MS-101 Exam Study Guide

5–7 minutes

Below you’ll find all exam areas and objectives with related documentation to help you prepare for the exam. Most of the references below are summarized in my exam prep book.

        <h2>Implement modern device services (30-35%)</h2>      
                                            <a href="">Implement Mobile Device Management (MDM)</a>
                <ul><li>plan for MDM<br /><ul><li><a href="https://docs.microsoft.com/en-us/intune/planning-guide">Intune deployment planning, design, and implementation guide</a></li><li><a href="https://docs.microsoft.com/en-us/intune/device-profiles">Apply features and settings on your devices using device profiles in Microsoft Intune</a></li></ul></li><li>configure MDM integration with Azure AD<br /><ul><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/devices/azureadjoin-plan">How to: Plan your Azure AD join implementation</a> </li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/devices/hybrid-azuread-join-plan">How To: Plan your hybrid Azure Active Directory join implementation</a></li><li><a href="https://docs.microsoft.com/en-us/intune/quickstart-setup-auto-enrollment">Quickstart: Set up automatic enrollment for Windows 10 devices</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/devices/overview">What is a device identity?</a></li></ul></li><li>set an MDM authority<br /><ul><li><a href="https://docs.microsoft.com/en-au/intune/mdm-authority-set">Set the mobile device management authority</a></li></ul></li><li>set device enrollment limit for users<br /><ul><li><a href="https://docs.microsoft.com/en-us/intune/enrollment-restrictions-set">Set enrollment restrictions</a></li></ul></li></ul>
                                            <a href="">Manage device compliance</a>
                <ul><li>plan for device Compliance<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/device-compliance-get-started">Set rules on devices to allow access to resources in your organization using Intune</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/compliance-policy-monitor">Monitor Intune Device compliance policies</a></li></ul></li><li>design/create/manage Conditional Access Policies<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/conditional-access">Learn about Conditional Access and Intune</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/controls#session-controls">What are access controls in Azure Active Directory Conditional Access? &gt;Session Controls</a></li><li><a href="https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/always-on-vpn-deploy">Always On VPN deployment for Windows Server and Windows 10</a></li></ul></li><li>configure device compliance policy<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/create-compliance-policy">Create a compliance policy in Microsoft Intune</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/use-network-locations">Use Locations (network fence) in Intune</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/quickstart-set-password-length-android">Quickstart: Create a password compliance policy for Android devices</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/quickstart-send-notification">Quickstart: Send notifications to noncompliant devices</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/actions-for-noncompliance">Automate email and add actions for noncompliant devices in Intune</a></li></ul></li></ul>
                                            <a href="">Plan for devices and apps</a>
                <ul><li>create and configure Microsoft Store for Business<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-store/">Microsoft Store for Business and Education</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-store/microsoft-store-for-business-overview">Microsoft Store for Business and Microsoft Store for Education overview</a></li></ul></li><li>plan app deployment<ul><li><a href="https://docs.microsoft.com/en-us/intune/apps/windows-store-for-business">How to manage volume purchased apps from the Microsoft Store for Business with Microsoft Intune</a></li></ul></li><li>plan device co-management<ul><li><a href="https://docs.microsoft.com/en-us/configmgr/comanage/how-to-prepare-win10">How to prepare internet-based devices for co-management</a></li></ul></li><li>plan device monitoring<ul><li><a href="https://docs.microsoft.com/en-us/intune/fundamentals/what-is-device-management">Device management in Microsoft 365</a></li></ul></li><li>plan for device profiles<ul><li><a href="https://docs.microsoft.com/en-us/intune/configuration/device-profile-assign">Assign user and device profiles in Microsoft Intune</a></li></ul></li><li>plan for Mobile Application Management<ul><li><a href="https://docs.microsoft.com/en-us/intune/apps/mam-faq">Frequently asked questions about MAM and app protection</a></li><li><a href="https://docs.microsoft.com/en-us/intune/apps/app-configuration-policies-overview">App configuration policies for MicrosoftIntune</a></li></ul></li><li>plan mobile device security<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/device-protect">Protect devices with Microsoft Intune</a></li></ul></li></ul>
                                            <a href="">Plan Windows 10 deployment</a>
                <ul><li>plan for Windows as a Service (WaaS)<ul><li><a href="https://docs.microsoft.com/en-us/windows/deployment/update/waas-overview">Overview of Windows as a service</a></li></ul></li><li>plan the appropriate Windows 10 Enterprise deployment method<ul><li><a href="https://docs.microsoft.com/en-us/windows/deployment/planning/windows-10-deployment-considerations">Windows 10 deployment considerations</a></li></ul></li><li>analyze upgrade readiness for Windows 10<ul><li><a href="https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started">Get started with Upgrade Readiness</a></li></ul></li><li>evaluate and deploy additional Windows 10 Enterprise security features<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/">Windows 10 Enterprise Security</a></li></ul></li></ul>
        <h2>Implement Microsoft 365 security and threat management (30-35%)</h2>        
                                            <a href="">Implement Cloud App Security (CAS)</a>
                <ul><li>configure Cloud App Security (CAS)<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/general-setup">Basic setup for Cloud App Security</a></li><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/">Microsoft Cloud App Security</a></li></ul></li><li>configure Cloud App Security (CAS) policies<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/control-cloud-apps-with-policies">Control cloud apps with policies</a></li><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad">Protect apps with Microsoft Cloud App Security Conditional Access App Control</a></li></ul></li><li>configure Connected apps<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/enable-instant-visibility-protection-and-governance-actions-for-your-apps">Connect apps</a></li></ul></li><li>design cloud app security (CAS) Solution<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security">Quickstart: Get started with Microsoft Cloud App Security</a></li><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/editions-cloud-app-security-o365">What are the differences between Microsoft Cloud App Security and Office 365 Cloud App Security?</a></li></ul></li><li>manage Cloud App Security (CAS) alerts<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/managing-alerts">Manage alerts</a></li></ul></li><li>upload cloud app security (CAS) traffic logs<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker">Configure automatic log upload for continuous reports</a></li></ul></li></ul>
                                            <a href="">Implement threat management</a>
                <ul><li>plan a threat management solution<br /><ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/protect-against-threats">Protect against threats in Office 365</a></li></ul></li><li>design and configure Azure Advanced Threat Protection (ATP) Policies<br /><ul><li><a href="https://docs.microsoft.com/en-us/azure-advanced-threat-protection/what-is-atp">What is Azure Advanced Threat Protection?</a></li><li><a href="https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step1">Quickstart: Create your Azure ATP instance</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/protect-against-threats">Quickstart: Configure Azure ATP sensor settings</a></li></ul></li><li>design and configure Microsoft 365 ATP Policies<br /><ul><li><a href="https://docs.microsoft.com/en-us/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#advanced-threat-protection-atp-capabilities">Office 365 Advanced Threat Protection Service Description</a></li></ul><ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-links-policies">Set up Office 365 ATP Safe Links policies</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-attachments-policies">Set up Office 365 ATP Safe Attachments policies</a></li></ul></li><li>monitor Advanced Threat Analytics (ATA) incidents<br /><ul><li><a href="https://docs.microsoft.com/en-us/advanced-threat-analytics/what-is-ata">What is Advanced Threat Analytics?</a></li><li><a href="https://docs.microsoft.com/en-us/advanced-threat-analytics/suspicious-activity-guide">Advanced Threat Analytics suspicious activity guide</a></li><li><a href="https://docs.microsoft.com/en-us/advanced-threat-analytics/working-with-suspicious-activities">Working with Suspicious Activities</a></li></ul></li></ul>
                                            <a href="">Implement Windows Defender Advanced Threat Protection (ATP)</a>
                <ul><li>plan Windows Defender ATP Solutiona<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection">Microsoft Defender Advanced Threat Protection</a></li></ul></li><li>configure preferences<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/onboard">Configure and manage Microsoft Defender ATP capabilities</a></li><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access">Configure Conditional Access in Microsoft Defender ATP</a></li><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config">Configure Microsoft Cloud App Security in Microsoft Defender ATP</a></li></ul></li><li>implement Windows Defender ATP Policies<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/advanced-threat-protection">Enforce compliance for Microsoft Defender ATP with Conditional Access in Intune</a></li></ul></li><li>enable and configure security features of Windows 10 Enterprise<ul><li style="list-style-type: none;"><ul><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction">Configure attack surface reduction rules</a></li><li><a href="https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/">Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection</a></li><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features">Configure Windows Defender Antivirus features</a></li></ul></li></ul></li></ul> 
                                            <a href="">Manage security reports and alerts</a>
                <ul><li>manage service assurance dashboard<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/service-assurance">Service assurance in the Security &amp; Compliance Center</a></li></ul></li><li>manage tracing and reporting on Azure AD Identity Protection<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/tutorial-ueba">Tutorial: Investigate risky users</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection">What is Azure Active Directory Identity Protection?</a></li></ul></li><li>configure and manage Microsoft 365 security alerts<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/alerts">Alerts in the Office 365 Security &amp; Compliance Center</a></li></ul></li><li>configure and manage Azure Identity Protection dashboard and alerts<ul><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-security-overview">Azure Active Directory Identity Protection &#8211; Security overview</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock">Remediate risks and unblock users </a></li></ul></li></ul>
        <h2>Manage Microsoft 365 governance and compliance (35-40%)</h2>        
                                            <a href="">Configure Data Loss Prevention (DLP)</a>
                <ul><li>configure DLP Policies<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-dlp-policy-recommendations">Get started with DLP policy recommendations</a></li></ul></li><li>design data retention policies in Microsoft 365<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/retention-policies">Overview of retention policies</a></li></ul></li><li>manage DLP exceptions<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/view-the-dlp-reports">View the reports for data loss prevention</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/what-the-dlp-functions-look-for">What the DLP functions look for</a></li></ul></li><li>monitor and manage DLP policy matches<ul><li><a style="color: #000000;" href="https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp-policy">Create, test, and tune a DLP policy</a></li></ul></li></ul>
                                            <a href="">Implement Azure Information Protection (AIP)</a>
                <ul><li>plan AIP solution<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/deployment-roadmap">Azure Information Protection deployment roadmap</a></li><li><a href="https://azure.microsoft.com/en-us/services/information-protection/">Azure Information Protection</a></li></ul></li><li>plan for deployment On-Prem rights management Connector<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/deploy-rms-connector">Deploying the Azure Rights Management connector</a></li><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/install-configure-rms-connector">Installing and configuring the Azure Rights Management connector</a></li></ul></li><li>plan for Windows information Protection (WIP) implementation<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/overview-create-wip-policy">Create a Windows Information Protection (WIP) policy using Microsoft Intune</a></li></ul></li><li>plan for classification labeling<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/quickstart-label-dnf-protectedemail">Quickstart: Configure a label for users to easily protect emails that contain sensitive information</a></li></ul></li><li>configure Information Rights Management (IRM) for Workloads<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/compare-on-premise">Comparing Azure Information Protection and AD RMS</a></li></ul></li><li>configure Super User<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/configure-super-users">Configuring super users for Azure Information Protection and discovery services or data recovery</a></li></ul></li><li>deploy AIP Clients<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/configure-client">Azure Information Protection client: Installation and configuration for clients</a></li><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/rms-client/use-client">The client side of Azure Information Protection</a></li></ul></li><li>implement Azure Information Protection policies<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/configure-policy">Configuring the Azure Information Protection policy</a></li></ul></li><li>implement AIP tenant key<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/plan-implement-tenant-key">Planning and implementing your Azure Information Protection tenant key </a></li></ul></li></ul>
                                            <a href="">Manage data governance</a>
                <ul><li>configure and configure information retention<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/retention-policies">Overview of retention policies</a></li></ul></li><li>plan for Microsoft 365 backup<ul><li><a href="https://docs.microsoft.com/en-us/office365/admin/subscriptions-and-billing/back-up-data-before-switching-plans?view=o365-worldwide">Back up data before switching Office 365 for business plans</a></li></ul></li><li>plan for restoring deleted content<ul><li>Exchange<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/inactive-mailboxes-in-office-365">Overview of inactive mailboxes in Office 365</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/restore-an-inactive-mailbox">Restore an inactive mailbox in Office 365</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/recover-an-inactive-mailbox">Recover an inactive mailbox in Office 365</a></li></ul></li><li>SharePoint<ul><li><a href="https://support.office.com/en-us/article/restore-items-in-the-recycle-bin-of-a-sharepoint-site-6df466b6-55f2-4898-8d6e-c0dff851a0be">Restore items in the Recycle Bin of a SharePoint site</a></li><li><a href="https://support.office.com/en-us/article/restore-deleted-items-from-the-site-collection-recycle-bin-5fa924ee-16d7-487b-9a0a-021b9062d14b">Restore deleted items from the site collection recycle bin</a></li><li><a href="https://docs.microsoft.com/en-us/sharepoint/restore-deleted-site-collection">Restore deleted sites</a></li></ul></li><li>OneDrive<ul><li><a href="https://support.office.com/en-us/article/restore-your-onedrive-fa231298-759d-41cf-bcd0-25ac53eb8a15">Restore your OneDrive </a></li></ul></li></ul></li></ul>
                                            <a href="">Manage auditing</a>
                <ul><li>configure audit log retention<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/turn-audit-log-search-on-or-off">Turn Office 365 audit log search on or off</a></li><li><a href="https://docs.microsoft.com/en-us/Exchange/permissions-exo/permissions-exo">Permissions in Exchange Online</a></li></ul></li><li>configure audit policy<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security">Configure your Office 365 tenant for increased security</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/enable-mailbox-auditing">Manage mailbox auditing</a></li></ul></li><li>monitor Unified Audit Logs<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance">Search the audit log in the Security &amp; Compliance Center </a></li></ul></li></ul>
                                            <a href="">Manage eDiscovery</a>
                <ul><li>search content by using Security and Compliance Center<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/content-search">Content Search in Office 365</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/csv-file-for-an-id-list-content-search">Prepare a CSV file for an ID list Content Search in Office 365</a></li></ul></li><li>plan for in-place and legal hold<ul><li><a href="https://docs.microsoft.com/en-us/exchange/security-and-compliance/in-place-and-litigation-holds">In-Place Hold and Litigation Hold</a></li><li><a href="https://docs.microsoft.com/en-us/Exchange/policy-and-compliance/holds/litigation-holds?view=exchserver-2019">Place a mailbox on Litigation Hold</a></li></ul></li><li>configure eDiscovery<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery-cases">eDiscovery cases in the Security &amp; Compliance Center</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/assign-ediscovery-permissions">Assign eDiscovery permissions in the Security &amp; Compliance Center </a></li></ul></li></ul>
    <h2 style="text-align: right;">Make room on your shelf</h2><p style="text-align: right;">Check out these two MS-101 exam prep books. The first is written by Nate Chamberlain.</p>      
        <iframe style="width:120px;height:240px;" marginwidth="0" marginheight="0" scrolling="no" frameborder="0" src="//ws-na.amazon-adsystem.com/widgets/q?ServiceVersion=20070822&amp;OneJS=1&amp;Operation=GetAdHtml&amp;MarketPlace=US&amp;source=ss&amp;ref=as_ss_li_til&amp;ad_type=product_link&amp;tracking_id=sharepointlib-20&amp;language=en_US&amp;marketplace=amazon&amp;region=US&amp;placement=1838984658&amp;asins=1838984658&amp;linkId=3d5fa94fe0913a205caf6cbd12a82093&amp;show_border=true&amp;link_opens_in_new_window=true"></iframe>        
        <iframe style="width:120px;height:240px;" marginwidth="0" marginheight="0" scrolling="no" frameborder="0" src="//ws-na.amazon-adsystem.com/widgets/q?ServiceVersion=20070822&amp;OneJS=1&amp;Operation=GetAdHtml&amp;MarketPlace=US&amp;source=ss&amp;ref=as_ss_li_til&amp;ad_type=product_link&amp;tracking_id=sharepointlib-20&amp;language=en_US&amp;marketplace=amazon&amp;region=US&amp;placement=0135574897&amp;asins=0135574897&amp;linkId=c5385c3dfd4313dc47853684718ecc78&amp;show_border=true&amp;link_opens_in_new_window=true"></iframe>

Discover more from Nate Chamberlain

Subscribe to get the latest posts sent to your email.

One response to “MS-101 Exam Study Guide”

  1. […] out my MS-101 exam study guide blog post, with links to relevant docs.microsoft.com material for every exam […]

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Nate Chamberlain

Subscribe now to keep reading and get access to the full archive.

Continue reading