Below you’ll find all exam areas and objectives with related documentation to help you prepare for the exam. Most of the references below are summarized in my exam prep book.
<h2>Implement modern device services (30-35%)</h2>
<a href="">Implement Mobile Device Management (MDM)</a>
<ul><li>plan for MDM<br /><ul><li><a href="https://docs.microsoft.com/en-us/intune/planning-guide">Intune deployment planning, design, and implementation guide</a></li><li><a href="https://docs.microsoft.com/en-us/intune/device-profiles">Apply features and settings on your devices using device profiles in Microsoft Intune</a></li></ul></li><li>configure MDM integration with Azure AD<br /><ul><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/devices/azureadjoin-plan">How to: Plan your Azure AD join implementation</a> </li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/devices/hybrid-azuread-join-plan">How To: Plan your hybrid Azure Active Directory join implementation</a></li><li><a href="https://docs.microsoft.com/en-us/intune/quickstart-setup-auto-enrollment">Quickstart: Set up automatic enrollment for Windows 10 devices</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/devices/overview">What is a device identity?</a></li></ul></li><li>set an MDM authority<br /><ul><li><a href="https://docs.microsoft.com/en-au/intune/mdm-authority-set">Set the mobile device management authority</a></li></ul></li><li>set device enrollment limit for users<br /><ul><li><a href="https://docs.microsoft.com/en-us/intune/enrollment-restrictions-set">Set enrollment restrictions</a></li></ul></li></ul>
<a href="">Manage device compliance</a>
<ul><li>plan for device Compliance<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/device-compliance-get-started">Set rules on devices to allow access to resources in your organization using Intune</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/compliance-policy-monitor">Monitor Intune Device compliance policies</a></li></ul></li><li>design/create/manage Conditional Access Policies<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/conditional-access">Learn about Conditional Access and Intune</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/controls#session-controls">What are access controls in Azure Active Directory Conditional Access? >Session Controls</a></li><li><a href="https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/always-on-vpn-deploy">Always On VPN deployment for Windows Server and Windows 10</a></li></ul></li><li>configure device compliance policy<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/create-compliance-policy">Create a compliance policy in Microsoft Intune</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/use-network-locations">Use Locations (network fence) in Intune</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/quickstart-set-password-length-android">Quickstart: Create a password compliance policy for Android devices</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/quickstart-send-notification">Quickstart: Send notifications to noncompliant devices</a></li><li><a href="https://docs.microsoft.com/en-us/intune/protect/actions-for-noncompliance">Automate email and add actions for noncompliant devices in Intune</a></li></ul></li></ul>
<a href="">Plan for devices and apps</a>
<ul><li>create and configure Microsoft Store for Business<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-store/">Microsoft Store for Business and Education</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-store/microsoft-store-for-business-overview">Microsoft Store for Business and Microsoft Store for Education overview</a></li></ul></li><li>plan app deployment<ul><li><a href="https://docs.microsoft.com/en-us/intune/apps/windows-store-for-business">How to manage volume purchased apps from the Microsoft Store for Business with Microsoft Intune</a></li></ul></li><li>plan device co-management<ul><li><a href="https://docs.microsoft.com/en-us/configmgr/comanage/how-to-prepare-win10">How to prepare internet-based devices for co-management</a></li></ul></li><li>plan device monitoring<ul><li><a href="https://docs.microsoft.com/en-us/intune/fundamentals/what-is-device-management">Device management in Microsoft 365</a></li></ul></li><li>plan for device profiles<ul><li><a href="https://docs.microsoft.com/en-us/intune/configuration/device-profile-assign">Assign user and device profiles in Microsoft Intune</a></li></ul></li><li>plan for Mobile Application Management<ul><li><a href="https://docs.microsoft.com/en-us/intune/apps/mam-faq">Frequently asked questions about MAM and app protection</a></li><li><a href="https://docs.microsoft.com/en-us/intune/apps/app-configuration-policies-overview">App configuration policies for MicrosoftIntune</a></li></ul></li><li>plan mobile device security<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/device-protect">Protect devices with Microsoft Intune</a></li></ul></li></ul>
<a href="">Plan Windows 10 deployment</a>
<ul><li>plan for Windows as a Service (WaaS)<ul><li><a href="https://docs.microsoft.com/en-us/windows/deployment/update/waas-overview">Overview of Windows as a service</a></li></ul></li><li>plan the appropriate Windows 10 Enterprise deployment method<ul><li><a href="https://docs.microsoft.com/en-us/windows/deployment/planning/windows-10-deployment-considerations">Windows 10 deployment considerations</a></li></ul></li><li>analyze upgrade readiness for Windows 10<ul><li><a href="https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started">Get started with Upgrade Readiness</a></li></ul></li><li>evaluate and deploy additional Windows 10 Enterprise security features<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/">Windows 10 Enterprise Security</a></li></ul></li></ul>
<h2>Implement Microsoft 365 security and threat management (30-35%)</h2>
<a href="">Implement Cloud App Security (CAS)</a>
<ul><li>configure Cloud App Security (CAS)<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/general-setup">Basic setup for Cloud App Security</a></li><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/">Microsoft Cloud App Security</a></li></ul></li><li>configure Cloud App Security (CAS) policies<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/control-cloud-apps-with-policies">Control cloud apps with policies</a></li><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad">Protect apps with Microsoft Cloud App Security Conditional Access App Control</a></li></ul></li><li>configure Connected apps<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/enable-instant-visibility-protection-and-governance-actions-for-your-apps">Connect apps</a></li></ul></li><li>design cloud app security (CAS) Solution<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security">Quickstart: Get started with Microsoft Cloud App Security</a></li><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/editions-cloud-app-security-o365">What are the differences between Microsoft Cloud App Security and Office 365 Cloud App Security?</a></li></ul></li><li>manage Cloud App Security (CAS) alerts<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/managing-alerts">Manage alerts</a></li></ul></li><li>upload cloud app security (CAS) traffic logs<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker">Configure automatic log upload for continuous reports</a></li></ul></li></ul>
<a href="">Implement threat management</a>
<ul><li>plan a threat management solution<br /><ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/protect-against-threats">Protect against threats in Office 365</a></li></ul></li><li>design and configure Azure Advanced Threat Protection (ATP) Policies<br /><ul><li><a href="https://docs.microsoft.com/en-us/azure-advanced-threat-protection/what-is-atp">What is Azure Advanced Threat Protection?</a></li><li><a href="https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step1">Quickstart: Create your Azure ATP instance</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/protect-against-threats">Quickstart: Configure Azure ATP sensor settings</a></li></ul></li><li>design and configure Microsoft 365 ATP Policies<br /><ul><li><a href="https://docs.microsoft.com/en-us/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#advanced-threat-protection-atp-capabilities">Office 365 Advanced Threat Protection Service Description</a></li></ul><ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-links-policies">Set up Office 365 ATP Safe Links policies</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-attachments-policies">Set up Office 365 ATP Safe Attachments policies</a></li></ul></li><li>monitor Advanced Threat Analytics (ATA) incidents<br /><ul><li><a href="https://docs.microsoft.com/en-us/advanced-threat-analytics/what-is-ata">What is Advanced Threat Analytics?</a></li><li><a href="https://docs.microsoft.com/en-us/advanced-threat-analytics/suspicious-activity-guide">Advanced Threat Analytics suspicious activity guide</a></li><li><a href="https://docs.microsoft.com/en-us/advanced-threat-analytics/working-with-suspicious-activities">Working with Suspicious Activities</a></li></ul></li></ul>
<a href="">Implement Windows Defender Advanced Threat Protection (ATP)</a>
<ul><li>plan Windows Defender ATP Solutiona<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection">Microsoft Defender Advanced Threat Protection</a></li></ul></li><li>configure preferences<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/onboard">Configure and manage Microsoft Defender ATP capabilities</a></li><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access">Configure Conditional Access in Microsoft Defender ATP</a></li><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config">Configure Microsoft Cloud App Security in Microsoft Defender ATP</a></li></ul></li><li>implement Windows Defender ATP Policies<ul><li><a href="https://docs.microsoft.com/en-us/intune/protect/advanced-threat-protection">Enforce compliance for Microsoft Defender ATP with Conditional Access in Intune</a></li></ul></li><li>enable and configure security features of Windows 10 Enterprise<ul><li style="list-style-type: none;"><ul><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction">Configure attack surface reduction rules</a></li><li><a href="https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/">Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection</a></li><li><a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features">Configure Windows Defender Antivirus features</a></li></ul></li></ul></li></ul>
<a href="">Manage security reports and alerts</a>
<ul><li>manage service assurance dashboard<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/service-assurance">Service assurance in the Security & Compliance Center</a></li></ul></li><li>manage tracing and reporting on Azure AD Identity Protection<ul><li><a href="https://docs.microsoft.com/en-us/cloud-app-security/tutorial-ueba">Tutorial: Investigate risky users</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection">What is Azure Active Directory Identity Protection?</a></li></ul></li><li>configure and manage Microsoft 365 security alerts<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/alerts">Alerts in the Office 365 Security & Compliance Center</a></li></ul></li><li>configure and manage Azure Identity Protection dashboard and alerts<ul><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-security-overview">Azure Active Directory Identity Protection – Security overview</a></li><li><a href="https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock">Remediate risks and unblock users </a></li></ul></li></ul>
<h2>Manage Microsoft 365 governance and compliance (35-40%)</h2>
<a href="">Configure Data Loss Prevention (DLP)</a>
<ul><li>configure DLP Policies<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-dlp-policy-recommendations">Get started with DLP policy recommendations</a></li></ul></li><li>design data retention policies in Microsoft 365<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/retention-policies">Overview of retention policies</a></li></ul></li><li>manage DLP exceptions<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/view-the-dlp-reports">View the reports for data loss prevention</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/what-the-dlp-functions-look-for">What the DLP functions look for</a></li></ul></li><li>monitor and manage DLP policy matches<ul><li><a style="color: #000000;" href="https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp-policy">Create, test, and tune a DLP policy</a></li></ul></li></ul>
<a href="">Implement Azure Information Protection (AIP)</a>
<ul><li>plan AIP solution<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/deployment-roadmap">Azure Information Protection deployment roadmap</a></li><li><a href="https://azure.microsoft.com/en-us/services/information-protection/">Azure Information Protection</a></li></ul></li><li>plan for deployment On-Prem rights management Connector<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/deploy-rms-connector">Deploying the Azure Rights Management connector</a></li><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/install-configure-rms-connector">Installing and configuring the Azure Rights Management connector</a></li></ul></li><li>plan for Windows information Protection (WIP) implementation<ul><li><a href="https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/overview-create-wip-policy">Create a Windows Information Protection (WIP) policy using Microsoft Intune</a></li></ul></li><li>plan for classification labeling<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/quickstart-label-dnf-protectedemail">Quickstart: Configure a label for users to easily protect emails that contain sensitive information</a></li></ul></li><li>configure Information Rights Management (IRM) for Workloads<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/compare-on-premise">Comparing Azure Information Protection and AD RMS</a></li></ul></li><li>configure Super User<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/configure-super-users">Configuring super users for Azure Information Protection and discovery services or data recovery</a></li></ul></li><li>deploy AIP Clients<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/configure-client">Azure Information Protection client: Installation and configuration for clients</a></li><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/rms-client/use-client">The client side of Azure Information Protection</a></li></ul></li><li>implement Azure Information Protection policies<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/configure-policy">Configuring the Azure Information Protection policy</a></li></ul></li><li>implement AIP tenant key<ul><li><a href="https://docs.microsoft.com/en-us/azure/information-protection/plan-implement-tenant-key">Planning and implementing your Azure Information Protection tenant key </a></li></ul></li></ul>
<a href="">Manage data governance</a>
<ul><li>configure and configure information retention<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/retention-policies">Overview of retention policies</a></li></ul></li><li>plan for Microsoft 365 backup<ul><li><a href="https://docs.microsoft.com/en-us/office365/admin/subscriptions-and-billing/back-up-data-before-switching-plans?view=o365-worldwide">Back up data before switching Office 365 for business plans</a></li></ul></li><li>plan for restoring deleted content<ul><li>Exchange<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/inactive-mailboxes-in-office-365">Overview of inactive mailboxes in Office 365</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/restore-an-inactive-mailbox">Restore an inactive mailbox in Office 365</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/recover-an-inactive-mailbox">Recover an inactive mailbox in Office 365</a></li></ul></li><li>SharePoint<ul><li><a href="https://support.office.com/en-us/article/restore-items-in-the-recycle-bin-of-a-sharepoint-site-6df466b6-55f2-4898-8d6e-c0dff851a0be">Restore items in the Recycle Bin of a SharePoint site</a></li><li><a href="https://support.office.com/en-us/article/restore-deleted-items-from-the-site-collection-recycle-bin-5fa924ee-16d7-487b-9a0a-021b9062d14b">Restore deleted items from the site collection recycle bin</a></li><li><a href="https://docs.microsoft.com/en-us/sharepoint/restore-deleted-site-collection">Restore deleted sites</a></li></ul></li><li>OneDrive<ul><li><a href="https://support.office.com/en-us/article/restore-your-onedrive-fa231298-759d-41cf-bcd0-25ac53eb8a15">Restore your OneDrive </a></li></ul></li></ul></li></ul>
<a href="">Manage auditing</a>
<ul><li>configure audit log retention<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/turn-audit-log-search-on-or-off">Turn Office 365 audit log search on or off</a></li><li><a href="https://docs.microsoft.com/en-us/Exchange/permissions-exo/permissions-exo">Permissions in Exchange Online</a></li></ul></li><li>configure audit policy<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security">Configure your Office 365 tenant for increased security</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/enable-mailbox-auditing">Manage mailbox auditing</a></li></ul></li><li>monitor Unified Audit Logs<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance">Search the audit log in the Security & Compliance Center </a></li></ul></li></ul>
<a href="">Manage eDiscovery</a>
<ul><li>search content by using Security and Compliance Center<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/content-search">Content Search in Office 365</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/csv-file-for-an-id-list-content-search">Prepare a CSV file for an ID list Content Search in Office 365</a></li></ul></li><li>plan for in-place and legal hold<ul><li><a href="https://docs.microsoft.com/en-us/exchange/security-and-compliance/in-place-and-litigation-holds">In-Place Hold and Litigation Hold</a></li><li><a href="https://docs.microsoft.com/en-us/Exchange/policy-and-compliance/holds/litigation-holds?view=exchserver-2019">Place a mailbox on Litigation Hold</a></li></ul></li><li>configure eDiscovery<ul><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery-cases">eDiscovery cases in the Security & Compliance Center</a></li><li><a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/assign-ediscovery-permissions">Assign eDiscovery permissions in the Security & Compliance Center </a></li></ul></li></ul>
<h2 style="text-align: right;">Make room on your shelf</h2><p style="text-align: right;">Check out these two MS-101 exam prep books. The first is written by Nate Chamberlain.</p>
<iframe style="width:120px;height:240px;" marginwidth="0" marginheight="0" scrolling="no" frameborder="0" src="//ws-na.amazon-adsystem.com/widgets/q?ServiceVersion=20070822&OneJS=1&Operation=GetAdHtml&MarketPlace=US&source=ss&ref=as_ss_li_til&ad_type=product_link&tracking_id=sharepointlib-20&language=en_US&marketplace=amazon&region=US&placement=1838984658&asins=1838984658&linkId=3d5fa94fe0913a205caf6cbd12a82093&show_border=true&link_opens_in_new_window=true"></iframe>
<iframe style="width:120px;height:240px;" marginwidth="0" marginheight="0" scrolling="no" frameborder="0" src="//ws-na.amazon-adsystem.com/widgets/q?ServiceVersion=20070822&OneJS=1&Operation=GetAdHtml&MarketPlace=US&source=ss&ref=as_ss_li_til&ad_type=product_link&tracking_id=sharepointlib-20&language=en_US&marketplace=amazon&region=US&placement=0135574897&asins=0135574897&linkId=c5385c3dfd4313dc47853684718ecc78&show_border=true&link_opens_in_new_window=true"></iframe>
Leave a Reply