Late last month MS-500 got a minor update, so let’s focus on what’s new. Most of the changes are really just naming updates, good news for those of you who have already been preparing.
This is a very broad exam, and if you are attempting it without having completed exams MS-100, MS-101 and MD-101, it is going to make this exam tougher. Why? Each of those three exams covers something that this exam includes, and it means that by the time you get to this exam after the ones I just mentioned you are mostly doing revision rather than learning lots of new things. Plenty of people do get through this exam without doing the others first, because perhaps that’s all that they want or need for work related purposes, but if you are struggling with the breadth of what this exam includes, it might be worth at least going through the prep material for those exams to fill in some of the fundamentals this exam expects you to know.
Implement and manage identity and access (35-40%)
Secure Microsoft 365 hybrid environments
- plan Azure AD authentication options
- plan Azure AD synchronization options
- monitor and troubleshoot Azure AD Connect events
Secure Identities
- implement Azure AD membership
- implement password management
- manage external identities in Azure AD and Microsoft 365 workloads
Implement authentication methods
- implement multi-factor authentication (MFA) by using conditional access policy
- manage and monitor MFA
- plan and implement device authentication methods like Windows Hello
Implement conditional access
- plan for compliance and conditional access policies
- configure and manage device compliance policies
- implement and manage conditional access
- test and troubleshoot conditional access policies
Implement roles and role groups
- plan for roles and role groups
- configure roles and role groups
- audit roles for least privileged access
Configure and manage identity governance
- implement Azure AD Privileged Identity Management
- implement and manage entitlement management
- implement and manage access reviews
Implement Azure AD Identity Protection
- implement user risk policy
- implement sign-in risk policy
- configure Identity Protection alerts
- review and respond to risk events
Implement and manage threat protection (25-30%)
Implement an enterprise hybrid threat protection solution
- plan an Microsoft Defender for Identity solution
- install and configure Microsoft Defender for Identity
- monitor and manage Microsoft Defender for Identity
Implement device threat protection
- plan a Microsoft Defender for Endpoint solution
- implement Microsoft Defender for Endpoint
- manage and monitor Microsoft Defender for Endpoint
Implement and manage device and application protection
- plan for device and application protection
- configure and manage Windows Defender Application Guard
- configure and manage Windows Defender Application Control
- configure and manage exploit protection
- configure and manage Windows device encryption
- configure and manage non-Windows device encryption
- plan for securing applications data on devices
- implement application protection policies
- configure and manage device compliance for endpoint security
Implement and manage Microsoft Defender for Office 365
- configure Microsoft Defender for Office 365
- monitor for and remediate threats using Microsoft Defender for Office 365
- conduct simulated attacks using Attack Simulator
Monitor Microsoft 365 Security with Microsoft Sentinel
- plan and implement Microsoft Sentinel
- configure playbooks in Microsoft Sentinel
- manage and monitor with Microsoft Sentinel
- respond to threats using built-in playbooks in Microsoft Sentine;
Implement and manage Microsoft Defender for Cloud Apps
- plan Defender for Cloud Apps implementation
- configure Microsoft Defender for Cloud Apps
- manage cloud app discovery
- manage entries in the Cloud app catalog
- manage apps in Defender for Cloud Apps
- manage Microsoft Defender for Cloud Apps
- configure Defender for Cloud Apps connectors and Oauth apps
- configure Defender for Cloud Apps policies and templates
- review, interpret and respond to Defender for Cloud Apps alerts, reports, dashboards and logs
Implement and manage information protection (10-15%)
Manage sensitive information
- plan a sensitivity label solution
- create and manage sensitive information types
- configure sensitivity labels and policies
- configure and use Activity Explorer
- use sensitivity labels with Teams, SharePoint, OneDrive and Office apps
Manage Data Loss Prevention (DLP)
- plan a DLP solution
- create and manage DLP policies for Microsoft 365 workloads
- create and manage sensitive information types
- monitor DLP reports
- manage DLP notifications
- implement Endpoint DLP
Manage data governance and retention
- plan for data governance and retention
- review and interpret data governance reports and dashboards
- configure retention policies
- define data governance event types
- define and manage communication compliance policies
- configure Information holds
- find and recover deleted Office 365 data
- configure data archiving
- manage inactive mailboxes
Manage governance and compliance features in Microsoft 365 (20-25%)
Configure and analyze security reporting
- monitor and manage device security status using Microsoft Endpoint Manager Admin Center.
- manage and monitor security reports and dashboards using Microsoft 365 Defender portal
- plan for custom security reporting with Graph Security API
- use secure score dashboards to review actions and recommendations
Manage and analyze audit logs and reports
- plan for auditing and reporting
- perform audit log search
- review and interpret compliance reports and dashboards
- configure alert policies
Discover and respond to compliance queries in Microsoft 365
- plan for content search and eDiscovery
- delegate permissions to use search and discovery tools
- use search and investigation tools to discover and respond
- manage eDiscovery cases
Manage regulatory compliance
- plan for regulatory compliance in Microsoft 365
- manage Data Subject Requests (DSRs)
- administer Compliance Manager in Microsoft 365 compliance center
- Use Compliance Manager
- Assign and complete improvement actions
Manage insider risk solutions in Microsoft 365
- implement and manage Customer Lockbox
- implement and manage communication compliance policies
- implement and manage Insider risk management policies
- implement and manage information barrier policies
- implement and manage privileged access management