🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AB-900 Domain 1
Domain 1 — Module 10 of 10 100%
10 of 28 overall

AB-900 Study Guide

Domain 1: M365 Core Features & Objects

  • Welcome to Microsoft 365
  • Exchange Online: Mailboxes & Distribution
  • SharePoint: Sites, Libraries & Permissions
  • Microsoft Teams: Teams, Channels & Policies
  • Users, Groups & Licensing
  • Zero Trust: Never Trust, Always Verify
  • Authentication: Passwords, MFA & Beyond
  • Microsoft Defender XDR
  • Microsoft Entra: Your Identity Hub
  • PIM, Audit Logs & Identity Governance

Domain 2: Data Protection & Governance

  • Microsoft Purview: The Big Picture
  • Sensitivity Labels & Data Classification
  • Data Loss Prevention (DLP)
  • Insider Risk & Communication Compliance
  • DSPM for AI & Data Lifecycle
  • How Copilot Accesses Your Data
  • Responsible AI Principles
  • Compliance Manager & eDiscovery
  • Activity Explorer & Data Monitoring
  • Oversharing in SharePoint

Domain 3: Copilot & Agent Admin

  • What is Microsoft 365 Copilot? Free
  • What Are Agents? Free
  • Copilot vs Agents: When to Use Which Free
  • Copilot Licensing: Monthly vs Pay-as-You-Go Free
  • Researcher, Analyst & Real-World Use Cases Free
  • Managing Copilot: Billing, Monitoring & Prompts Free
  • Building Agents: Create, Test & Publish Free
  • Agent Lifecycle: Access, Approval & Monitoring Free

AB-900 Study Guide

Domain 1: M365 Core Features & Objects

  • Welcome to Microsoft 365
  • Exchange Online: Mailboxes & Distribution
  • SharePoint: Sites, Libraries & Permissions
  • Microsoft Teams: Teams, Channels & Policies
  • Users, Groups & Licensing
  • Zero Trust: Never Trust, Always Verify
  • Authentication: Passwords, MFA & Beyond
  • Microsoft Defender XDR
  • Microsoft Entra: Your Identity Hub
  • PIM, Audit Logs & Identity Governance

Domain 2: Data Protection & Governance

  • Microsoft Purview: The Big Picture
  • Sensitivity Labels & Data Classification
  • Data Loss Prevention (DLP)
  • Insider Risk & Communication Compliance
  • DSPM for AI & Data Lifecycle
  • How Copilot Accesses Your Data
  • Responsible AI Principles
  • Compliance Manager & eDiscovery
  • Activity Explorer & Data Monitoring
  • Oversharing in SharePoint

Domain 3: Copilot & Agent Admin

  • What is Microsoft 365 Copilot? Free
  • What Are Agents? Free
  • Copilot vs Agents: When to Use Which Free
  • Copilot Licensing: Monthly vs Pay-as-You-Go Free
  • Researcher, Analyst & Real-World Use Cases Free
  • Managing Copilot: Billing, Monitoring & Prompts Free
  • Building Agents: Create, Test & Publish Free
  • Agent Lifecycle: Access, Approval & Monitoring Free
Domain 1: M365 Core Features & Objects Premium ⏱ ~12 min read

PIM, Audit Logs & Identity Governance

Privileged Identity Management limits who has admin power and when. Audit logs track who did what. Identity Secure Score tells you how well you're doing. Together, they keep your tenant safe.

Why identity governance matters

☕ Simple explanation

Think of admin roles like master keys in a building.

The more master keys floating around, the higher the risk that one gets lost, stolen, or misused. PIM says: “Don’t give anyone a permanent master key. Instead, give them a temporary key that works for 4 hours, then automatically stops working.”

Audit logs are the security camera recordings — who opened which door, when, and why.

Identity Secure Score is the safety inspector’s report — “You’re doing well on door locks, but you need to add cameras in the parking garage.”

Privileged Identity Management (PIM) provides just-in-time, time-bound, approval-based access to privileged roles. Instead of permanent Global Admin assignments, users activate roles when needed and they auto-expire.

Audit logs in Microsoft Entra record all identity-related activities — sign-ins, role changes, policy modifications, app consent events. They’re essential for compliance, investigations, and incident response.

Identity Secure Score is a metric (0-100%) in the Entra admin center that measures how well your identity configuration aligns with Microsoft’s security recommendations. It provides prioritised improvement actions.

Privileged Identity Management (PIM)

PIM solves a critical problem: standing admin access is a security risk.

Licensing note: PIM requires Microsoft Entra ID P2 or Entra ID Governance. It’s included in M365 E5 but not E3.

How PIM works

StepWhat Happens
1. EligibleUser is made “eligible” for a role (e.g., Global Admin) — but doesn’t have it yet
2. ActivateUser requests activation when needed — provides justification
3. Approve (optional)Another admin approves the request
4. ActiveRole is active for a limited time (e.g., 4 hours)
5. ExpireRole automatically deactivates — no manual cleanup needed
Standing admin access vs PIM
FeatureWithout PIMWith PIM
Admin accessPermanent — 24/7/365Time-limited — activated when needed
If account compromisedAttacker has full admin power immediatelyAttacker gets basic user access (admin role not active)
AccountabilityHard to track who used admin powersEvery activation is logged with justification
Stale accountsOld admins keep access foreverUnused eligible roles get flagged for review
Zero Trust alignmentViolates least privilegeImplements least privilege + assume breach
💡 Scenario: Maya uses PIM at Northwave

Maya is eligible for Global Admin but doesn’t have it permanently:

  1. Normal day: Maya has User Admin + License Admin (enough for daily work)
  2. Emergency: A critical config change needs Global Admin → Maya opens PIM → requests activation → enters justification: “Emergency: Fix broken CA policy blocking all sign-ins”
  3. Approval: Jordan (CISO) gets a notification → approves the request
  4. Active for 4 hours: Maya makes the fix → role auto-deactivates after 4 hours
  5. Logged: The full activation chain (request, justification, approval, actions taken) is in the audit log

If Maya’s account is compromised on a normal day, the attacker only gets User Admin — NOT Global Admin.

Audit logs — who did what, when

Microsoft Entra provides two types of logs:

LogWhat It RecordsWhere
Sign-in logsEvery sign-in attempt (success/failure), device, location, CA policy appliedEntra → Monitoring → Sign-in logs
Audit logsAdmin actions: role changes, user creation, policy changes, app consentEntra → Monitoring → Audit logs

What admins use logs for

  • Troubleshooting: “Why can’t this user sign in?” → check sign-in logs for the failure reason
  • Security investigation: “Did someone access data they shouldn’t?” → cross-reference sign-in + audit logs
  • Compliance: “Prove that only authorised admins made changes” → audit log shows who, what, when
  • PIM audit: “Who activated Global Admin this month?” → PIM activity in audit logs
💡 Exam tip: sign-in logs vs audit logs

Sign-in logs = AUTHENTICATION events (who tried to sign in, did it work, what blocked it) Audit logs = ADMIN events (who changed what configuration, created what user, consented to what app)

If the question is about “why can’t they sign in?” → sign-in logs. If the question is about “who changed this policy?” → audit logs.

Identity Secure Score

Identity Secure Score measures your identity security posture:

  • Found in Entra admin center → Protection → Identity Secure Score (or Defender portal)
  • Score based on recommended actions (e.g., “Enable MFA for all admins”, “Block legacy authentication”)
  • Each recommendation shows impact, effort, and status
  • Higher score = better security posture

Common recommendations

ActionImpact
Enable MFA for all usersHigh
Block legacy authenticationHigh
Require MFA for admin rolesHigh
Enable Self-Service Password ResetMedium
Set passwords to never expire (with MFA)Medium
Remove standing admin access (use PIM)High

Key exam concept: Identity Secure Score is a RECOMMENDATION dashboard, not an enforcement tool. It tells you what to improve but doesn’t make changes for you. Compare with Compliance Manager (Domain 2) which does the same for compliance.

🎬 Video walkthrough

🎬 Video coming soon

PIM, Audit Logs & Governance — AB-900 Module 10

PIM, Audit Logs & Governance — AB-900 Module 10

~11 min

Flashcards

Question

What is Privileged Identity Management (PIM)?

Click or press Enter to reveal answer

Answer

PIM provides just-in-time, time-bound, approval-based access to privileged roles. Users are 'eligible' for roles but only 'activate' them when needed — with justification, optional approval, and automatic expiry.

Click to flip back

Question

What's the difference between sign-in logs and audit logs in Entra?

Click or press Enter to reveal answer

Answer

Sign-in logs record authentication events (who tried to sign in, success/failure, what blocked it). Audit logs record admin/configuration events (who changed a policy, created a user, consented to an app).

Click to flip back

Question

What is Identity Secure Score?

Click or press Enter to reveal answer

Answer

A metric in Microsoft Entra that measures your identity security posture based on Microsoft's recommendations. It shows what to improve (enable MFA, block legacy auth, use PIM) but doesn't enforce changes — it's a dashboard, not a policy.

Click to flip back

Knowledge Check

Knowledge Check

Clearfield Council's security policy requires that Global Admin access is never permanently assigned. Which Microsoft Entra feature satisfies this requirement?

Knowledge Check

Maya notices a user's account was used to grant admin consent to a suspicious third-party app at 3 AM. Where should she investigate this activity?


🎉 Congratulations! You’ve completed all 10 modules in Domain 1: M365 Core Features & Objects. You now understand the M365 ecosystem, admin centers, security foundations, and identity governance.

Next: Continue to Domain 2 (Data Protection & Governance) to complete your AB-900 preparation.

← Previous

Microsoft Entra: Your Identity Hub

Next →

Microsoft Purview: The Big Picture

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.