Implement and manage identity and access Flashcards

1
Q

Risk events are separated into what 3 types? How do you access these reports?

A

Risky Users, Risky Sign Ins, Risky Detections. To Access go to Azure Portal -> Azure Active Directory -> Security -> Identity Protection -> Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you configure Identity Protection Alerts?

A

Azure Portal -> Azure Active Directory -> Security -> Identity Proection -> Users at Risk Detected/Alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you access and implement the sign-in risk policy?

A

Azure Portal -> Azure Active Directory -> Security -> Identity Protection -> Sign-In Risk Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you implement the sign-in risk policy?

A

Setup Assignments (Users, Conditions)
Setup Controls - Access, Allow, Block, Require pw reset
Microsoft recommends set the threshold to “Medium”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you access the User Risk Policy?

A

Azure Portal -> Azure Active Directory -> Security -> Identity Protection -> User Risk Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you implement the User Risk Policy?

A

Setup Assignments (Users, Conditions)
Setup Controls
Microsoft recommends set the threshold to “High”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What behaviors are identified by sign-in risk policy?

A

This policy helps identify and respond to risky or unusual account sign-in behavior that might indicate the account has been compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of behaviors will the sign-in risk policy detect?

A
Anonymous IP Address
Atypical travel
Malware-linked IP address
Unfamiliar sign-in properties
Admin-confirmed user compromised
Malicious IP address
Suspicious Inbox Manipulation
Impossible travel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What behaviors are identified by User Risk Policy?

A

This policy helps identify and respond to user account behavior or activities that seem suspicious and indicate the account might have been compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of behaviors are detected by the User risk policy?

A

Leaked Credentials

Azure AD Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 2 types of available Identity Protection policies?

A

User Risk Policy

Sign-in Risk Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Azure AD Identity Protection? What license is required?

A

Azure AD Identity Protection is an Azure AD Premium P2 feature that includes user risk and sign-in risk policies and alerts that help you stay on top of mitigating the potential of data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you configure PIM roles?

A

Go to Azure Portal -> search for Azure AD Privileged Identity Management -> then Azure AD Roles settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is PIM?

A

Privileged Identity Management (PIM) enables your organization to protect important resources across Azure, Azure AD, Intune, and Office 365 apps & services by managing and auditing access to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are Role assignments created?

A

portal. azure.com
- > click Subscriptions
- > then Access Control (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RBAC?

A

Azure Role-Based Access Control (RBAC) allows fine-grained access management of Azure resources. Allows you the ability to divide responsibility by role for and access to management of various machines, networks, resource groups, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What 3 components does RBAC consist of?

A

Security Principal - object requesting access (user, group, service, etc)
Role Definition - a set of permissions that defines the actions that can be performed
Scope - the resources to which access will be granted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In RBAC what is the scope resource hierarchy?

A

Management Group

  • > Subscription
  • > -> Resource Group
  • > ->-> Resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the default option when you create a Conditional Access Policy?

A

the default option is Report Only.

This is good for testing the effect the policy will have on users

20
Q

Where do you create Conditional Access Policies?

A

Microsoft EndPoint Manager Admin Center

endpoint. microsoft.com
- > select Endpoint Security
- > Conditional Access
- >New Policy

21
Q

Aside from Compliance Policies, you can configure general compliance settings, where?

A

Microsoft EndPoint Manager Admin Center

  • > choose Device
  • > Compliance Policies
  • > Compliance Policy Settings
22
Q

Where do you go to configure and manage device compliance for endpoint security?

A

Microsoft EndPoint Manager

endpoint. microsoft.com
- > select devices
- > Compliance Policies
- > Create Policy

23
Q

How are Conditional Access Policies related to Compliance Policies?

A

Compliance policies are configured separately but they can be used within Conditional Access Policies.

24
Q

What license is required for SSPR with Password write back?

A

Azure AD Premium P1 licenses

25
Q

What license is required for Conditional Access Policies?

A

Azure AD Premium license & Intune (Intune or Enterprise Mobility + Security license)

26
Q

To enable passwordless authentication you must sign in to the Azure Portal at?

A

portal.azure.cm
-> then select Azure Active Directory
-> Security
-> Authentication Methods
-> Authentication Methods Policy (Preview)
Then select either FIDO2 Security Key, Microsoft Authenticator Passwordless Sign In or Text Message

27
Q

In order to implement Windows Hello for SSO the devices must be first?

A

Devices must first be joined to Azure AD and Intune-enrolled.
Windows Hello incorporates biometrics, device-specific pins and is exclusive to Windows 10 devices

28
Q

MFA and other Sign-ons are reported in what report?

A

Azure AD’s Sign-Ins report

portal. azure.com
- > select Azure
- > Active Directory
- > User
- >Sign-Ins

29
Q

Azure AD Security Defaults include

A

All users must register for Azure MFA
Admins must use MFA
Legacy authentication protocols are blocked
Users are required to perform MFA when necessary
Privileges such as access to Azure Portal have been restricted

30
Q

What is involved in Azure AD Identity governance?

A

involved regularly analyzing and confirming or cleaning up group membership.

31
Q

How do you manage Identity Governance?

A
Go to Azure AD
-> select Identity Governance
-> Access Reviews
-> New
Azure Premium P2 licensing is required
32
Q

Security groups have an additional option for the membership type

A

Dynamic Device -> define the parameters of device properties for devices that will be included automatically

33
Q

Membership for the group can be one of two Office 365 group types

A

Assigned - you manually declare who is part of the group

Dynamic User - you define parameters of user properties for accounts that will be included automatically

34
Q

You can create 2 group types in Azure AD

A

Security - can be used to grant permission to shared resources
Office 365 - used to grant access to shared collaboration resources

35
Q

How do you create an Azure AD group?

A

Azure AD -> Groups -> New Group

36
Q

What is Microsoft Cloud App Discovery used for?

A

can be used to analyze existing SaaS app usage within your organization

37
Q

What 6 things does Azure AD Connect Health allow you to identify and manage?

A
Email Notifications
ADFS system Issues
Quick agent installation
Auto Upgrades
Top Application usage
Network locations & TCP connections
38
Q

Azure AD Connect consists of what 3 essential components?

A

Synchronization services
Active Directory Federation Services (AD FS)
Health monitoring

39
Q

Azure AD Connect Express settings include the following capabilities for Single AD forest setups

A

Configure sync of identities in the current AD forest
Configure PHS from on-premises AD to Azure AD
Start initial synchronization upon completion
Synchronize all attributes
Enable Auto Upgrade

40
Q

Azure AD Connect is configured using “default authentication settings” refers to?

A

Express Settings

41
Q

If Password Hash Synchronization (PHS) is not enabled?

A

You cannot utilize premium features in Azure AD, such as Identity Protection’s leaked credentials detection report.

42
Q

What are the 2 distinct Federation (AD FS) Authentication Methods?

A

AAD relies on another authentication system

Ideal when smart cards, certifications, or third-party multifactor authentication (MFA) are required

43
Q

What are the 2 distinct Pass-through Authentication (PTA) methods?

A

Password validation happens on-premises

Best for organizations that require on-premises authentication

44
Q

What are the 4 distinct Password Hash Synchronization (PHS) authentication methods?

A

Simplest to deploy
No additional infrastructure required
Users use the same username/password as on-premises
**Some premium features in AAD require PHS, such as Identity Protection
-> Password Hashes are stored in the cloud
-> Requires password agent installation on servers

45
Q

What are the 3 Microsoft 365 Hybrid Azure AD authentication methods?

A

Password hash synchronization (PHS) aka “same sign-on”
Pass-Through Authentication (PTA)
Federation (AD FS)