
It’s time to revisit MS-500, and the good news is that the objectives have only had some minor changes, so any of your study to date shouldn’t be affected. The biggest change that needs to be discussed is the change in the Microsoft security exam ecosystem and how that could affect you, rather than anything inside of this exam.
If your role is mostly or completely Microsoft 365 focused, with little or no Azure (outside of Azure Active Directory), then you can mostly view the exam ecosystem changes as things you can deal with later. However, you do have a few new exams that might align with what you are more heavily focused on, such as the SC-300 identity exam (it does have some Azure though), and the SC-400 compliance exam, which is currently a pure Microsoft 365 workload focused exam. If you need to pass MS-500 for work requirements, whether they just be internal objectives, or perhaps you work for a Microsoft partner and need this exam for competency requirements, nothing really changes in how you should think about the different Microsoft security exams.
Things start to get more complex with the other new security exams that are on offer, SC-900 for security and compliance fundamentals, and SC-200 for security operations, because they expect knowledge of additional Azure workloads. What you will find is that after you prepare for this exam, and successfully pass it, there are going to be some areas in these new exams you won’t need to do much preparation for, so that when the time comes to take the new exams you will be focused on filling in the items that weren’t covered in this exam.
My final bit of advice here before we get to the exam resources is that this is a very broad exam, and if you are attempting it without having completed exams MS-100, MS-101 and MD-101, it is going to make this exam tougher. Why? Each of those three exams covers something that this exam includes, and it means that by the time you get to this exam after the ones I just mentioned you are mostly doing revision rather than learning lots of new things. Plenty of people do get through this exam without doing the others first, because perhaps that’s all that they want or need for work related purposes, but if you are struggling with the breadth of what this exam includes, it might be worth at least going through the prep material for those exams to fill in some of the fundamentals this exam expects you to know.
Implement and manage identity and access (30-35%)
Secure Microsoft 365 hybrid environments
- plan Azure AD authentication options
- plan Azure AD synchronization options
- monitor and troubleshoot Azure AD Connect events
Secure Identities
- implement Azure AD membership
- implement password management
- configure and manage identity governance
Implement authentication methods
- plan sign-on security
- implement multi-factor authentication (MFA)
- manage and monitor MFA
- plan and implement device authentication methods like Windows Hello
- configure and manage Azure AD user authentication options and self-service password management
Implement conditional access
- plan for compliance and conditional access policies
- configure and manage device compliance for endpoint security
- implement and manage conditional access
Implement role-based access control (RBAC)
- plan for roles
- configure roles
- audit roles
Implement Azure AD Privileged Identity Management (PIM)
- plan for Azure PIM
- assign eligibility and activate admin roles
- manage Azure PIM role requests and assignments
- monitor PIM history and alerts
Implement Azure AD Identity Protection
- implement user risk policy
- implement sign-in risk policy
- configure Identity Protection alerts
- review and respond to risk events
Implement and manage threat protection (20-25%)
Implement an enterprise hybrid threat protection solution
- plan an Microsoft Defender for Identity solution
- install and configure Microsoft Defender for Identity
- monitor and manage Microsoft Defender for Identity
Implement device threat protection
- plan a Microsoft Defender for Endpoint solution
- implement Microsoft Defender for Endpoint
- manage and monitor Microsoft Defender for Endpoint
Implement and manage device and application protection
- plan for device and application protection
- configure and manage Windows Defender Application Guard
- configure and manage Windows Defender Application Control
- configure and manage exploit protection
- configure Secure Boot
- configure and manage Windows device encryption
- configure and manage non-Windows device encryption
- plan for securing applications data on devices
- implement application protection policies
Implement and manage Microsoft Defender for Office 365
- configure Microsoft Defender for Office 365
- monitor Microsoft Defender for Office 365
- conduct simulated attacks using Attack Simulator
Implement Azure Sentinel for Microsoft 365
- plan and implement Azure Sentinel
- configure playbooks in Azure Sentinel
- manage and monitor Azure Sentinel
- respond to threats in Azure Sentinel
Implement and manage information protection (15-20%)
Secure data access within Office 365
- implement and manage Customer Lockbox
- configure data access in Office 365 collaboration workloads
- configure B2B sharing for external users
Manage sensitivity labels
- plan an sensitivity labels solution
- configure Sensitivity labels and policies
- configure sensitivity labels and policies
- configure and use label analytics
- use sensitivity labels with Teams, SharePoint, OneDrive and Office apps
Manage Data Loss Prevention (DLP)
- plan a DLP solution
- create and manage DLP policies
- create and manage sensitive information types
- monitor DLP reports
- manage DLP notifications
Implement and manage Microsoft Cloud App Security
- plan Cloud App Security implementation
- configure Microsoft Cloud App Security
- manage cloud app discovery
- manage entries in the Cloud app catalog
- manage apps in Cloud App Security
- manage Microsoft Cloud App Security
- configure Cloud App Security connectors and Oauth apps
- configure Cloud App Security policies and templates
- review, interpret and respond to Cloud App Security alerts, reports, dashboards and logs
Manage governance and compliance features in Microsoft 365 (25-30%)
Configure and analyze security reporting
- monitor and manage device security status using Microsoft Endpoint Manager Admin Center
- manage and monitor security reports and dashboards using Microsoft 365 Security Center
- plan for custom security reporting with Graph Security API
- use secure score dashboards to review actions and recommendations
- configure alert policies
Manage and analyze audit logs and reports
- plan for auditing and reporting
- perform audit log search
- review and interpret compliance reports and dashboards
- configure audit alert policy
Manage data governance and retention
- plan for data governance and retention
- review and interpret data governance reports and dashboards
- configure retention policies
- define data governance event types
- define and manage communication compliance policies
- configure Information holds
- find and recover deleted Office 365 data
- configure data archiving
- manage inactive mailboxes
Manage search and investigation
- plan for content search and eDiscovery
- search for personal data
- monitor for leaks of personal data
- delegate permissions to use search and discovery tools
- use search and investigation tools to perform content searches
- export content search results
- manage eDiscovery cases
Manage data privacy regulation compliance
- plan for regulatory compliance in Microsoft 365
- review and interpret GDPR dashboards and reports
- manage Data Subject Requests (DSRs)
- administer Compliance Manager in Microsoft 365 compliance center
- review Compliance Manager reports
- create and perform Compliance Manager assessments and action items
For the latest updates to exam prep guides please check https://intunedin.net/exams
This appears to be changing again the end of this month, could you cover this?
LikeLike
Hi Daryl
It’s in the works, I should have it completed mid next week.
cheers
Mark
LikeLike