Exam MS-500: Microsoft 365 Security Administration
Candidates for this exam implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. The Microsoft 365 Security Administrator proactively secures Microsoft 365 enterprise environments, responds to threats, performs investigations, and enforces data governance. The Microsoft 365 Security Administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders, and other workload administrators to plan and implement security strategies and ensures that the solutions comply with the policies and regulations of the organization.
Candidates for this exam are familiar with Microsoft 365 workloads and have strong skills and experience with identity protection, information protection, threat protection, security management, and data governance. This role focuses on the Microsoft 365 environment and includes hybrid environments.
Course Outline
Secure Microsoft 365 hybrid environments
- plan Azure AD authentication options
- plan Azure AD synchronization options
- monitor and troubleshoot Azure AD Connect events
Secure Identities
- implement Azure AD group membership
- implement password management
- manage external identities in Azure AD and Microsoft 365 workloads
Implement authentication methods
- implement multi-factor authentication (MFA) by using conditional access policy
- manage and monitor MFA
- plan and implement device authentication methods like Windows Hello
Implement conditional access
- plan for compliance and conditional access policies
- configure and manage device compliance for endpoint security
- implement and manage conditional access
- test and troubleshoot conditional access policies
Implement roles and role groups
- plan for roles and role groups
- configure roles and role groups
- audit roles for least privileged access
Configure and manage identity governance
- implement Azure AD Privileged Identity Management
- implement and manage entitlement management
- implement and manage access reviews
Implement Azure AD Identity Protection
- implement user risk policy
- implement sign-in risk policy
- configure Identity Protection alerts
- review and respond to risk events
Implement and manage Microsoft Defender for Identity
- plan a Microsoft Defender for Identity solution
- install and configure Microsoft Defender for Identity
- monitor and manage Microsoft Defender for Identity
Implement device threat protection
- plan a Microsoft Defender for Endpoint solution
- implement Microsoft Defender for Endpoint
- manage and monitor Microsoft Defender for Endpoint
Implement and manage device and application protection
- plan for device and application protection
- configure and manage Microsoft Defender Application Guard
- configure and manage Microsoft Defender Application Control
- configure and manage exploit protection
- configure and manage Windows device encryption
- configure and manage non-Windows device encryption
- implement application protection policies
- configure and manage device compliance for endpoint security
Implement and manage Microsoft Defender for Office 365
- configure Microsoft Defender for Office 365
- monitor for and remediate threats using Microsoft Defender for Office 365
- conduct simulated attacks using Attack Simulator
Monitor Microsoft 365 Security with Azure Sentinel
- plan and implement Azure Sentinel
- configure playbooks in Azure Sentinel
- manage and monitor Azure Sentinel
- respond to threats using built-in playbooks in Azure Sentinel
Implement and manage Microsoft Cloud App Security
- plan Cloud App Security implementation
- configure Microsoft Cloud App Security
- manage cloud app discovery
- manage entries in the Cloud app catalog
- manage apps in Cloud App Security
- configure Cloud App Security connectors and OAuth apps
- configure Cloud App Security policies and templates
- review, interpret and respond to Cloud App Security alerts, reports, dashboards and logs
Manage sensitive information
- plan a sensitivity label solution
- create and manage sensitive information types
- configure sensitivity labels and policies.
- configure and use Activity Explorer
- use sensitivity labels with Teams, SharePoint, OneDrive and Office apps
Manage Data Loss Prevention (DLP)
- plan a DLP solution
- create and manage DLP policies for Microsoft 365 workloads
- create and manage sensitive information types
- monitor DLP reports
- manage DLP notifications
- implement Endpoint DLP
Manage data governance and retention
- plan for data governance and retention
- review and interpret data governance reports and dashboards
- configure retention labels and policies
- define and manage communication compliance policies
- configure retention in Microsoft 365 workloads
- find and recover deleted Office 365 data
- configure and use Microsoft 365 Records Management
Configure and analyze security reporting
- monitor and manage device security status using Microsoft Endpoint Manager Admin
Center. - manage and monitor security reports and dashboards using Microsoft 365 Security
CenterDefender portal - plan for custom security reporting with Graph Security API
- use secure score dashboards to review actions and recommendations
- configure alert policies in the Ssecurity &and Ccompliance center
Manage and analyze audit logs and reports
- plan for auditing and reporting
- perform audit log search
- review and interpret compliance reports and dashboards
- configure audit alert policy
Discover and respond to compliance queries in Microsoft 365
- plan for content search and eDiscovery
- delegate permissions to use search and discovery tools
- use search and investigation tools to discover and respond
- manage eDiscovery cases
Manage regulatory compliance
- plan for regulatory compliance in Microsoft 365
- manage Data Subject Requests (DSRs)
- administer Compliance Manager in Microsoft 365 compliance center
- use Compliance Manager
Manage insider risk solutions in Microsoft 365
- implement and manage Customer Lockbox
- implement and manage communication compliance policies
- implement and manage Insider risk management policies
- implement and manage information barrier policies
- implement and manage privileged access management
Popular Courses
Learn new skills to boost your productivity and enable your organization to accomplish more with Microsoft Certifications.