Chapter 1: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure and manage built-in and custom Microsoft Entra roles
Chapter 4: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Evaluate effective permissions for Microsoft Entra roles
Chapter 5: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure and manage domains in Microsoft Entra ID and Microsoft 365
Chapter 7: Implement and manage user identities -Configure and manage a Microsoft Entra tenant-Configure tenant properties, user settings, group settings, and device settings
Chapter 11: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Automate bulk operations by using the Microsoft Entra admin center and PowerShell
Chapter 12: Implement and manage user identities -Create, configure, and manage Microsoft Entra identities-Manage device join and device registration in Microsoft Entra ID
Chapter 14: Implement and manage user identities -Implement and manage identities for external users and tenants-Manage External collaboration settings in Microsoft Entra ID
Chapter 15: Implement and manage user identities -Implement and manage identities for external users and tenants-Invite external users, individually or in bulk
Chapter 16: Implement and manage user identities -Implement and manage identities for external users and tenants-Manage external user accounts in Microsoft Entra ID
Chapter 17: Implement and manage user identities -Implement and manage identities for external users and tenants-Implement Cross-tenant access settings
Chapter 18: Implement and manage user identities -Implement and manage identities for external users and tenants-Implement and manage cross-tenant synchronization
Chapter 19: Implement and manage user identities -Implement and manage identities for external users and tenants-Configure external identity providers, including protocols such as SAML and WS-Fed
Chapter 25: Implement and manage user identities -Implement and manage hybrid identity-Migrate from AD FS to other authentication and authorization mechanisms
Chapter 28: Implement and manage authentication methods, including certificate-based, temporary access pass, OAUTH tokens, Microsoft Authenticator, and FIDO2
Chapter 29: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Implement and manage tenant-wide Multi-factor Authentication (MFA) settings
Chapter 30: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Configure and deploy self-service password reset (SSPR)
Chapter 31: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Implement and manage Windows Hello for Business
Chapter 32: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Disable accounts and revoke user sessions
Chapter 33: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Implement and manage Microsoft Entra password protection
Chapter 34: Implement authentication and access management -Plan, implement, and manage Microsoft Entra user authentication-Enable Microsoft Entra Kerberos authentication for hybrid identities
Chapter 44: Implement authentication and access management -Plan, implement, and manage Microsoft Entra Conditional Access-Create a Conditional Access policy from a template
Chapter 45: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Implement and manage user risk by using Identity Protection or Conditional Access policies
Chapter 46: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Implement and manage sign-in risk by using Identity Protection or Conditional Access policies
Chapter 47: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Implement and manage Multifactor authentication registration policies
Chapter 48: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Monitor, investigate and remediate risky users and risky sign-ins
Chapter 49: Implement authentication and access management -Manage risk by using Microsoft Entra ID Protection-Monitor, investigate, and remediate risky workload identities
Chapter 50: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Create custom Azure roles, including both control plane and data plane permissions
Chapter 51: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Assign built-in and custom Azure roles
Chapter 52: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Evaluate effective permissions for a set of Azure roles
Chapter 53: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Assign Azure roles to enable Microsoft Entra ID login to Azure virtual machines
Chapter 54: Implement authentication and access management -Implement access management for Azure resources by using Azure roles-Configure Azure Key Vault role-based access control (RBAC) and access policies
Chapter 59: Select appropriate identities for applications and Azure workloads, including managed identities, service principals, user accounts, and managed service accounts
Chapter 63: Plan, implement, and monitor the integration of enterprise applications-Plan and implement settings for enterprise applications, including application-level and tenant-level settings
Chapter 64: Plan, implement, and monitor the integration of enterprise applications-Assign appropriate Microsoft Entra roles to users to manage enterprise applications
Chapter 65: Plan, implement, and monitor the integration of enterprise applications-Design and implement integration for on-premises apps by using Microsoft Entra Application Proxy
Chapter 66: Plan, implement, and monitor the integration of enterprise applications-Design and implement integration for software as a service (SaaS) apps
Chapter 67: Plan, implement, and monitor the integration of enterprise applications-Assign, classify, and manage users, groups, and app roles for enterprise applications
Chapter 75: Manage and monitor app access by using Microsoft Defender for Cloud Apps-Configure and analyze cloud discovery results by using Defender for Cloud Apps
Chapter 86: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Implement and manage terms of use (ToU)
Chapter 88: Plan and automate identity governance -Plan and implement entitlement management in Microsoft Entra-Configure and manage connected organizations
Chapter 92: Plan and automate identity governance -Plan, implement, and manage access reviews in Microsoft Entra-Manually respond to access review activity
Chapter 93: Plan and automate identity governance -Plan and implement privileged access-Plan and manage Microsoft Entra roles in Microsoft Entra Privileged Identity Management (PIM), including settings and assignments
Chapter 94: Plan and automate identity governance -Plan and implement privileged access-Plan and manage Azure resources in PIM, including settings and assignments
Chapter 99: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Review and analyze sign-in, audit, and provisioning logs by using the Microsoft Entra admin center
Chapter 100: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Configure diagnostic settings, including configuring destinations such as Log Analytics workspaces, storage accounts, and event hubs
Chapter 101: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Monitor Microsoft Entra ID by using KQL queries in Log Analytics
Chapter 102: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Analyze Microsoft Entra ID by using workbooks and reporting
Chapter 103: Plan and automate identity governance -Monitor identity activity by using logs, workbooks, and reports-Monitor and improve the security posture by using Identity Secure Score
Chapter 104: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Onboard Azure subscriptions to Permissions Management
Chapter 105: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Evaluate and remediate risks relating to Azure identities, resources, and tasks
Chapter 106: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Evaluate and remediate risks relating to Azure highly privileged roles
Chapter 107: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Evaluate and remediate risks relating to Permissions Creep Index (PCI) in Azure
Chapter 108: Plan and automate identity governance -Plan and implement Microsoft Entra Permissions Management-Configure activity alerts and triggers for Azure subscriptions