Learn your way! Get started

SC-300 Microsoft Identity and Access Administrator, Part 2 of 4: Authentication and Access Solution

with expert Anand Rao


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 5/12/2022
Level Beginner
Runtime 3h 20m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

The SC-300 Exam is split into 4 Domains: Implement an identity management solution (25-30%) Implement an authentication and access management solution (25-30%) Implement access management for apps (10-15%) Plan and implement an identity governance strategy (25-30%) This course covers all the material for Domain 2, Implement an Authentication and Access Management Solution

Prerequisites

A Candidate for the SC-300 exam manages tasks such as providing secure authentication and authorization access to enterprise applications. The administrator provides seamless experiences and self-service management capabilities for all users. Adaptive access and governance are core elements to the role. This role is also responsible for troubleshooting, monitoring, and reporting for the identity and access environment. Basic Knowledge of Azure, Information Security and Exposure to Active Directory usage is very helpful.

Meet the expert

Anand Rao is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio.Anand Rao has delivered instructor led trainings in several states in India as well as several countries like USA, Bahrain, Kenya and UAE. He has worked as a Microsoft Certified Trainer globally for Corporate Major Clients.

Course outline



Module 4

Plan and Implement Azure Multifactor Authenticati (22:30)
  • Introduction (00:08)
  • Domain Overview (01:10)
  • Plan and Implement Azure Multifactor Authenticati (01:31)
  • Mitigation Measures in Azure AD (04:02)
  • What is Azure AD MFA (03:06)
  • How Multi-Factor Authentication works (03:10)
  • Planning the MFA (01:21)
  • Enforcing MFA with Conditional Access (01:32)
  • Deciding Supported Authentication Methods (01:56)
  • Azure AD Authentication Methods (04:22)
  • Summary (00:08)
Monitoring and Usage (36:30)
  • Introduction (00:08)
  • Monitoring and Usage (01:56)
  • Manage User Authentication (01:50)
  • PasswordLess Authentication (01:15)
  • Security Usability availabilty of Authentication (01:27)
  • Demo: Configuring Fido Key for a User (06:20)
  • Windows Hello for Business (01:29)
  • Windows Hello for Business works-key points (03:20)
  • Azure AD Password Protection (01:30)
  • Demo: Azure AD Password protection (14:28)
  • Multiple Forests and RODC (01:35)
  • Plan Implement and Manage Conditional Access (01:00)
  • Summary (00:08)

Module 5

Security Defaults (40:48)
  • Introduction (00:08)
  • Security Defaults (03:28)
  • Enforce Policies (03:09)
  • Blocking legacy authentication (02:10)
  • Conditional Access Policies - Planning (02:17)
  • Conditional Access Policies - Benefits (02:32)
  • Conditional Access policies - components (04:13)
  • Conditional Access Policies - Best Practices (02:38)
  • Condition Access Policies - Most Common Policies (02:54)
  • Conditional Access Policies - Build and Test Poli (04:02)
  • Sign in Risk and User Risk - Conditional Access P (02:31)
  • Conditional Access Policy - Blocking Locations - (10:35)
  • Summary (00:08)
Troubleshooting using Sign-in Logs (38:41)
  • Introduction (00:08)
  • Troubleshooting Using Sign-in Logs (02:02)
  • Device Compliance (01:25)
  • Demo: Conditional Access Policy (05:44)
  • User Exclusions (02:01)
  • Demo: Conditional Access Policy O365 Block MFA re (05:59)
  • Test and Troubleshoot Conditional Access Policies (04:46)
  • Implement Application Controls and Application (02:09)
  • Scenario 1 Microsoft 365 apps Require an Approved (07:53)
  • Scenario 2 Exchange Online and SharePoint Online (06:22)
  • Summary (00:08)

Module 6

App Protection Policies Overview (27:18)
  • Introduction (00:08)
  • App Protection Policies Overview (01:18)
  • How Can you Protect App Data (01:10)
  • Manage Azure AD Identity Protection - Introduction (00:54)
  • Manage Azure AD Identity Protection (01:35)
  • Risk detection and remediation (02:02)
  • Permissions required (01:32)
  • License requirements (00:34)
  • Sign in and User Risk Policy (01:18)
  • Choosing Acceptable Risk Levels (02:02)
  • Demo: Navigating through the Reports (09:11)
  • Remediate Risks and Unblock Users (01:39)
  • User Risk remediation Options (03:43)
  • Summary (00:08)
Unblocking Users (34:25)
  • Introduction (00:08)
  • Unblocking Users (03:06)
  • Demo: Enable Azure AD MFA - EnterpriseWide (09:49)
  • Deploy SSPR - Setup (08:07)
  • Demo: Security Defaults (01:19)
  • Demo: Control User Sign in Frequency (02:52)
  • Smart Lockout Values (02:15)
  • Configuring User and Sign in risk policy (03:36)
  • Configure Azure AD MFA registration Policy (02:08)
  • Domain Wrapup (00:53)
  • Summary (00:08)