SC-900 Access Management Flashcards
What does conditional access mean?
Feature of entra that examines signals like user, location, device, application, and risk to automate decisions for authorizing access to resources (apps and data) after factor authentication happens.
Common parts of conditional access include things like?
Assignements (Determines which signals to use. Who, what, where, and when)
Conditions (Define when and where the policy will apply)
Access Controls (Determine what actions occur)
What are examples of RBAC in entra and can roles be customized?
Yes (With a P1/P2 license) and examples include Global Admin, User Admin, and Billing Admin
What are some common categories of entra roles?
Entra specfiic: Permissions limited directly to resources in Entra (User admin)
Service specific: Permissions tied directly to managing services of 365 (Intune Admin)
Cross service: Permissions that span multiple services (Compliance admin)
What are the major features of entitlement management?
Feature that allow organizations to manage identity and access lifecycle at scale including the automatic management of external users and the delegation of access packages (that contain resources that users can request)
What are the major features of privilidged identity management?
Service that allows access to resources to be just in time, time bound, approval based, visible, and auditable
What describes the general workflow of PIM?
Assign (members/owners, scope, assignement types, and durations)
Activate
Approve/Deny
Extend/Renew
Default behaivor will be to see all PIM actions for the past 30 days.
Define sign in risk?
The probability that a given authentication request isn’t autorized by the identity owner (odd IP, atypical travel, odd sign in properties, entra threat intelligence)
Define user risk?
Probability that a given identity or account is compromised (odd behaivor, suspucious activity, leadked creds, threat intell)
Reports that are often a part of identity protection include?
Risk detections: Contains every risk detected
Risky sign ins: Takes place when one or more risk detections is triggered for a sign in.
Risky users: When one or more risky signs or risky detections have taken palce.