Microsoft 365 Administrator MS-102 Exam Guide

Book description

A comprehensive MS-102 exam guide offering practical insights, from provisioning Microsoft 365 to mastering Defender components, ensuring not just exam success but true expertise Purchase of the book unlocks access to web-based exam prep resources like mock exams, flashcards, exam tips, and a free eBook PDF.

Key Features

  • Navigate exam topics easily with well-structured and informative content
  • Access online practice tools to enhance exam readiness
  • Boost exam confidence through expert tips and real-world insights
  • Purchase of the book unlocks access to web-based exam prep resources like mock exams, flashcards, exam tips, and a free eBook PDF

Book Description

The MS-102: Microsoft 365 Administrator Exam Guide is meticulously crafted to empower readers with practical insights, starting with the essentials of provisioning a Microsoft 365 tenant, configuring identity synchronization and secure access, and deploying key Microsoft 365 Defender components.

The book's purpose is clear—to guide professionals through the complexities of the MS-102 exam, ensuring not just exam success but mastery of the subject matter. This comprehensive exam guide comes with lifetime access to supplementary resources on an online platform, including flashcards, mock exams, and exam tips from experts. With unlimited access to the website, you'll have the flexibility to practice as many times as you desire, maximizing your exam readiness.

As you progress through each chapter, the book unveils the layers of Microsoft 365 workloads, equipping you with the skills to manage role-based administration, deploy identity synchronization using Entra ID Connect, implement modern authentication methods, manage secure access through Conditional Access policies, and analyze security threats using Microsoft 365 Defender.

By the end of this book, you'll have the proficiency to implement data loss prevention, configure information and data protection features, and approach the MS-102 exam with confidence.

What you will learn

  • Implement and manage Microsoft 365 tenants
  • Administer users, groups, and contacts in Entra ID
  • Configure and manage roles across Microsoft 365 services
  • Troubleshoot identity synchronization issues
  • Deploy modern authentication methods to enhance security
  • Analyze and respond to security incidents using Microsoft 365 Defender
  • Implement retention policies and sensitivity labels
  • Establish data loss prevention for enhanced information protection

Who this book is for

If you’re looking to validate your skills in planning, deploying, and managing Microsoft 365 identity and security workloads, this book is for you. Ideal for IT professionals seeking the MS-102 certification, this book ensures success with clear guidance, practical insights, and hands-on exercises. Although not a pre-requisite, prior knowledge of configuring DNS records, experience of administering a Microsoft 365 tenant, and a high-level understanding of information protection concepts will be beneficial.

Table of contents

  1. Microsoft 365 Administrator MS-102 Exam Guide
  2. Contributors
  3. About the Author
  4. About the Reviewer
  5. Preface
    1. Who This Book Is For
    2. What This Book Covers
    3. To Get the Most Out of This Book
    4. Download the Color Images
    5. Conventions Used
    6. Get in touch
    7. Practice Resources – A Quick Tour
      1. A Clean, Simple Cert Practice Experience
      2. Practice Questions
      3. Flashcards
      4. Exam Tips
    8. Chapter Review Questions
      1. Share Feedback
      2. Back to the book
    9. Download a Free PDF Copy of This Book
  6. Chapter 1: Implementing and Managing a Microsoft 365 Tenant
    1. Making the Most out of This Book - Your Certification And Beyond
    2. Microsoft 365 Tenant
    3. Creating a Tenant
      1. Planning a Tenant
        1. Selecting a Tenant Type
        2. Selecting a Managed Domain
      2. Provisioning a Tenant
    4. Implementing and Managing Domains
      1. Acquiring a Domain Name
        1. Third-party Registrar
        2. Microsoft
      2. Configuring a Domain Name
      3. Managing DNS Records Manually
      4. Configuring a Default Domain
    5. Configuring Organizational Settings
      1. Services
      2. Security & Privacy
      3. Organization Profile
    6. Identifying and Responding to Service Health Issues
    7. Configuring Notifications for Service Health
    8. Monitoring Adoption and Usage
      1. Microsoft 365 Usage Reports
      2. Viva Insights
        1. Personal Insights
        2. Teamwork Habits
        3. Organization Trends
        4. Advanced Insights
      3. Adoption Score
        1. People Experiences
        2. Technology Experiences
        3. Special Reports
    9. Summary
    10. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  7. Chapter 2: Managing Users and Groups
    1. Creating and Managing Users
      1. Creating and Managing Cloud Users
      2. Creating and Managing Synchronized Users
      3. Creating and Managing Guest Users
    2. Creating and Managing Contacts
      1. Microsoft 365 Admin Center
      2. Exchange Admin Center
    3. Creating and Managing Groups
      1. Microsoft 365 Admin Center
      2. Azure AD Portal
    4. Managing and Monitoring Microsoft 365 License Allocations
    5. Performing Bulk User Management
      1. Microsoft 365 Admin Center
      2. Azure AD Portal
      3. PowerShell
        1. Installing Modules
        2. Connecting to Azure AD
        3. Working with PowerShell
        4. Retrieving User Data
        5. Updating Users
        6. Updating Licenses
        7. Creating Users
    6. Summary
    7. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  8. Chapter 3: Managing Roles in Microsoft 365
    1. Managing Roles in Microsoft 365 and Azure AD
      1. Planning for Role Assignments
      2. Managing Roles in the Microsoft 365 Admin Center
    2. Managing Role Groups for Microsoft Defender, Microsoft Purview, and Microsoft 365 Workloads
      1. Microsoft Defender
      2. Microsoft Purview
      3. Microsoft 365 Workloads
    3. Managing Administrative Units
      1. Creating Administrative Units
      2. Viewing and Updating Administrative Units
    4. Planning and Implementing Privileged Identity Management
      1. Creating a Role Assignment
      2. Reviewing Role Assignments
      3. Alerting
    5. Summary
    6. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  9. Chapter 4: Implementing and Managing Identity Synchronization with Azure AD
    1. Preparing for Identity Synchronization by Using IdFix
    2. Configuring and Managing Directory Synchronization by Using Azure AD Connect
      1. Planning and Sizing
      2. Installing the Synchronization Service
      3. Configuring Azure AD Connect Filters
        1. Domain and Organizational Unit-Based Filtering
        2. Group-Based Filtering
        3. Attribute-Based Filtering
    3. Monitoring Synchronization by Using Azure AD Connect Health
      1. Azure AD Connect Health
      2. Azure AD Connect Health for Sync
      3. Azure AD Connect Health for Directory Services
      4. Azure AD Connect Health for Active Directory Federation Services
    4. Troubleshooting Azure AD Connect Synchronization
    5. Configuring and Managing Directory Synchronization by Using Azure AD Connect Cloud Sync
      1. Installing the Provisioning Agent
      2. Configuring the Provisioning Service
      3. Customizing the Provisioning Service
        1. Scoping Filters
        2. Attribute Mapping
    6. Troubleshooting Azure AD Connect Cloud Sync Synchronization
    7. Summary
    8. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  10. Chapter 5: Implementing and Managing Authentication
    1. Implementing and Managing Authentication Methods
      1. Choosing an Authentication Mechanism
        1. Windows Hello for Business
        2. Microsoft Authenticator App
        3. FIDO2 Security Keys
        4. Comparison
      2. Configuring Windows Hello
      3. Configuring Microsoft Authenticator
        1. Configuring the Authentication Policy
        2. Registering Devices
      4. Configuring FIDO2
        1. Configuring the Authentication Policy
        2. Registering Devices
    2. Implementing and Managing Self-Service Password Reset
      1. Configuring SSPR
      2. Managing SSPR
        1. Authentication Methods
        2. Registration
        3. Notifications
        4. Customization
        5. On-premises integration
    3. Implementing and Managing Azure AD Password Protection
      1. Custom smart lockout
      2. Custom banned passwords
      3. Password protection for Windows Server Active Directory
    4. Configuring and Managing Multifactor Authentication
      1. Per-User Multifactor Authentication
      2. Security Defaults
      3. Conditional Access
      4. Additional Multifactor Authentication Behavior Settings
    5. Investigating and Resolving Authentication Issues
    6. Summary
    7. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  11. Chapter 6: Implementing and Managing Secure Access
    1. Planning for Identity Protection
      1. Investigating Risks
      2. Remediating risks
    2. Implementing and Managing Azure Identity Protection
    3. Planning Conditional Access Policies
      1. Assignments
      2. Conditions
      3. Access Controls
    4. Implementing and Managing Conditional Access Policies
      1. Creating Conditional Access Policies
      2. Reporting on Conditional Access Policies
        1. Configuring a Log Analytics Workspace
        2. Integrating Azure AD or Entra ID Logs
        3. Reviewing the Workbook
    5. Summary
    6. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  12. Chapter 7: Managing Security Reports and Alerts by Using the Microsoft 365 Defender Portal
    1. Instructions to Unlock the Free Practice Resources
      1. STEP 1
      2. STEP 2
      3. STEP 4
        1. HUJ8067
      4. STEP 5
        1. Troubleshooting Tips
    2. Reviewing and Taking Action to Improve the Microsoft Secure Score in the Microsoft 365 Defender Portal
    3. Reviewing and Responding to Security Incidents and Alerts in Microsoft 365 Defender
      1. Reviewing alerts and incidents
        1. Attack story
        2. Alerts
        3. Assets
        4. Investigations
        5. Evidence and Response
      2. Responding to Alerts and Incidents
    4. Reviewing and Responding to Issues Identified in Security and Compliance Reports in Microsoft 365 Defender
      1. General
      2. Endpoints
      3. Email and Collaboration
      4. Cloud Apps
    5. Reviewing and Responding to Threats Identified in Threat Analytics
      1. Overview
      2. Analyst Report
      3. Related Incidents
      4. Impacted Assets
      5. Endpoints Exposure
      6. Recommended Actions
    6. Summary
    7. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  13. Chapter 8: Implementing and Managing Email and Collaboration Protection by Using Microsoft Defender for Office 365
    1. Implementing Policies and Rules in Defender for Office 365
      1. Deploying the Preset Security Policies
      2. Configuring Standalone Policies
        1. Anti-Phishing
        2. Anti-Spam
        3. Anti-Malware
        4. Safe Attachments
        5. Safe Links
      3. Configuring Rules
        1. Tenant Allow/Block Lists
        2. Email Authentication Settings
        3. Advanced Delivery
        4. Enhanced Filtering
        5. Quarantine Policies
      4. Using the Configuration Analyzer
    2. Reviewing and Responding to Threats Identified in Defender for Office 365
      1. Email & Collaboration Alerts
      2. Investigations
      3. Explorer and Real-Time Detections
        1. All Email
        2. Malware
        3. Phish
        4. Campaigns
        5. Content Malware
        6. URL Clicks
    3. Creating and Running Campaigns
      1. Creating a Phishing Campaign
      2. Creating a Training Simulation
      3. Reviewing Reports
    4. Unblocking Users
      1. Configuring Alerts
      2. Removing Restrictions
    5. Summary
    6. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  14. Chapter 9: Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint
    1. Overview of Microsoft Defender for Endpoint
      1. Features
      2. Requirements
      3. Deployment Architectures
    2. Configuring Defender for Endpoint Settings
      1. Configuring Defender for Endpoint Options
      2. Integrating Defender for Endpoint with Intune
        1. Establishing a Service-to-Service Connection
        2. Enabling Compliance Policy Evaluation
        3. Enabling App Protection Policy Evaluation
        4. Configuring a Compliance Policy
        5. Configuring a Conditional Access Policy
    3. Onboarding Devices to Defender for Endpoint
      1. Onboarding Windows Devices
        1. Onboarding with Intune
        2. Endpoint Detection and Response (EDR) Policy
        3. Other Onboarding Alternatives
      2. Onboarding macOS Devices
        1. Onboarding a Configuration Profile
        2. Extensions Configuration Profile
        3. Full Disk Access Configuration Profile
        4. Network Filter Configuration Profile
        5. Notifications Configuration Profile
        6. Background Services Configuration Profile
      3. Onboarding iOS Devices
        1. All Devices
        2. Supervised Devices
        3. Unsupervised Devices
      4. Onboarding Android Devices
        1. Bring Your Own Device
        2. Enterprise Enrolled Devices
    4. Reviewing and Responding to Endpoint Vulnerabilities
      1. Recommendations
      2. Remediation
      3. Inventories
      4. Weaknesses
      5. Event Timeline
      6. Baseline Assessment
        1. Creating a Security Profile
        2. Reviewing Assessment Results
        3. Creating and Managing Exceptions
    5. Reviewing and Responding to Risks
      1. Investigate
        1. Attack Story
        2. Alerts
        3. Assets
        4. Investigations
        5. Evidence and Response
      2. Respond
        1. Taking Actions
        2. Resolve
        3. Tuning
        4. Automate
    6. Summary
    7. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  15. Chapter 10: Implementing Microsoft Purview Information Protection and Data Lifecycle Management
    1. Implementing and managing sensitive info types using keywords, keyword lists, or regular expressions
      1. Managing sensitive information types
        1. Using keywords
        2. Using regular expressions
        3. Using built-in functions
        4. Using document fingerprinting
        5. Using Exact Data Match
      2. Testing and editing sensitive information types
    2. Implementing retention labels, retention label policies, and retention policies
      1. Implementing retention policies
      2. Implementing retention labels
      3. Implementing retention label policies
        1. Publishing a label
        2. Auto-applying a label
    3. Implementing sensitivity labels and sensitivity label policies
      1. Implementing sensitivity labels
        1. Enabling sensitivity labels for Teams, M365 groups, and SharePoint sites
        2. Enabling co-authoring for files protected with sensitivity labels
        3. Creating a label
        4. Creating a sublabel
      2. Implementing sensitivity label policies
        1. Label policies
        2. Auto-labeling policies
    4. Summary
    5. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
  16. Chapter 11: Implementing Microsoft Purview data loss prevention (DLP)
    1. Implementing DLP for Workloads
      1. Prerequisites
      2. Configuring Workload Protection
        1. Exchange Online, SharePoint Online, OneDrive for Business, and Teams
        2. Power BI
        3. On-Premises File Servers
    2. Implementing Endpoint DLP
    3. Reviewing and Responding to DLP Alerts
      1. Microsoft Purview Compliance Portal Alerts Dashboard
      2. Microsoft Purview Compliance Portal Activity Explorer
      3. Microsoft 365 Defender Alerts Dashboard
      4. Microsoft 365 Defender Incidents Dashboard
    4. Summary
    5. Exam Readiness Drill - Chapter Review Questions
      1. Benchmark Score: 75%
      2. Exam Readiness Drill
      3. Working On Timing
    6. Why subscribe?
  17. Other Books You May Enjoy
    1. Share Your Thoughts
    2. Download a Free PDF Copy of This Book

Product information

  • Title: Microsoft 365 Administrator MS-102 Exam Guide
  • Author(s): Aaron Guilmette
  • Release date: December 2023
  • Publisher(s): Packt Publishing
  • ISBN: 9781835083963