Microsoft MS-500 Microsoft 365 Security Administration Online Training
Microsoft MS-500 Online Training
The questions for MS-500 were last updated at Dec 19,2024.
- Exam Code: MS-500
- Exam Name: Microsoft 365 Security Administration
- Certification Provider: Microsoft
- Latest update: Dec 19,2024
Topic 1, Fabrikam inc.
Overview
Fabrikam, Inc. is manufacturing company that sells products through partner retail stores. Fabrikam has 5,000 employees located in offices throughout Europe.
Existing Environment
Network Infrastructure
The network contains an Active Directory forest named fabrikam.com. Fabrikam has a hybrid Microsoft Azure Active Directory (Azure AD) environment.
The company maintains some on-premises servers for specific applications, but most end-user applications are provided by a Microsoft 365 E5 subscription.
Problem Statements
Fabrikam identifies the following issues:
✑ Since last Friday, the IT team has been receiving automated email messages that contain "Unhealthy Identity Synchronization Notification" in the subject line.
✑ Several users recently opened email attachments that contained malware. The process to remove the malware was time consuming.
Requirements
Planned Changes
Fabrikam plans to implement the following changes:
✑ Fabrikam plans to monitor and investigate suspicious sign-ins to Active Directory
✑ Fabrikam plans to provide partners with access to some of the data stored in Microsoft 365
Application Administration
Fabrikam identifies the following application requirements for managing workload applications:
✑ User administrators will work from different countries
✑ User administrators will use the Azure Active Directory admin center
✑ Two new administrators named Admin1 and Admin2 will be responsible for managing Microsoft Exchange Online only
Security Requirements
Fabrikam identifies the following security requirements:
✑ Access to the Azure Active Directory admin center by the user administrators must be reviewed every seven days. If an administrator fails to respond to an access request within three days, access must be removed
✑ Users who manage Microsoft 365 workloads must only be allowed to perform administrative tasks for up to three hours at a time. Global administrators must be exempt from this requirement
✑ Users must be prevented from inviting external users to view company data. Only global administrators and a user named User1 must be able to send invitations
✑ Azure Advanced Threat Protection (ATP) must capture security group modifications for sensitive groups, such as Domain Admins in Active Directory
✑ Workload administrators must use multi-factor authentication (MFA) when signing in from an anonymous or an unfamiliar location
✑ The location of the user administrators must be audited when the administrators authenticate to Azure AD
✑ Email messages that include attachments containing malware must be delivered without the attachment
✑ The principle of least privilege must be used whenever possible
You need to recommend a solution to protect the sign-ins of Admin1 and Admin2.
What should you include in the recommendation?
- A . a device compliance policy
- B . an access review
- C . a user risk policy
- D . a sign-in risk policy
D
Explanation:
References: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-user-risk-
policy
You need to resolve the issue that targets the automated email messages to the IT team.
Which tool should you run first?
- A . Synchronization Service Manager
- B . Azure AD Connect wizard
- C . Synchronization Rules Editor
- D . IdFix
B
Explanation:
References: https://docs.microsoft.com/en-us/office365/enterprise/fix-problems-with-directory-synchronization
An administrator configures Azure AD Privileged Identity Management as shown in the following exhibit.
What should you do to meet the security requirements?
- A . Change the Assignment Type for Admin2 to Permanent
- B . From the Azure Active Directory admin center, assign the Exchange administrator role to Admin2
- C . From the Azure Active Directory admin center, remove the Exchange administrator role to Admin1
- D . Change the Assignment Type for Admin1 to Eligible
You need to recommend a solution for the user administrators that meets the security requirements for auditing.
Which blade should you recommend using from the Azure Active Directory admin center?
- A . Sign-ins
- B . Azure AD Identity Protection
- C . Authentication methods
- D . Access review
A
Explanation:
References: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-sign-ins
You need to recommend a solution that meets the technical and security requirements for sharing data with the partners.
What should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
- A . Create an access review.
- B . Assign the Global administrator role to User1.
- C . Assign the Guest inviter role to User1.
- D . Modify the External collaboration settings in the Azure Active Directory admin center.
C,D
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/active-directory/external-identities/delegate-invitations
HOTSPOT
You plan to configure an access review to meet the security requirements for the workload administrators. You create an access review policy and specify the scope and a group.
Which other settings should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
HOTSPOT
You install Azure ATP sensors on domain controllers.
You add a member to the Domain Admins group. You view the timeline in Azure ATP and discover that information regarding the membership change is missing.
You need to meet the security requirements for Azure ATP reporting.
What should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Explanation:
References: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-advanced-audit-policy
HOTSPOT
You need to recommend an email malware solution that meets the security requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Topic 2, Litware, Inc
Overview
Litware, Inc. is a financial company that has 1,000 users in its main office in Chicago and 100 users in a branch office in San Francisco.
Existing Environment
Internal Network Infrastructure
The network contains a single domain forest. The forest functional level is Windows Server 2016.
Users are subject to sign-in hour restrictions as defined in Active Directory.
The network has the IP address ranges shown in the following table.
The offices connect by using Multiprotocol Label Switching (MPLS).
The following operating systems are used on the network:
✑ Windows Server 2016
✑ Windows 10 Enterprise
✑ Windows 8.1 Enterprise
The internal network contains the systems shown in the following table.
Litware uses a third-party email system.
Cloud Infrastructure
Litware recently purchased Microsoft 365 subscription licenses for all users.
Microsoft Azure Active Directory (Azure AD) Connect is installed and uses the default authentication settings. User accounts are not yet synced to Azure AD.
You have the Microsoft 365 users and groups shown in the following table.
Planned Changes
Litware plans to implement the following changes:
✑ Migrate the email system to Microsoft Exchange Online
✑ Implement Azure AD Privileged Identity Management
Security Requirements
Litware identities the following security requirements:
✑ Create a group named Group2 that will include all the Azure AD user accounts. Group2 will be used to provide limited access to Windows Analytics
✑ Create a group named Group3 that will be used to apply Azure Information Protection policies to pilot users. Group3 must only contain user accounts
✑ Use Azure Advanced Threat Protection (ATP) to detect any security threats that target the forest
✑ Prevent users locked out of Active Directory from signing in to Azure AD and Active Directory
✑ Implement a permanent eligible assignment of the Compliance administrator role for User1
✑ Integrate Windows Defender and Windows Defender ATP on domain-joined servers
✑ Prevent access to Azure resources for the guest user accounts by default
✑ Ensure that all domain-joined computers are registered to Azure AD
Multi-factor authentication (MFA) Requirements
Security features of Microsoft Office 365 and Azure will be tested by using pilot Azure user accounts.
You identify the following requirements for testing MFA.
✑ Pilot users must use MFA unless they are signing in from the internal network of the Chicago office. MFA must NOT be used on the Chicago office internal network.
✑ If an authentication attempt is suspicious, MFA must be used, regardless of the user location
✑ Any disruption of legitimate authentication attempts must be minimized
General Requirements
Litware want to minimize the deployment of additional servers and services in the Active Directory forest.
DRAG DROP
You need to configure threat detection for Active Directory. The solution must meet the security requirements.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
You need to enable and configure Microsoft Defender for Endpoint to meet the security requirements.
What should you do?
- A . Configure port mirroring
- B . Create the ForceDefenderPassiveMode registry setting
- C . Download and install the Microsoft Monitoring Agent
- D . Run WindowsDefenderATPOnboardingScripc.cmd
You know you need help when you are preparing for a hard exam like Microsoft 365 Security Administration. MS-500 Dumps PDF 2019 is the best source to get familiar with the latest exam patterns and terms. You can easily get a wide range of 2019 MS-500 Exam Questions at affordable rates from Testmayor. Check out the Free Demo to make sure the MS-500 Dumps are up to your demand. Get free 3-month updates with your purchase and a fabulous discount on using the coupon code.