-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Microsoft Identity and Access Administrator SC-300 Exam Guide
By :

Chapter 1, Implementing and Configuring a Microsoft Entra Tenant, introduces the concepts of provisioning and administering a Microsoft 365 tenant.
Chapter 2, Creating, Configuring, and Managing Microsoft Entra Identities, walks through the steps necessary to create and modify users and groups, as well as assigning licenses.
Chapter 3, Implementing and Managing Identities for External Users and Tenants, introduces the concepts of external or guest users.
Chapter 4, Implementing and Managing Hybrid Identity, introduces hybrid identity models, managed through Entra Connect and Entra Connect Cloud Sync.
Chapter 5, Planning, Implementing, and Managing Microsoft Entra User Authentication, focuses on configuring authentication methods and capabilities such as multi-factor authentication and Windows Hello for Business.
Chapter 6, Planning, Implementing, and Managing Microsoft Entra Conditional Access, explores one of the core security technologies of Microsoft Entra—Conditional Access policies.
Chapter 7, Managing Risk by Using Microsoft Entra ID Protection, describes how to use risk-based policies with Microsoft Entra to protect user and workload identities.
Chapter 8, Implementing Access Management for Azure Resources by Using Azure Roles, demonstrates concepts such as role-based access controls and technologies such as Azure Key Vault.
Chapter 9, Implementing Global Secure Access, introduces the new Global Secure Access service for securing connectivity between endpoints and the Microsoft cloud.
Chapter 10, Planning and Implementing Identity for Applications and Azure Workloads, explains how to configure and secure identity for Azure services, applications, and workloads.
Chapter 11, Planning, Implementing, and Monitoring the Integration of Enterprise Applications, instructs on designing strategies for connecting and securing enterprise software-as-a-service apps, as well as using Microsoft Entra application proxy to publish on-premises applications.
Chapter 12, Planning and Implementing App Registrations, presents information on configuring app registrations, app roles, and API permissions.
Chapter 13, Managing and Monitoring App Access Using Microsoft Defender for Cloud Apps, explores using Defender for Cloud Apps to discover shadow IT and create policies to restrict access to apps and resources.
Chapter 14, Planning and Implementing Entitlement Management, leverages access packages for granting access to sites and applications, as well as managing the life cycle of external user accounts.
Chapter 15, Planning, Implementing, and Managing Access Reviews in Microsoft Entra, demonstrates how to use access reviews to manage the life cycle of access to resources in the Microsoft 365 tenant.
Chapter 16, Planning and Implementing Privileged Access, walks through deploying Privileged Identity Management to remove standing permissions to resources.
Chapter 17, Monitoring Identity Activity Using Logs, Workbooks, and Reports, outlines how to use the Kusto Query Language (KQL) to interpret logs and discover insights about identity and access in the Microsoft 365 environment.
Chapter 18, Planning and Implementing Microsoft Entra Permissions Management, introduces the new Entra Permissions Management product, allowing identity and access administrators to monitor permissions assignments and discover the over-granting of permissions in a Microsoft Entra environment.