as Healthy (see Figure 1-8).
Microsoft 365 determines whether a domain is healthy by
performing a query against the records required for the
services you have chosen and validating that the results
returned by the query match those required by Microsoft 365.
FIGURE 1-8 TXT record in Azure DNS
In this section, you will learn what steps you can take to modify
the primary address so that it uses a new domain name.
You can change the primary email address if you add another
email address to a Microsoft 365 user account (see Figure 1-13).
Be aware that changing the primary email address also changes
the username.
FIGURE 1-13 Changing a user account’s primary email address
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
MX 0 @ <customdnsname>.mail.p
MX records
SPF records
The record should also be set with a TTL value of 3600. Only
one TXT record for an SPF should exist within a specific zone. If
an SPF record is already present, append the Microsoft 365
values to the existing record rather than creating a new one.
The first record will include the custom domain name and the
hash text, such as tailspintoys.com and
Y96nu89138789315669824, respectively. The second record will
include the exchangedelegation name with the custom domain
name and custom-generated domain-proof hash text like
exchangedelegation.tailspintoys.com and
Y3259071352452626169.
You can learn more about DNS records for Microsoft 365 at
https://learn.microsoft.com/microsoft-365/enterprise/external-
domain-name-system-records.
Microsoft Teams DNS records
Exam Tip
Setting Description
The Security & Privacy tab shown in Figure 1-21 allows you to
configure the settings shown in Table 1-5.
FIGURE 1-21 The Security & Privacy tab of the Org Settings page
Setting Description
You can learn more about the different areas of the Microsoft
365 admin center that you can use to configure organizational
settings at https://learn.microsoft.com/microsoft-
365/admin/admin-overview/admin-center-overview.
Setting Description
Exam Tip
The Service Health dashboard shows you the health status of all
services related to your organization’s Microsoft 365
subscription. For example, the Service Health dashboard
shown in Figure 1-25 shows that several services are in a
healthy state, and others are listed with advisories. To open this
dashboard, select Health in the left pane of the Microsoft 365
admin center and then select Service Health.
FIGURE 1-25 The Service Health dashboard
Status Definition
Exam Tip
Auditing reports
Data loss prevention (DLP) reports
Protection reports
Rules reports
You need one of the following roles to view reports in the
Security & Compliance Center:
You can learn more about the Microsoft 365 security and
compliance reports at https://learn.microsoft.com/microsoft-
365/admin/activity-reports/activity-reports.
Auditing reports
Top DLP Policy Matches for Mail View the top DLP policy
matches for sent and received email.
Top DLP Rule Matches for Mail View the top DLP rule
matches for sent and received email.
DLP Policy Matches by Severity for Mail Track DLP policy
matches by severity.
DLP Policy Matches, Overrides, and False Positives for
Mail View DLP matches, overrides, and false positives for
incoming and outgoing messages.
Protection reports
Top Senders and Recipients View the top mail senders, mail
recipients, spam recipients, and malware recipients across
the Microsoft 365 subscription.
Top Malware for Mail View the amount of malware
received through email for the reporting period.
Malware Detections View the amount of malware sent and
received through the Microsoft 365 subscription for the
reporting period.
Spam Detections View the amount of spam based on the
content being filtered or the original sending host being
blocked.
Sent and Received Mail View the amount of sent and
received mail categorized by good mail, malware, spam, and
messages dealt with by rules.
Rules reports
The following rules reports are available through the Office 365
admin center:
Top Rule Matches for Mail View the number of messages
based on sent and received transport rule matches.
Rule Matches for Mail View all rule matches for received
and sent email.
Users who hold the following roles can view these reports:
Global Administrator
Exchange Administrator
SharePoint Administrator
Report Reader
Teams Service Administrator
Teams Communications Administrator
The Mailbox Usage report, shown in Figure 1-32, shows the total
number of mailboxes, the total number of active user
mailboxes, the amount of storage used across all mailboxes, and
the mailboxes by quota status (good, warning issued, send
prohibited, and send/receive prohibited). You can also view the
number of deleted items, the last activity date, and the number
of items in each user’s mailbox.
The Email App Usage report tracks the email app used by each
user to access Exchange Online. This enables you to view each
user’s app usage profile. This report tracks usage through
Outlook on Windows, Outlook on Mac OSX, Outlook on the web,
and mobile clients.
Last activity date The last time the user interacted with
SharePoint Online
Files viewed or edited The number of files with which the
user has interacted that were hosted on the organization’s
SharePoint Online instance
Files synced The number of files that have synchronized
between devices used by the user and SharePoint Online
Files shared internally The number of files shared with
other Office 365 users through SharePoint Online
Files shared externally The number of files shared through
Office 365 with external users
You can learn more about the SharePoint Site Usage report at
https://learn.microsoft.com/en-us/microsoft-365/admin/activity-
reports/sharepoint-site-usage-ww?view=o365-worldwide.
You can learn more about the Yammer Device Usage report at
https://learn.microsoft.com/office365/admin/activity-
reports/yammer-device-usage-report.
Group name
Group administrator
Group type
Connection to Office 365
Last activity date
Members
Messages posted
Messages read
Messages liked
You can learn more about the Yammer Groups Activity report at
https://learn.microsoft.com/office365/admin/activity-
reports/yammer-groups-activity-report.
Microsoft Teams User Activity report
Channel messages
Chat messages
Calls
Meetings
Other activities
You can learn more about the Microsoft Teams User Activity
report at https://learn.microsoft.com/office365/admin/activity-
reports/microsoft-teams-user-activity.
Windows
macOS
Web
iOS
Android phone
Windows phone
You can learn more about the Microsoft Teams Device Usage
report at https://learn.microsoft.com/en-us/microsoft-
365/admin/activity-reports/microsoft-teams-device-usage-
preview?view=o365-worldwide.
Exam Tip
Thought experiment
Manage users
You can use the Microsoft 365 admin center or the Entra ID
admin center available at https://entra.microsoft.com to manage
Microsoft Entra ID user accounts. The Entra ID admin center
gives you a larger set of options for managing the properties of
user accounts than the Microsoft 365 admin center because you
can edit extended user properties.
1. In the Microsoft Entra admin center, select Users > All Users
> New User.
2. On the New User blade, provide the following information:
1. Name The user’s actual name.
2. User Name The user’s sign-in name in UPN format.
3. Profile The user’s first name, last name, job title, and
department.
4. Properties The user’s source of authority. By default, if
you are creating the user using the Entra ID admin center
or the Microsoft 365 admin center, this will be Entra ID.
5. Groups The groups the user should be a member of.
6. Directory Role Whether the account has a User, Global
Administrator, or a limited administrator role.
7. Password The automatically generated password. With
the Show Password option, you can transmit the
password to the user through a secure channel.
You can also use the Microsoft Entra admin center to perform
the following user administrator tasks:
Manage groups
The account’s user type does not determine how the user signs
in; it merely indicates the user’s relationship to the
organization that controls the Microsoft Entra ID tenancy. It can
also be used to implement policies that depend on the value of
this attribute. It is the source attribute property that indicates
how the user authenticates. This property can have the
following values:
Guest accounts
Contacts are people not part of your organization that you want
to be present within address books. For example, there might
be specific partners or vendors you want people in your
organization to find quickly; in that case, you can add them as
contacts. When people type a contact’s name into Outlook or
Microsoft Teams, their details will be prepopulated as though
they were typical members of your organization. You can
provide a contact’s email address, phone number, fax number,
website, street address, city, state, zip, and country and
configure a MailTip for them.
You can add contacts from the Microsoft 365 admin center by
going to Contacts under Users, as shown in Figure 2-5.
Exam Tip
You can view the number of valid licenses and the number of
those licenses that have been assigned on the Licenses page.
You access this page by selecting Billing in the left pane of the
Microsoft 365 admin center and then selecting Licenses, as
shown in Figure 2-6.
FIGURE 2-6 The Licenses page
givenName
sn
samAccountName
givenName
displayName
mail
proxyAddress
mailNickName
UPNs that are used with Microsoft 365 can only contain the
following characters:
Letters
Numbers
Periods
Dashes
Underscores
IdFix
Password synchronization
Pass-through authentication
Exam Tip
You can check the forest functional level using the Active
Directory Domains And Trusts console. To do this, perform
the following steps:
You can also check the forest functional level by using the
following Microsoft PowerShell command:
(Get-ADForest).ForestMode
Connectivity requirements
If you will use a separate SQL Server instance, ensure that the
account used to install and configure Microsoft Entra Connect
has systems administrator rights on the SQL instance and that
the service account used for Microsoft Entra Connect has public
permissions on the Microsoft Entra Connect database.
Hardware requirements
10,000–50,000 4 GB 70 GB
50,000–100,000 16 GB 100 GB
100,000–300,000 32 GB 300 GB
300,000–600,000 32 GB 450 GB
accountEnabled MsExchArchiveGUID
Assistant MsExchArchiveName
altRecipient msExchArchiveStatus
Authoring msExchAssistantName
C msExchAuditAdmin
Cn msExchAuditDelegate
Co msExchAuditDelegateAdmin
Company msExchAuditOwner
countryCode MsExchBlockedSendersHash
Department msExchBypassAudit
Description MsExchBypassModerationFrom
DLMembersLink
displayName MsExchBypassModerationLink
dLMemRejectPerms msExchCoManagedByLink
dLMemSubmitPerms msExchDelegateListLink
ExtensionAttribute1 msExchELCExpirySuspensionE
ExtensionAttribute10 msExchELCExpirySuspensionS
ExtensionAttribute11 msExchELCMailboxFlags
ExtensionAttribute12 MsExchEnableModeration
ExtensionAttribute13 msExchExtensionCustomAttrib
ExtensionAttribute14 msExchExtensionCustomAttrib
ExtensionAttribute15 msExchExtensionCustomAttrib
ExtensionAttribute2 msExchExtensionCustomAttrib
ExtensionAttribute3 msExchExtensionCustomAttrib
ExtensionAttribute4 MsExchGroupDepartRestriction
ExtensionAttribute5 MsExchGroupJoinRestriction
ExtensionAttribute6 msExchHideFromAddressLists
ExtensionAttribute6 msExchHideFromAddressLists
ExtensionAttribute7 MsExchImmutableID
ExtensionAttribute8 msExchLitigationHoldDate
ExtensionAttribute9 msExchLitigationHoldOwner
Facsimiletelephonenumber MsExchMailboxGuid
givenName msExchMailboxAuditEnable
GroupType msExchMailboxAuditLogAgeLi
hideDLMembership MsExchModeratedByLink
Homephone MsExchModerationFlags
Info MsExchRecipientDisplayType
Initials msExchRecipientTypeDetails
ipPhone MsExchRemoteRecipientType
L msExchRequireAuthToSendTo
legacyExchangeDN MsExchResourceCapacity
Mail MsExchResourceDisplay
Mailnickname MsExchResourceMetaData
managedBy MsExchResourceSearchProper
Manager msExchRetentionComment
Member msExchRetentionURL
middleName MsExchSafeRecipientsHash
Mobile MsExchSafeSendersHash
msDS-HABSeniorityIndex MsExchSenderHintTranslation
msDS- msExchTeamMailboxExpiratio
PhoneticDisplayName
Exam Tip
Remember what tools you can use to trigger synchronization.
This skill deals with Microsoft Entra Cloud Sync. This rather
confusingly named utility performs some, but not all, of the
same functions as Microsoft Entra Connect. Microsoft might
intend to replicate all the existing tools’ functionality and
function as an eventual replacement. Currently, the tool
provides a lightweight option for organizations that do not
require all of Microsoft Entra Connect’s functionality.
You can verify that the agent is running by opening the Services
console and verifying that the following services are present
and running:
You can learn more about installing Microsoft Entra Cloud Sync
at https://learn.microsoft.com/azure/active-directory/cloud-
sync/how-to-install.
TABLE 2-3 Feature comparison of Microsoft Entra Connect and Microsoft Entra
Cloud Sync
If you need to repair the cloud sync service account, you can
use the Repair-AADCloudsyncToolsAccount cmdlet. This
cmdlet is also found in the AADCloudSyncTools PowerShell
module.
Chapter summary
Thought experiment
1. What tool can you use to recover the deleted users, both on-
premises and in Microsoft 365?
2. Are you able to use Microsoft Entra Cloud Sync for
synchronization?
3. Which firewall ports do you need to open for the
synchronization server on the external firewall?
Role Description
Exam Tip
Global Administrator
Global Reader
Service Support Administrator
Exchange Administrator (Exchange Online Administrator)
Helpdesk Administrator
SharePoint Administrator
Teams Administrator
User Administrator
Delegated Administrator
In this section, you will learn about the most commonly used
Microsoft 365 administrative roles and how they can be used to
manage specific workload settings. By default, the roles visible
in the Microsoft 365 admin center are a subset of all the
Microsoft Entra ID roles listed earlier in Table 3-1. In most
environments, this small set of roles will likely meet your
needs. A list of common role assignments is shown in Figure 3-
3. You can click Show All Roles to switch from the list of
suggested roles to the list of all available roles if you prefer to
assign these roles from the Microsoft 365 admin center instead
of the Microsoft Entra ID blade in the Azure portal.
FIGURE 3-3 Microsoft 365 Role Assignments
Global Administrator
Global Reader
Helpdesk Administrator
SharePoint Administrator
User Administrator
Delegated Administrator
Global Administrator
Security Administrator
Security Operator
Global Reader
Security Reader
The Administrator level roles can manage all elements, and the
Reader roles can view configuration settings and telemetry data
but cannot alter any of these settings. In most cases, it will not
be necessary for any account to hold the Global Administrator
scoped to any specific Microsoft Defender product, so a role like
Security Operator will be more appropriate. Using these
common roles scoped for each Microsoft 365 Defender product
is occasionally termed the Unified RBAC approach; one aim of
this approach is to minimize the confusion of each Microsoft
Defender product having its own idiosyncratic set of role
groups.
The following roles are often collected into role groups to assign
permissions related to privacy management:
You can learn more about Microsoft Defender for Office 365
roles at https://learn.microsoft.com/microsoft-365/security/office-
365-security/scc-permissions.
Defender for Office 365 administrative role groups
Other Defender for Office 365 role groups that don’t fit neatly
into any category include the following:
Activities
Alerts
Policies (including the ability to add
and edit policies)
Accounts
App permissions
Files
Permissions for the API token
Governance actions
The RBAC permissions required for each of these tasks that can
be assigned to a custom role are listed in Table 3-3.
You can learn more about Microsoft Defender for Business roles
at https://learn.microsoft.com/microsoft-365/security/defender-
business/mdb-roles-permissions.
Defender for
View Data-Security Operations
Endpoint
Defender for
View-Only Manage Alerts
Office 365
Organization Configuration
Audit Logs
View-Only Audit Logs
Security Reader
View-Only Recipients
Defender for
Security Operator
Cloud Apps
Security Reader
Global Reader
Table 3-6 lists the permissions you would need to assign in each
product to a custom role if you want to allow the role holder to
have the equivalent permissions to an existing role.
Defender
for View Data – Security Operations
Endpoint
Defender
Security Reader
for Office
View-Only Recipients
365
Defender
Security Reader
for Cloud
Global Reader
Apps
Table 3-7 lists the permissions you would need to assign in each
product to a custom role if you want to allow the role holder to
have the equivalent permissions to an existing role.
Defender
Alerts Investigation
for Endpoint
Defender
for Office Manage Alerts
365 Security Admin
Defender
Security Admin
for Cloud
Compliance Admin
Apps
Security Operator
Security Reader
Table 3-8 lists the permissions you would need to assign in each
product to a custom role if you want to allow the custom role
holder to have the equivalent permissions to an existing role.
Defender for
Active Remediation Actions –
Endpoint
Security Operations
Defender for
Manage Alerts
Office 365
Security Admin
Defender for
Not applicable
Cloud Apps
Table 3-9 lists the permissions you would need to assign in each
product to a custom role if you want to allow the custom role
holder to have the equivalent permissions to an existing role.
Collection Administrators
Data Curators
Data Readers
Data Source Administrator
Insights Reader
Policy Author
Workflow Administrator
Assigning Purview roles
Collection Administrators
Data Curators
Data Curators can access the data catalog, manage assets, create
custom classifications, and configure glossary terms; also, this
role provides read access to data estate insights.
Data Readers
Provides users assigned the role the ability to view data assets,
classifications, classification rules, collections, and glossary
terms.
Users assigned this role can configure data sources and scans.
Grant the Data Source Administrator role on a specific data
source to allow them to run new scans using a preexisting scan
rule. For the ability to create new scan rules, the user also
requires the Data Reader or Data Curator roles.
Insights Reader
Policy Author
A user assigned the Policy Author role can view, update, and
delete Microsoft Purview policies using the policy management
app.
Workflow Administrator
Authentication Administrator
Groups Administrator
Helpdesk Administrator
License Administrator
Password Administrator
User Administrator
Exam Tip
Users can activate roles they’re eligible for from the Privileged
Identity Management area of the Microsoft Entra ID
Administrative console. Administrators with the appropriate
permissions can also use the Privileged Identity Management
area of the Microsoft Entra ID Administrative console to
approve requests that require approval and review role
activations.
Microsoft Entra ID P2
Enterprise Mobility + Security (EMS) E5
Microsoft 365 M5
Account Administrator
Service Administrator
Co-Administrator
Owner Users who hold this role have full access to all
resources within the scope of the assignment and can
delegate access to others.
Contributor Users who hold this role can create and manage
resources within the scope of the assignment but cannot
grant access to others.
Reader Users who hold this role can view resources within
the scope of the assignment but can’t perform other tasks
and cannot grant access to others.
User Access Administrator Users who hold this role can
manage user access to Azure resources within the scope of
the assignment.
More Info Azure RBAC
You can edit the conditions under which an eligible user can be
granted the rights and privileges associated with a role by
performing the following steps:
1. On the Privileged Identity Management blade, select
Microsoft Entra ID Roles.
Under Manage, select Settings.
2. Select Roles and select the role you want to configure. On this
page, you can configure the following:
1. Maximum activation duration in hours
2. Whether a notification email is sent when a role is
activated
3. Whether an incident request ticked ID is required when
activating the role
4. Whether multi-factor authentication must occur for the
role to be activated
5. Whether another user must provide approval for
activation to occur
Users can activate roles for which they are eligible from the
Privileged Identity Management area of the Microsoft Entra
ID admin center. Administrators with the appropriate
permissions can also use the Privileged Identity Management
area of the Microsoft Entra ID admin center to approve requests
requiring approval and review role activations.
Exam Tip
Remember the functionality of the various security and
compliance roles that can be assigned to users.
Chapter summary
The only thing people forget more often than where they put
their keys is their password. As someone who supports
Microsoft 365, it’s more likely than not that if you haven’t
enabled self-service password reset, or even if you have, you
will have to reset user passwords semi-regularly.
Enable MFA
6. The next time users sign in, they will be prompted to enroll in
multifactor authentication and will be presented with a
dialog similar to that shown in Figure 4-11, asking them to
provide additional information.
Once you configure MFA for users, there might be certain times
when you want to force users to provide updated contact
methods, you might want to revoke all app passwords, or you
might want to revoke MFA on all remembered devices. You can
do this by performing the following steps:
Account lockout
Block/unblock users
OATH tokens
Exam Tip
What If tool
You can use the conditional access What If tool to determine
how conditional access policies will function without
implementing the policies on a pilot group of users. To run the
What If tool, perform the following steps:
You can learn more about the conditional access What If tool at
https://learn.microsoft.com/azure/active-directory/conditional-
access/what-if-tool.
Exam Tip
Audit logs
Sign-in event logs
Self-service password reset activity
Audit logs
Several methods allow you to monitor authentication for your
organization’s Microsoft 365 tenancy. Microsoft Entra ID’s
reporting architecture includes the following elements:
Service
Category
Activity
Status
Target
Initiated by (Actor)
Date Range
Sign-in date
User account
Application the user has authenticated against
Sign-in status (success or failure)
Risk-detection status
Multifactor authentication status
User
Application
Status
Conditional Access
Date
You can view the self-service password reset events in the audit
log under Identity in the Microsoft Entra admin center. You can
use the Activity filter to generate reports enabling you to
determine the following information:
Chapter summary
Modern authentication supports technologies such as
multifactor authentication, smart card authentication,
certificate-based authentication, and SAML-based third-party
identity providers.
Microsoft 365 supports a variety of authentication methods
for self-service password reset and MFA, including
passwords, security questions, email addresses, the Microsoft
Authenticator app, OATH hardware tokens, SMS, voice calls,
and app passwords.
When configuring self-service password reset, enable
multiple authentication methods and require two separate
authentication methods to be used before allowing password
reset.
Smart Lockout is a technology that enables you to lock out
attackers trying to brute-force user passwords.
A user in your organization cannot use any password on the
Azure custom banned list.
Certificate-based authentication is supported for Federated
environments where Microsoft Entra ID trusts an
organizational CA, and the CRL is published in an internet-
accessible location.
Microsoft Entra ID’s reporting architecture enables you to
monitor sign-ins, risky sign-ins, users flagged for risk, and
Azure administrator activity.
Multifactor authentication methods include phone calls, text
messages, notifications through mobile apps, or verification
codes from mobile apps or hardware tokens.
Thought experiment
Secure Score
Incidents
Alerts
Threat analytics
Secure Score
Global Administrator
Security Administrator
Exchange Administrator
SharePoint Administrator
Recommended actions
You can choose a status and provide notes related to the action
by selecting Edit Status & Action Plan. On this page, shown in
Figure 5-4, you can provide one of the following responses:
Helpdesk Administrator
User Administrator
Service Support Administrator
Security Reader
Security Operator
Global Reader
Incidents
Incidents queue
Manage incidents
Investigate incidents
The Alerts tab will group incidents using the following reasons:
Alerts
Threat analytics
Each report allows you to view charts that will provide you
with information that allows you to assess the potential impact
of a specific threat. These charts include the following
categories:
Devices With Alerts Displays the number of distinct
managed devices impacted by the threat. A device is
categorized as Active if at least one alert is associated with
that threat. A device is categorized as Resolved if all alerts
associated with the threat on the device have been resolved.
Devices With Alerts Over Time Displays the number of
distinct managed devices with Active and Resolved alerts
over time. You can use this chart do assess how rapidly your
organization responds to alerts associated with threats.
Security Configuration Status Displays the number of
managed devices that have applied recommended security
settings that mitigate the threat. Devices will be marked as
Secure if all the tracked settings are applied.
Vulnerability Patching Status Displays the number of
managed devices that have applied security updates that
remediate vulnerabilities exploited by the threat.
Anti-spam policies
Anti-malware policies
EOP anti-phishing policies
10. On the Policy Mode page, enable or disable the policy. Select
Next and then select Confirm to enact the policy.
Anti-phishing policy
Anti-spam policy
Anti-malware policy
Configuration analyzer
Anti-spam policies
Anti-malware policies
EOP anti-phishing policies
You can learn more about using Defender for Office to manage
the security of collaboration workloads at
https://learn.microsoft.com/en-us/microsoft-365/security/office-
365-security/mdo-sec-ops-guide.
Blocked users
The user is restricted from sending emails. They are still able
to receive email.
The user is added to the Restricted Entities page in the
Microsoft 365 Defender portal.
Onboarding devices
Cloud-native
Co-management
On-premises
The first step you must take is to download the Group Policy
configuration package from the Microsoft 365 Defender portal.
You can do this by performing the following steps:
You can download a packaged zip file from the Microsoft 365
Defender Portal by performing the following steps:
Once you have downloaded the zip file, you can extract the file,
resulting in a script named
WindowsDefenderATPLocalOnboardingScript.cmd being
present in the folder in which you extracted the files. Run this
script using an elevated command prompt.
General settings
Feature Description
Rules
Configuration Management
Device Management
Chapter summary
Trainable classifiers
Trainable classifiers examine content locations in your
Microsoft 365 tenancy to understand the nature of the data that
you store. Trainable classifiers use machine learning to
determine what SITs are present and used by your
organization. Content is located by:
Regular expressions
Keyword lists
A keyword dictionary
Sensitive information type functions
Confidence levels
Compliance-related roles
Sensitivity labels
Sensitivity label policies
Sensitivity labels
You can also use sensitivity labels to label content without using
any protection settings. This allows you to generate usage
reports and activity data for data based on the label applied to
the data, even if the label does nothing to protect the data. For
example, you can use reports to determine how files related to
a specific project are accessed throughout the organization
without restricting that access.
Label scope
Label priority
Retention policies
Retention labels
Preservation locks
Inactive mailbox retention
Retention policies
These locations are not visible to end users unless they have
been assigned compliance roles. A user with the Compliance
Administrator role group permissions or equivalent eDiscovery
permissions can identify and restore content from these
locations.
Exchange mailboxes
SharePoint sites or SharePoint classic and communication
sites
OneDrive accounts
Microsoft 365 Group mailboxes and sites
Skype for Business
Exchange public folders
Microsoft Teams channel messages
Microsoft Teams chats
Microsoft Teams private channel messages
Viva Engage community messages
Viva Engage user messages
Retention labels
Preservation locks
DLP policies
DLP alerts
DLP policies
DLP policy conditions allow you to specify the content the rule
looks for and the context in which that content is being used.
For example, the content might be a person’s government
identification number, and the context might be an attempt to
share that information outside the organization.
You can apply DLP policies to data at rest, in use, and in transit.
You can apply DLP policies to data stored in the following
locations:
DLP policy actions are what happens once the condition is met.
Actions include:
Creating policies
You can learn more about creating and deploying DLP policies
at https://learn.microsoft.com/en-us/purview/dlp-create-deploy-
policy.
Testing policies
DLP alerts
Chapter summary
Data Lifecycle Management is a framework through which
you determine how much time you need to retain different
types of information.
Configuring a sensitive information type (SIT) allows you to
detect and classify special types of information.
There are many compliance roles that allow discrete tasks to
be performed within Microsoft Purview. You should use the
principle of least privilege when assigning users to role
groups and rarely assign the more privileged roles.
Retention policies allow you to apply retention settings to
data stores. Retention labels allow retention settings to be
applied to specific content items.
The user can delete items subject to a retention policy but are
retained in special locations.
DLP policies allow you to control who can access specific
information and what types of access they have. You can use
DLP policies to block the printing of content items or stop
them from being shared outside the organization.
Thought experiment
1. Browse to microsoftpressstore.com/register.
2. Enter the print book ISBN (even if you purchased an eBook).
3. After registering the book, go to your account page and select
the Registered Products tab.
4. Click the Access Bonus Content link to access the companion
website. Select the Exam Updates link or scroll down to that
section to check for updates.
The content that has been removed If you plan to take the
new exam version, you can ignore the removed content
when studying for the exam.
New content planned per new exam topics This will tell
you what’s coming.
You can find the current study guide for Exam MS-102 at
learn.microsoft.com/en-us/certifications/resources/study-
guides/ms-102
Objective mapping
Create a tenant
Implement and manage domains
Configure organizational settings,
including security, privacy, and profile
Identify and respond to service health
issues
Configure notifications in service health
Monitor adoption and usage
EXAM OBJECTIVE CHAPTER
Calendar setting, 28
certificate-based authentication, 146–147
Cloud App Security Administrator role, 104
Cloud Application Administrator role, 104
Cloud Device Administrator role, 104
Cloud Discovery Global Admin role, 126
CNAME records, 11, 23–26
collaboration protection, 191
Collection Administrators role, Microsoft Purview, 132
.com domain, 11
Compliance Administrator role, 105, 126, 138
compliance and security roles, 138–139
Compliance Data Administrator role, 105
compliance reports, scheduling and reviewing, 40–42
compliance-related roles, Microsoft Entra ID, 245–246
Conditional Access Administrator role, 105
conditional access policies, 167–171
configuration analyzer tool, 212–213
Configuration Manager, using with Defender for Endpoint,
229–230
contoso.com domain, 10
Cortana setting, 28
.co.uk domain, 11
Credential Harvest scenario, 216
Custom App Launcher Tiles setting, 31
custom domain names, configuring, 12–13. See also domain
names
custom domain, verifying, 13–14
Custom Themes setting, 31
Customer Lockbox Access Approver role, 105
Customer Lockbox setting, 30
D
Mail setting, 28
Mailbox Usage report, 44. See also inactive mailbox retention
Mailboxes, selecting recipients for, 21
Malware Attachment scenario, 216
MDM (mobile device management), 26
.me domain, 11
Message Center Privacy Reader role, 106
Message Center Reader role, 106
MFA (Multifactor Authentication). See also authentication
account lockout, 159
Block/Unblock Users page, 160
enabling, 154–158
fraud alert settings, 160
OATH tokens, 161
phone call settings, 161
MFA settings, managing, 161
MFA users, administering, 159
MFA utilization, reporting, 161
Microsoft 365
contacts, 62–63
evaluating for organizations, 6
trial edition, 6
Microsoft 365 groups setting, 28
Microsoft 365 tenants. See tenants
Microsoft Authenticator app, 145
Microsoft Azure Information Protection setting, 28
Microsoft Communication To Users setting, 28
Microsoft Defender for Business, admin roles, 128–129
Microsoft Defender for Cloud Apps, roles, 125–126
Microsoft Defender for Endpoint, roles, 114–115
Microsoft Defender for Identity, administrative roles, 127–128
Microsoft Defender for Office 365
AAD global roles, 113–114
compliance-related roles, 116
creating custom roles, 129–131
data classification-related roles, 116
insider risk management roles, 117
privacy management roles, 118
protection-related roles, 117
roles and role groups, 113, 119–120
view-only roles, 118
Microsoft Defender for Office 365 role groups
compliance administration, 120–121
information protection, 122
insider risk management, 122–123
others, 124–125
privacy management, 123
security, 123–124
Microsoft Entra Cloud Sync
features, 94
installing, 95
versus Microsoft Entra Connect, 96–97
troubleshooting, 97–98
Microsoft Entra Connect. See also identity synchronization
Active Directory Federation, 77
connectivity requirements, 81
features, 75–76
hardware requirements, 81–82
installation account requirements, 83
installation requirements, 78–79
installing, 83–85
versus Microsoft Entra Cloud Sync, 96–97
multiforest AD DS, 93
object filters, 90–91
pass-through authentication, 77
password synchronization, 76–77, 92
server requirements, 80–81
SQL Server requirements, 82
synchronized attributes, 86–87
synchronization management, 88–92
Synchronization Rules Editor, 91–92
user sign-in options, 76–77
Microsoft Entra Connect Health, 88
Microsoft Entra ID. See also Azure AD (Azure Active
Directory)
administrative units, 133–134
certificate-based authentication, 146–147
external accounts, 60–61
External Collaboration Settings, 60
external identities, 59–62
features, 54
Guest accounts, 62
identity protection, 165–167
managing admin roles, 103–107
managing groups, 57–58
managing users, 55–57
password protection, 152–153
PIM (Privileged Identity Management), 134–136
RBAC (role-based access control), 136–139
rebranding, 1
role allocations, 108
Smart Lockout, 153
Microsoft Entra ID Joined Device Local Administrator, 104
Microsoft FastTrack program, 8, 31–33
Microsoft Forms setting, 28
Microsoft Graph Data Connect setting, 28
Microsoft Hardware Warranty Administrator role, 106
Microsoft Hardware Warranty Specialist role, 106
Microsoft partner, adding, 31–33
Microsoft Planner setting, 28
Microsoft Purview
compliance-related roles, 245–246
Data Lifecycle Management, 242
DLP (Data Loss Prevention), 264–270
inactive mailbox retention, 263
preservation locks, 262–263
retention labels, 258–262
retention policies, 253–258
roles, 131–136
sensitivity labels, 247–253
SIT (sensitive information types), 241–246
trainable classifiers, 243
Microsoft Rewards setting, 28
Microsoft Search In Bing Home Page setting, 28
Microsoft Teams
Device Usage report, 50
DNS records, 26
setting, 28
User Activity report, 50
Microsoft To Do setting, 28
.mobi domain, 11
mobile phone authentication, 145
Modern Authentication setting, 28, 142–143
Modern Commerce User role, 106
Multi-Factor Authentication setting, 28
multi-geo functionality, 3–4
MX records, 11, 23–24
MyAnalytics setting, 28
.net domain, 11
Network Administrator role, 106
News setting, 28
nonroutable domains, directory synchronization, 72–75. See
also domains
upgrading subscriptions, 8
UPN suffixes, directory synchronization, 72–75
UPNs (Universal Principal Names), 17, 54, 70
usage analytics, empowering Power BI for, 39–40
usage metrics, scheduling and reviewing, 42–51. See also
reports
Usage Summary Reports Reader role, 107
use case, creating, 6
User Administrator role, 107, 112
User Consent To Apps setting, 29
user feedback, recording, 6
User Group Admin role, 126
User Mailbox properties page, 21
user sign-in options, Microsoft Entra Connect, 76–77
username and email, managing, 18
User-Owned Apps And Services setting, 29
users, managing in Microsoft Entra ID, 55–57
W
What If tool, conditional access, 170–171
What’s New in Office setting, 29
Whiteboard setting, 29
Windows 365 Administrator role, 107
Windows Hello for Business, 147
Windows Update Deployment Administrator role, 107
Workflow Administrator role, Microsoft Purview, 132
workloads, configuring for domain names, 23