MS-900 Flashcards
Microsoft Graph
gateway to data for m365
M365 is new term,
M365 is new term, since it’s more than just office. (security and online services). O365- came from Microsoft Business and Productivity Suite (BPOS)
M365 = O365 + Windows, and Enterprise Mobility + Security
Microsoft Planner
is a light weight PM/Kanban board
For simple projects. Before ms project
Microsoft Bookings
SAAS calendar management
Microsoft Viva
my.ge.com . Also includes Glint which is a feedback tool and priority setting. And a learning platform.
* Can get insights froM MS Teams and Email
Microsoft Yammer
Enterprise social network
Microsoft Intune -
cloud based endpoint management (can also deploy office)
Configuration Manager
on premise management of desktops; can deploy office suite
Co-management
connecting config manager to 365 to use conditional access
Tenant attached -
store your devise record in the cloud
Tenant attach makes the Microsoft Intune admin center your console in the cloud. The architecture allows the Configuration Manager site to synchronize data about the device and the user to your Intune tenant.
Windows Autopilot
- cloud native services that set up devices
Desktop as a Service
W365 Virtual Desktop verse Azure Virtual Desktop. W365 includes o365 and is fixed price. Azure more dev focused allowing for multi sessions.
Windows as a service
Instead of major Windows releases every few years, it updates semi annually
M365 Admin
add users, manager 365, adoption scores and usage, other reporting on endpoints/secuirty etc
Microsoft 365 Defender
View information about security trends and track the protection status of your identities, data, devices, apps, and infrastructure in the Security admin center through Microsoft 365 Defender.
Entra ID
FORMERLY AAD , AAD –> Azure ID –> ID Connect, Oauth 2, SAML WS fed
Tenant (or directory)-
a dedicated instance of Microsoft Entra ID that an organization or app developer receives at the beginning of a relationship with Microsoft.
B2b Colab
just login, guest on your aad
B2B Direct Connect
a trust with login ability to share
Managed Identities
Managed identities are a type of service principal that are automatically managed in Microsoft Entra ID and eliminate the need for developers to manage credentials.
Service Principal
Service principals are used by applications or services to access Azure resources but application developers must manage and protect the credentials.
Microsoft Entra RBAC
Microsoft Entra roles control access to Microsoft Entra resources such as users, groups, and applications.
Azure RBAC
Azure roles control access to Azure resources such as virtual machines or storage using Azure Resource Management.
Types of ‘SECURE Login’
- Oath provides one time passcodes
- Fido2 new standard for USB badges blue tooth ‘hello’ capabialbies
- SSPR - self service password reset
- Multifator
- Something you know – typically a password or PIN and
- Something you have – such as a trusted device that’s not easily duplicated, like a phone or hardware key or
Something you are – biometrics like a fingerprint or face scan.
PIM
Privilege Identity Management - just in time super user access, audits
Identity Protection
is a tool that allows organizations to utilize security signals to identify potential threats.
Permissions Management
Permissions Management allows multicloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP.
What is the difference between Network Security Groups (NSGs) and Azure Firewall?
Now that you’ve learned about both Network Security Groups and Azure Firewall, you may be wondering how they differ, as they both protect Virtual Network resources. The Azure Firewall service complements network security group functionality. Together, they provide better “defense-in-depth” network security. Network security groups provide distributed network layer traffic filtering to limit traffic to resources within virtual networks in each subscription. Azure Firewall is a fully stateful, centralized network firewall as-a-service, which provides network and application-level protection across different subscriptions and virtual networks.
Microsoft Purview
Microsoft Purview compliance portal is the portal for organizations to manage their compliance needs using integrated solutions for information protection, data lifecycle management, insider risk management, auditing, and more
What is the difference between Compliance Manager and compliance score?
Compliance Manager is an end-to-end solution in the Microsoft Purview compliance portal to enable admins to manage and track compliance activities. Compliance score is a calculation of the overall compliance posture across the organization. The compliance score is available through Compliance Manager.
Service Trust Portal (STP)
The Service Trust Portal (STP) is Microsoft’s public site for publishing audit reports and other compliance-related information associated with Microsoft’s cloud services.
Priva Privacy Risk Management
Priva Privacy Risk Management, which provides visibility into your organization’s data and policy templates for reducing risks; and
Priva Subject Rights Requests
which provides automation and workflow tools for fulfilling data requests.
Microsoft’s approach to privacy is built on the following six principles:
- Control: Putting you, the customer, in control of your data and your privacy with easy-to-use tools and clear choices. Your data is your business, and you can access, modify, or delete it at any time. Microsoft will not use your data without your agreement, and when we have your agreement, we use your data to provide only the services you have chosen. Your control over your data is reinforced by Microsoft compliance with broadly applicable privacy laws and privacy standards.
- Transparency: Being transparent about data collection and use so that everyone can make informed decisions. We only process your data based on your agreement and in accordance with the strict policies and procedures that we’ve contractually agreed to. When we deploy subcontractors or subprocessors to perform work that requires access to your data, they can perform only the functions that Microsoft has hired them to provide, and they’re bound by the same contractual privacy commitments that Microsoft makes to you. The Microsoft Online Services Subprocessor List identifies authorized, subprocessors, who have been audited against a stringent set of security and privacy requirements in advance. This document is available as one of the data protection resources in the Service Trust Portal.
- Security: Protecting the data that’s entrusted to Microsoft by using strong security and encryption. With state-of-the-art encryption, Microsoft protects your data both at rest and in transit. Our encryption protocols erect barriers against unauthorized access to the data, including two or more independent encryption layers to protect against compromises of any one layer. All Microsoft-managed encryption keys are properly secured and offer the use of technologies such as Azure Key Vault to help you control access to passwords, encryption keys, and other secrets.
- Strong legal protections: Respecting local privacy laws and fighting for legal protection of privacy as a fundamental human right. Microsoft defends your data through clearly defined and well-established response policies and processes, strong contractual commitments, and if necessary, the courts. We believe all government requests for your data should be directed to you. We don’t give any government direct or unfettered access to customer data. We will not disclose data to a government or law enforcement agency, except as you direct or where required by law. Microsoft scrutinizes all government demands to ensure they’re legally valid and appropriate. If Microsoft receives a request for your data, we’ll promptly notify you and provide a copy of the request unless legally prohibited from doing so. Moreover, we’ll direct the requesting party to seek the data directly from you. Our contractual commitments to our enterprise and public sector customers include defending your data, which builds on our existing protections. We’ll challenge every government request for commercial and public sector customer data where we can lawfully do so.
- No content-based targeting: Not using email, chat, files, or other personal content to target advertising. We do not share your data with advertiser-supported services, nor do we mine it for any purposes like marketing research or advertising.
Sensitivity labels
Sensitivity labels enable you to apply to content like emails and documents, much like different stamps can be applied to physical documents. Instead, use sensitive information types to identify specific types of information such as credit card numbers. –>Microsoft provides built-in sensitive information types that you can use to identify data such as credit card numbers.
Microsoft Purview Communication Compliance
Microsoft Purview Communication Compliance provides the tools to help organizations detect regulatory compliance (for example, SEC or FINRA) and business conduct violations such as sensitive or confidential information, harassing or threatening language, and sharing of adult content. Built with privacy by design, usernames are pseudonymized by default, role-based access controls are built in, investigators are opted in by an admin, and audit logs are in place to help ensure user-level privacy.
eDiscovery (Premium)
The eDiscovery (Premium) solution allows you to collect and copy data into review sets, where you can filter, search, and tag content so you can identify and focus on content that’s most relevant.
Audit (Standard)
Audit (Standard) provides with you with the ability to log and search for audited activities and power your forensic, IT, compliance, and legal investigations.
Microsoft 365 Business
Microsoft 365 Business is designed for companies with under 300 employees
Symmetric
Symmetric is the same key encrypt and decrypt
Asymmetric
Asymmetric one can decrypt one to encrypt (a pair). If you send me a message, you encrypt with my public key and only I can decrypt with my private key.
Viva Connections
Viva Connections - stay connecting with each other via SharePoint and Yammer
Viva Insights
Viva Insights - daily email of how to optimize you and your team
Viva Topics
Viva Topics - Knowledge Base/my.ge.com
Viva Learning
Viva Learning - my Learning
AD Connect
AD Connect –> Allow on prem items to use AAD (aka Entra)
Cloud Sync
Cloud Sync –> Sync local AD with AAD (aka Entra)
Configuration Manager
Configuration Manager - more focused on prem
Co-management
Co-management- use Intune and Config Manager
Windows Update for Biz
Windows Update for Biz Is really just Window Update
Office Deployment Tool (ODT)
Office Deployment Tool (ODT) - is a command-line tool that you can use to download and deploy Click-to-Run versions of Office, such as Microsoft 365 Apps for enterprise, to your client computers
Office Portal
where users can go and download apps
CIA
Confidentiality - protecting sensitive data
Integrity - don’t get compromised
Availability-
Data Residency
Data Residency - where is the data physically located
Data Sovereignty
Data Sovereignty - which countries law is the data subject two
Microsoft 365
Microsoft 365 -
Microsoft 365 is available as a subscription-based service and provides Microsoft apps for employees to use online and offline.
Zero Trust security principles for Microsoft 365.
Network-based protection relies on such components as internal segmentation and micro-segmentation. Granularity in apps-based protection is typically based on roles. Device-based protection relies on device risk and compliance state. Infrastructure-based protection relies on such components as just-in-time (JIT) and version control.
Defender for Identity
Defender for Identity is a solution that uses the Active Directory data as signals to identify suspicious activities.
Defender for Office 365
Defender for Office 365 protects against threats in email messages.
Defender for Cloud Apps
Defender for Cloud Apps operates as an intermediary between the cloud user and cloud provider, mediating the requests sent to the cloud providers.
Defender for Endpoint
Defender for Endpoint is used to protect devices (endpoints), integrating with Microsoft Intune, Defender for Cloud, and other services.
Hunting
Hunting is part of the Microsoft 365 Defender portal that allows the security professionals to proactively search for undetected threats across the users’ devices and applications.
Incidents and alerts in the Microsoft 365 Defende
Incidents and alerts in the Microsoft 365 Defender portal represent detected potential threats.
Secure score in the Microsoft 365 Defender portal
Secure score in the Microsoft 365 Defender portal represents the company’s security posture.
Threat analytics in the Microsoft 365 Defender portal
Shows your threats and what you could do about them for YOUR environment
Threat analytics in the Microsoft 365 Defender portal provides the interface to identify threat intelligence information analyzed by Microsoft security researchers.