Learn your way! Get started

Microsoft 365 Security Administration, Part 1 of 4: Implement and Manage Identity and Access

with expert Cristian Calinescu


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 10/16/2020
Level Beginner
Runtime 6h 50m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs Included
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Candidates for this (MS-500) exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.The Microsoft 365 Security Administrator proactively secures M365 enterprise environments, responds to threats, performs investigations, and enforces data governance. This course covers Domain 1 of the exam, which is 30-35% of the test. Knowledge covered includes: User and Group Management, Identity Synchronization and Protection, and Access Management.

Prerequisites

Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance.

Meet the expert

Cristian Calinescu is a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.

Course outline



User and Group Management

Introduction (23:46)
  • Introduction (00:08)
  • What is User and Group Management (08:10)
  • Preparing the Lab Environment (01:12)
  • Trial Subscription (02:53)
  • Portal (00:33)
  • Create Azure Subscription (03:36)
  • Virtual Box (01:26)
  • Import Virtual Box (05:38)
  • Summary (00:08)
IDentity and Access Management Concepts (32:00)
  • Introduction (00:08)
  • Identity and Access Management Concepts (01:10)
  • Evolution of Threats (02:38)
  • Identity Challenges (03:26)
  • Identityis the New Perimeter (04:12)
  • Governance Process (04:14)
  • The Zero Trust Model (00:28)
  • Zero Trust Concepts (04:39)
  • Plan for Zero Trust (07:36)
  • Zero Trust Networking (03:17)
  • Summary (00:08)
Plan your Identity and Authentication Solution (28:26)
  • Introduction (00:08)
  • Plan your Identity and Authentication Solution (00:30)
  • Provisioning Options (03:54)
  • Authentication Options (01:51)
  • Cloud Only (04:31)
  • Hybrid Authentication (02:11)
  • Directory Synchronization (04:28)
  • AD Connect (10:41)
  • Summary (00:08)
User Accounts and Roles (35:14)
  • Introduction (00:08)
  • User Accounts and Roles (00:32)
  • User Identities (04:22)
  • Demo: Provision User Accounts (30:04)
  • Summary (00:08)
Identity Management (22:56)
  • Introduction (00:08)
  • Identity Management (00:37)
  • Privileged Identity Management (06:37)
  • Configure PIM (05:31)
  • Hybrid Identities (02:06)
  • Privileged Access Management (02:40)
  • PAM Process Flow (05:07)
  • Summary (00:08)

Identity Synchronization and Protection

Plan Directory Synchronization (34:14)
  • Introduction (00:08)
  • Plan Directory Synchronization (00:51)
  • Plan Directory Overview (10:30)
  • Plan for Azure AD Connect (10:38)
  • Multi-Forest Scenario (07:10)
  • Pass Through Authentication (04:48)
  • Summary (00:08)
Configure and manage synchronized identities (54:10)
  • Introduction (00:08)
  • Configure and manage synchronized identities (01:36)
  • Azure AD Connect Prerequisites (08:50)
  • Setup AD Connect (06:08)
  • Azure AD Connect Health (02:30)
  • Demo: Azure AD Connect (13:17)
  • Manage users with Directory Synchronization (07:51)
  • Manage Groups with Directory Synchronization (03:44)
  • Troubleshoot Sync (03:05)
  • Demo: Synchronization (06:48)
  • Summary (00:08)
Password Management (32:23)
  • Introduction (00:08)
  • Password Management (01:29)
  • Password Policies and Authentication (05:15)
  • Multi-Factor Authentication (05:10)
  • Self-Service Password Management (02:49)
  • Password Alternatives (04:08)
  • Windows Hello for Business (03:16)
  • Azure AD Smart Lockout (06:10)
  • Demo: Verify Policy (03:47)
  • Summary (00:08)
Azure AD Identity Protection (26:24)
  • Introduction (00:08)
  • Azure AD Identity Protection (01:41)
  • Azure AD Identity Protection Explained (04:09)
  • Detect Vulnerabilities (04:30)
  • Plan Your Investigation (04:19)
  • Demo: Identity Protection (11:27)
  • Summary (00:08)

Access Management

Conditional Access (35:07)
  • Introduction (00:08)
  • Conditional Access (01:16)
  • Conditional Access Explained (08:23)
  • Conditional Access and Federated Authentication (01:41)
  • Demo: Conditional Access (06:49)
  • Configure Azure AD application proxy (05:33)
  • Demo Access Reviews (11:07)
  • Summary (00:08)
Manage Device Access (30:57)
  • Introduction (00:08)
  • Manage Device Access (02:25)
  • Plan for Device Compliance (05:40)
  • Configure Conditional Users and Groups (03:20)
  • Demo Conditional Users and Groups (07:48)
  • App Protection Policies (06:31)
  • Monitor Enrolled Devices (03:36)
  • Demo: Intune (01:19)
  • Summary (00:08)
Role Based Access Control (RBAC) (31:12)
  • Introduction (00:08)
  • Role Based Access Control (RBAC) (01:04)
  • Plan for RBAC (11:35)
  • Azure RBAC Roles (06:26)
  • Demo: RBAC (11:48)
  • Summary (00:08)
Solutions for External Access (23:14)
  • Introduction (00:08)
  • Solutions for External Access (01:26)
  • Azure AD B2B Guest User Access (03:36)
  • Properties of AD B2B User (05:20)
  • External Sharing and Azure AD B2B Colab (04:12)
  • Teams Guest Access (03:49)
  • Customer Lockbox (04:33)
  • Summary (00:08)