5.Sc 900 Master Cheat Sheet
5.Sc 900 Master Cheat Sheet
Methodologies Description
pg. 1
SKILLCERTPRO
Methodologies Description
Data
Endpoints
Account
Access management
pg. 2
SKILLCERTPRO
Methodologies Description
Encryption at rest also known as, data at rest, is the data that's
pg. 3
SKILLCERTPRO
Methodologies Description
pg. 4
SKILLCERTPRO
Methodologies Description
pg. 5
SKILLCERTPRO
pg. 6
SKILLCERTPRO
pg. 7
SKILLCERTPRO
pg. 8
SKILLCERTPRO
Capabilities
Description
Term
Azure Active
Directory
pg. 9
SKILLCERTPRO
Capabilities
Description
Term
With External Identities in Azure AD, you can allow people outside
your organization to access your apps and resources, while letting
them sign in using whatever identity they prefer. Within this
Different external framework, Azure AD supports a variety of scenarios from
identity business-to-business (B2B) collaboration to access management
types (Guest for consumer/customer- or citizen-facing applications (business-
Users) to-customer, or B2C). Azure AD External Identities focuses less
on a user's relationship to your organization and more on how
the user wants to sign in to your apps and resources.
John Saville YouTube
pg. 10
SKILLCERTPRO
Capabilities
Description
Term
Term Description
Different
authenticatio
n methods
pg. 11
SKILLCERTPRO
Term Description
pg. 12
SKILLCERTPRO
Term Description
Term Description
pg. 13
SKILLCERTPRO
Term Description
Term Description
pg. 14
SKILLCERTPRO
Term Description
pg. 15
SKILLCERTPRO
Term Description
PIM works with all built in and custom Azure AD Roles and Azure
Resource Roles and is a CLOUD ONLY identity management
solution.
pg. 16
SKILLCERTPRO
Term Description
Term Description
NSGs operate at layers 3 & 4, and provide a list of allowed and denied
(inbound / outbound) communication to and from network interfaces
and subnets. NSGs are fully customizable, and give you the ability to
fully lock down network communication to and from your virtual
Network
machines. By using NSGs, you can isolate applications between
Security
environments, tiers, and services. Note: NSGs uses static IP
Groups (NSG)
addresses and as your network scales this may become difficult to
maintain. NSG security rules are evaluated by priority using five
information points: source, source port, destination, destination port,
and protocol to allow / deny
pg. 17
SKILLCERTPRO
Term Description
Azure Bastion Azure Bastion provides secure and seamless RDP/SSH connectivity to
your virtual machines directly from the Azure portal using Transport
pg. 18
SKILLCERTPRO
Term Description
Layer Security (TLS). When you connect via Azure Bastion, your virtual
machines don't need a public IP address, agent, or special client
software.
Encryption on Azure
Microsoft Azure provides many different ways to secure your data, each depending
on the service or usage required.
pg. 19
SKILLCERTPRO
Azure Key Vault is a centralized cloud service for storing your application secrets. Key
Vault helps you control your applications' secrets by keeping them in a single, central
location and by providing secure access, permissions control, and access logging
capabilities. It's useful for different kinds of scenarios:
Secrets management. You can use Key Vault to store securely and tightly control
access to tokens, passwords, certificates, Application Programming Interface (API)
keys, and other secrets.
Key management. You can use Key Vault as a key management solution. Key Vault
makes it easier to create and control the encryption keys used to encrypt your data.
Certificate management. Key Vault lets you provision, manage, and deploy your
public and private Secure Sockets Layer/ Transport Layer Security (SSL/ TLS)
certificates for Azure, and internally connected, resources more easily.
Store secrets backed by hardware security modules (HSMs). The secrets and keys
can be protected either by software or by FIPS 140-2 Level 2 validated HSMs.
Term Description
pg. 20
SKILLCERTPRO
Term Description
pg. 21
SKILLCERTPRO
Term Description
pg. 22
SKILLCERTPRO
Term Description
pg. 23
SKILLCERTPRO
Term Description
Term Description
pg. 24
SKILLCERTPRO
Term Description
Term Description
pg. 25
SKILLCERTPRO
Term Description
Microsoft Defender for Office 365, formerly Office 365 Advanced Threat
Protection, safeguards your organization against malicious threats
posed by email messages, links (URLs), and collaboration tools,
including Microsoft Teams, SharePoint Online, OneDrive for Business,
and other Office clients.
Microsoft Defender for Office 365 covers these key areas:
Microsoft
Threat protection policies: Define threat protection policies to set the
Defender for
appropriate level of protection for your organization.
Office 365
• Reports: View real-time reports to monitor Microsoft Defender for
Office 365 performance in your organization.
• Threat investigation and response capabilities: Use leading-edge tools
to investigate, understand, simulate, and prevent threats.
• Automated investigation and response capabilities: Save time and
effort investigating and mitigating threats.
pg. 26
SKILLCERTPRO
Term Description
the cloud apps being used. You can control and protect data in the
apps after you sanction them to the service.
Term Description
Security reports The Security & Compliance Center enables your organization
and compliance to manage data protection and compliance. Assuming you
dashboards have the necessary permissions (global administrator, a security
administrator, or a security reader), the Security Dashboard
pg. 27
SKILLCERTPRO
Term Description
Incident management:
Managing incidents is critical in ensuring that threats are
contained and addressed. In Microsoft 365 Defender, you can
manage incidents on devices, users accounts, and mailboxes.
You can manage incidents by selecting one from the Incidents
queue. Incidents are automatically assigned a name based on an
alert. You can edit the name of an incident, resolve it, then set its
classification and determination. You can also assign the incident
to yourself and add incident tags and comments. When you
investigate cases where you want to move alerts from one
incident to another, you can also do so from the Alerts tab. You'll
create a larger or smaller incident that includes all relevant alerts.
pg. 28
SKILLCERTPRO
Term Description
pg. 29
SKILLCERTPRO
Term Description
pg. 30
SKILLCERTPRO
Term Description
The Microsoft 365 compliance center brings together all of the tools
and data that are needed to help understand and manage an
Compliance organization’s compliance needs. Only users with the following roles
center are able to access the Compliance center: Global administrator,
Compliance administrator, Compliance data administrator. Microsoft
365 compliance center
pg. 31
SKILLCERTPRO
Term Description
organization.
These action types have points assigned to them that count towards
the compliance score. Actions can also be considered technical or
nontechnical, which also affects how they impact the overall
compliance score.
pg. 32
SKILLCERTPRO
Term Description
pg. 33
SKILLCERTPRO
Term Description
Labels are:
• Customizable: Admins can create different categories specific to
Sensitivity labels the organization, such as Personal, Public, Confidential, and Highly
Confidential.
• Clear text: Because each label is stored in clear text in the
content's metadata, third-party apps and services can read it and
then apply their own protective actions, if necessary.
• Persistent. After you apply a sensitivity label to content, the label
is stored in the metadata of that email or document. The label then
moves with the content, including the protection settings, and this
data becomes the basis for applying and enforcing policies.
pg. 34
SKILLCERTPRO
Term Description
policies. Sensitivity labels will then appear in Office apps for those
users and groups.
Retention labels
• Retention labels are used to assign retention settings at an item
level, such as a folder, document, or email.
• An email or document can have only a single retention label
assigned to it at a time.
• Retention settings from retention labels travel with the content if
it’s moved to a different location within your Microsoft 365 tenant.
• Admins can enable users in the organization to apply a retention
label manually.
• A retention label can be applied automatically if it matches
defined conditions.
• A default label can be applied for SharePoint documents.
• Retention labels support disposition review to review the content
before it's permanently deleted.
Learn about retention policies and retention labels
pg. 35
SKILLCERTPRO
Term Description
pg. 36
SKILLCERTPRO
Term Description
pg. 37
SKILLCERTPRO
Term Description
Customer lockbox Office 365 Customer Lockbox allows the customer to Approve or
Reject access request made by the Microsoft Support engineers
to access customer data. If customers give access by Approving
the request, Microsoft Support Engineers will be able to access
the data to help customers resolve issues if they deem
necessary.
Customer Lockbox in Office 365
Term Description
You can use eDiscovery tools in Microsoft 365 to search for content
in Exchange Online, OneDrive for Business, SharePoint Online,
Microsoft Teams, Microsoft 365 Groups, and Yammer teams. You can
Capabilities of
search mailboxes and sites in the same eDiscovery search, and then
the content
export the search results. You can use Core eDiscovery cases to
search tool
identify, hold, and export content found in mailboxes and sites. If
your organization has an Office 365 E5 or Microsoft 365 E5
subscription (or related E5 add-on subscriptions), you can further
manage custodians and analyze content by using the feature-rich
pg. 38
SKILLCERTPRO
Term Description
Core
Steps to perform this workflow are as follows:
eDiscovery
1 - Create an eDiscovery hold (hold infinitly or for a date range)
workflow
2 - Search for content in the case
3 - Export content from a case (Results.csv will export)
Get started with Core eDiscovery in Microsoft 365
Purpose and
Advanced Audit helps organizations to conduct forensic and
value of
compliance investigations by increasing audit log retention that's
Advanced
required to conduct an investigation. Audit log retention provides
Auditing
access to crucial events that help determine the scope of
pg. 39
SKILLCERTPRO
Term Description
Term Description
You can set the lock level to CanNotDelete or ReadOnly. In the portal,
Resource
the locks are called Delete and Read-only respectively.
locks
• CanNotDelete means authorized users can still read and modify a
resource, but they can't delete the resource.
• ReadOnly means authorized users can read a resource, but they can't
delete or update the resource. Applying this lock is similar to
restricting all authorized users to the permissions granted by
the Reader role.
pg. 40
SKILLCERTPRO
Term Description
Azure Policy enables you to define both individual policies and groups
of related policies, known as initiatives. Azure Policy evaluates your
resources and highlights resources that aren't compliant with the
policies you've created. Azure Policy can also prevent noncompliant
resources from being created.
Supplemental Links:
Microsoft SC-900 page that includes free training, skills measured and exam details
Quick References:
Azure AD
pg. 41
SKILLCERTPRO
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication
service.
Microsoft 365 uses Azure Active Directory (Azure AD). Azure Active Directory (Azure
AD) is included with your Microsoft 365 subscription.
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently
manage group memberships, access to enterprise applications, and role assignments.
Azure AD PIM
Azure AD Password Protection detects, and blocks known weak passwords and their
variants, and can also block additional weak terms that are specific to your
organization.
With Azure AD Password Protection, default global banned password lists are
pg. 42
SKILLCERTPRO
Azure AD B2C
Azure AD B2C allows external users to log in with their preferred social media account
to sign in to your application, such as Facebook, Google, or Twitter.
Conditional Access policies at their simplest are if-then statements, if a user wants to
access a resource, then they must complete an action. Example: A payroll manager
Common decisions
• Block access
• Grant access
o Least restrictive decision, can still require one or more of the following options:
pg. 43
SKILLCERTPRO
Conditional Access Policies can trigger MFA if a user attempts to access a specific
application
Conditional access policies can be applied to all users (can be applied to global
administrators as well)
Users with devices of specific platforms or marked with a specific state can be used
when enforcing Conditional Access policies.
Advanced Audit
Advanced Audit retains all Exchange, SharePoint, and Azure Active Directory audit
records for one year. This is accomplished by a default audit log retention policy that
retains any audit record that contains the value of Exchange, SharePoint, or
pg. 44
SKILLCERTPRO
AzureActiveDirectory for the Workload property (which indicates the service in which
the activity occurred) for one year.
Advanced Audit in Microsoft 365 provides high-bandwidth access to the Office 365
Management Activity API.
Microsoft Defender
capabilities that help reduce the volume of alerts in minutes at scale. While the attack
surface reduction set of capabilities provides the first line of defense in the stack.
Microsoft Defender for Identity is a cloud-based security solution that leverages your
detects, and helps you investigate advanced threats, compromised identities, and
malicious insider actions directed at your organization.
Microsoft Defender for Office 365 safeguards against malicious threats posed by
email messages, links (URLs), and collaboration tools, including Microsoft Teams,
SharePoint Online, OneDrive for Business, and other Office clients.
Multifactor Authentication
pg. 45
SKILLCERTPRO
When we enable security defaults in Azure Active Directory (Azure AD), Multi-factor
Authentication (MFA) will be enabled for all AD users.
Azure Active Directory (Azure AD) Identity Protection can’t add users to groups based
on the users' risk level.
Azure Active Directory (Azure AD) Identity Protection can detect whether user
credentials were leaked to the public.
Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-
Factor Authentication based on a user's risk level.
Azure Policy
pg. 46
SKILLCERTPRO
Azure Policy is used to ensure that your Azure resources comply with your
organization's business rules.
Azure Policy can be used to ensure that new resources adhere to corporate standards.
Reports
Reports can be used in the Microsoft 365 security center to view security trends and
track the protection status of identities.
the use of information barriers in Microsoft Teams, SharePoint Online, and OneDrive
for Business, and ethical walls in Exchange Online.
Restrict Microsoft Teams chats between certain groups within an organization is a use
case for implementing information barrier policies in Microsoft 365
Content Search
pg. 47
SKILLCERTPRO
The Content Search tool in the Security & Compliance Center can be used to quickly
The first step is to starting using the Content Search tool to choose content
locations to search and configure a keyword query to search for specific items.
Microsoft has created many Security & Compliance Center PowerShell scripts to help
complete complex content search-related tasks.
You can search across mailboxes and sites in a single eDiscovery search by using the
Content Search tool. And you can use Core eDiscovery cases to identify, hold, and
Disclaimer: All data and information provided on this site is for informational purposes
only. This site makes no representations as to accuracy, completeness, correctness,
suitability, or validity of any information on this site & will not be liable for any errors,
omissions, or delays in this information or any losses, injuries, or damages arising from
its display or use. All information is provided on an as-is basis.
pg. 48