
SC-300 recently received an update with quite a few changes, with new items added, some items removed, as well as a weighting change in the exam. Let’s start off with the weighting change, as it’s a pretty simple one.
New weighting
- Implement and manage user identities (20–25%)
- Implement authentication and access management (25–30%)
- Plan and implement workload identities (20–25%)
- Plan and automate identity governance (25–30%) – an increase of 5%
Previous weighing
- Implement and manage user identities (20–25%)
- Implement authentication and access management (25–30%)
- Plan and implement workload identities (20–25%)
- Plan and implement identity governance (20–25%)
The takeaway here is that the capabilities in governance which have been expanding quite a bit over the last few years are seeing a corresponding presence in the exam, highlighting the importance of these features.
Up next, what has been added, or been refined in the exam?
- Implement Global Secure Access – I’ve placed this at the top of the list as it’s a new topic in the exam with multiple areas in it, which means that this is most likely the most important topic to get up to speed on if you haven’t had any exposure yet
- Configure and manage domains in Microsoft Entra ID and Microsoft 365 – the Microsoft 365 part is the addition
- Automate bulk operations by using the Microsoft Entra admin center and PowerShell – previously this was just Powershell
- Manage device join and device registration in Microsoft Entra ID – so make sure you brush up on Entra ID joined versus Entra ID hybrid joined versus device registration. I expect there might be some people who think something like this is more suited to MD-102, for example, but it’s also relevant here because the exam already includes other Entra identity types such as user and workload, so device identities are a valid inclusion. Additionally, device settings was already in the exam description, so it’s not a completely new entry.
- Migrate from AD FS to other authentication and authorization mechanisms – this addition highlights something that has been an ongoing conversation for many, how to move away from AD FS, and in this case, no surprise, the migration target will be leveraging Entra functionality instead.
- Configure authentication context – the first of the Conditional Access policy capabilities added to this exam description update
- Implement protected actions – the second Conditional Access policy capabilities added to this exam description update
- Implement and manage user risk by using Identity Protection or Conditional Access policies – here they have clarified that the traditional Identity Protection or the more recent Conditional Access approach to user risk may be included
- Implement and manage sign-in risk by using Identity Protection or Conditional Access policies – just like the previous entry, they have clarified that the traditional Identity Protection or the more recent Conditional Access
- Monitor, investigate and remediate risky users and risky sign-ins – the addition here was the risky signs-ins at the end, not a major change, as if you were looking at content around user risk, the chances are you would have been exposed to some sign-in risk information as well.
What’s been removed? Well, before I list the removed items, here’s my disclaimer about items that get removed from an exam description. I tend to work on the assumption that things are rarely removed from the exam itself, because it might be something that would be covered in the candidate profile and not need to be called out specifically. Alternatively, it may have just been rolled into another item on the exam description. In other situations, you might still find references to the removed items in the exam, maybe as an incorrect multiple choice option, or even floating around as background information in a case study.
- Create and manage a Microsoft Entra B2C tenant (Microsoft Entra External ID)
- Troubleshoot synchronization errors
- Manage per-user MFA settings
- Implement and manage federation, excluding manual Active Directory Federation Services (AD FS) deployments
- Implement certificate-based authentication in Microsoft Entra ID
- Design a strategy for monitoring Microsoft Entra
If you have already passed other Microsoft exams where Entra is a large part of the score, such as AZ-500, MS-102 or the recently retired MS-500, MS-100 and MS-101, you probably already know quite a few of the topics the exam covers, so it shouldn’t be too hard an exam to prepare for, but there are two main things to think about as you commence.
The first thing to watch out for when you are preparing for this exam include not accidentally going in without knowledge of changes that have occurred with Entra features over time. Not just new features, but enhancements to what may have been included for a while now. Where this is most likely to happen is when you haven’t worked too closely with the technology, especially premium functionality has expanded dramatically.
The example that I always like to use is Access Reviews, which were originally focused on Privileged Identity Management for Microsoft Entra ID roles, but have expanded across Azure roles, groups and applications, for example. It’s easy to miss this kind of change when you aren’t always being exposed to new functionality as it is being introduced.
The second thing to consider with your preparation is whether your Entra exposure is mostly from within Microsoft 365 workloads, or with Azure workloads. This is going to change what you need to focus on for the exam, examples include app registrations being something that Microsoft 365 focused exam takers should take a look at, and Microsoft 365 groups being something that Azure admins may not have much exposure to. There are more than these two things, just make sure you are targeting features that you haven’t been exposed to, or that you have very limited exposure to.
Implement identities in Microsoft Entra ID (20—25%)
Configure and manage a Microsoft Entra tenant
- Configure and manage built-in and custom Microsoft Entra roles
- Recommend when to use administrative units
- Configure and manage administrative units
- Evaluate effective permissions for Microsoft Entra roles
- Configure and manage domains in Microsoft Entra ID and Microsoft 365
- Configure Company branding settings
- Configure tenant properties, user settings, group settings, and device settings
Create, configure, and manage Microsoft Entra identities
- Create, configure, and manage users
- Create, configure, and manage groups
- Manage custom security attributes
- Automate bulk operations by using the Microsoft Entra admin center and PowerShell
- Manage device join and device registration in Microsoft Entra ID
- Assign, modify, and report on licenses
Implement and manage identities for external users and tenants
- Manage External collaboration settings in Microsoft Entra ID
- Invite external users, individually or in bulk
- Manage external user accounts in Microsoft Entra ID
- Implement Cross-tenant access settings
- Implement and manage cross-tenant synchronization
- Configure external identity providers, including protocols such as SAML and WS-Fed
Implement and manage hybrid identity
- Implement and manage Microsoft Entra Connect Sync
- Implement and manage Microsoft Entra Cloud Sync
- Implement and manage password hash synchronization
- Implement and manage pass-through authentication
- Implement and manage seamless single sign-on (SSO)
- Migrate from AD FS to other authentication and authorization mechanisms
- Implement and manage Microsoft Entra Connect Health
Implement authentication and access management (25-30%)
Plan, implement, and manage Microsoft Entra ID user authentication
- Plan for authentication
- Implement and manage authentication methods, including certificate-based, temporary access pass, OAUTH tokens, Microsoft Authenticator, and FIDO2
- Implement and manage tenant-wide Multi-factor Authentication (MFA) settings
- Configure and deploy self-service password reset (SSPR)
- Implement and manage Windows Hello for Business
- Disable accounts and revoke user sessions
- Implement and manage Microsoft Entra password protection
- Enable Microsoft Entra Kerberos authentication for hybrid identities
Plan, implement, and administer conditional access
- Plan Conditional Access policies
- Implement Conditional Access policy assignments
- Implement Conditional Access policy controls
- Test and troubleshooting Conditional Access policies
- implement session management
- Implement device-enforced restrictions
- Implement continuous access evaluation
- Configure authentication context
- Implement protected actions
- Create a Conditional Access Policy from a template
Manage Microsoft Entra ID Identity Protection
- Implement and manage user risk by using Identity Protection or Conditional Access policies
- Implement and manage sign-in risk by using Identity Protection or Conditional Access policies
- Implement and manage Multifactor authentication registration policies
- Monitor, investigate and remediate risky users and risky sign-ins
- Monitor, investigate and remediate risky workload identities
Implement access management for Azure resources
- Create custom Azure roles, including both control plane and data plane permissions
- Assign built-in and custom Azure roles
- Evaluate effective permissions for a set of Azure roles
- Assign Azure roles to enable Microsoft Entra ID login to Azure virtual machines
- Configure Azure Key Vault RBAC and policies
Implement Global Secure Access
- Deploy Global Secure Access clients
- Deploy Private Access
- Deploy Internet Access
- Deploy Internet Access for Microsoft 365
Plan and implement workload identities (20–25%)
Plan and implement identities for applications and Azure workloads
- Select appropriate identities for applications and Azure workloads, including managed identities, service principals, user accounts, and managed service accounts
- Create managed identities
- Assign a managed identity to an Azure resource
- Use a managed identity assigned to an Azure resource to access other Azure resources
Plan, implement, and monitor the integration of enterprise applications
- Configure and manage user and admin consent
- Discover apps by using AD FS application activity reports
- Plan and implement settings for enterprise applications, including application-level and tenant-level settings
- Assign appropriate Microsoft Entra roles to users to manage enterprise applications
- Monitor and audit activity in enterprise applications
- Design and implement integration for on-premises apps by using Microsoft Entra application proxy
- Design and implement integration for SaaS apps
- Assign, classify, and manage users, groups, and app roles for enterprise applications
- Create and manage application collections
Plan and implement app registrations
- Plan for app registrations
- Create app registrations
- Configure app authentication
- Configure API permissions
- Create app roles
Manage and monitor app access by using Microsoft Defender for Cloud
Apps
- Configure and analyze cloud discovery results by using Defender for Cloud Apps
- Configure connected apps
- Implement application-enforced restrictions
- Configure Conditional Access app control
- Create access and session policies in Defender for Cloud Apps
- Implement and manage policies for OAUTH apps
- Manage the Cloud app catalog
Plan and implement identity governance (25-30%)
Plan and implement entitlement management in Microsoft Entra
- Plan entitlements
- Create and configure catalogs
- Create and configure access packages
- Manage access requests
- Implement and manage terms of use (ToU)
- Manage the lifecycle of external users
- Configure and manage connected organizations
Plan, implement, and manage access reviews in Microsoft Entra
- Plan for access reviews
- Create and configure access reviews
- Monitor access review activity
- Manually respond to access review activity
Plan and implement privileged access
- Plan and manage Azure roles in Microsoft Entra Privileged Identity Management (PIM), including settings and assignments
- Plan and manage Azure resources in PIM, including settings and assignments
- Plan and configure Privileged Access groups
- Manage the PIM request and approval process
- Analyze PIM audit history and reports
- Create and manage break-glass accounts
Monitor identity activity by using logs, workbooks, and reports
- Review and analyze sign-in, audit, and provisioning logs by using the Microsoft Entra admin center
- Configure diagnostic settings, including configuring destinations such as Log Analytics workspaces, storage accounts, and event hubs
- Monitor Microsoft Entra by using KQL queries in Log Analytics
- Analyze Microsoft Entra by using workbooks and reporting
- Monitor and improve the security posture by using Identity Secure Score
Plan and implement Microsoft Entra Permissions Management
- Onboard Azure subscriptions to Permissions Management
- Evaluate and remediate risks relating to Azure identities, resources, and tasks
- Evaluate and remediate risks relating to Azure highly privileged roles
- Evaluate and remediate risks relating to Permissions Creep Index (PCI) in Azure
- Configure activity alerts and triggers for Azure subscriptions