πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 1
Domain 1 β€” Module 7 of 8 88%
7 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 1: Deploy and Manage a Microsoft 365 Tenant Premium ⏱ ~16 min read

Roles, Role Groups and Workload Permissions

Implement least-privilege administration across Microsoft 365, Entra ID, Defender XDR, Purview, Exchange, SharePoint, and Teams using built-in and custom roles.

Least privilege across the M365 stack

β˜• Simple explanation

Not every admin needs the keys to every room. The art of role management is giving people exactly enough access to do their job β€” and nothing more.

Imagine a hospital: the surgeon needs operating theatre access, the pharmacist needs the medicine cabinet, and the receptionist needs the front desk system. Nobody needs all three. That’s least privilege β€” and in Microsoft 365, you implement it through roles and role groups across multiple admin portals.

The tricky part? Microsoft 365 has MULTIPLE role systems: Entra ID roles, M365 admin roles, Exchange role groups, Defender permissions, and Purview role groups. They overlap, interact, and sometimes confuse even experienced admins.

Microsoft 365 uses a layered RBAC (Role-Based Access Control) model where permissions are granted through roles at multiple levels:

  • Microsoft Entra ID roles β€” tenant-wide roles (Global Admin, User Admin, etc.) that control Entra and M365 admin center access
  • Microsoft 365 workload roles β€” service-specific roles (Exchange Admin, SharePoint Admin, Teams Admin) assigned in Entra but scoped to one workload
  • Exchange Online role groups β€” granular Exchange permissions (Organization Management, Help Desk, etc.) managed in the Exchange admin center
  • Microsoft Defender XDR roles β€” unified security roles in the Microsoft Defender portal
  • Microsoft Purview role groups β€” compliance roles in the Purview compliance portal

The exam tests your ability to select the right role from the right system for a given scenario β€” and to understand where they intersect.

Entra ID built-in roles (most common)

RoleWhat It ControlsCommon Use
Global AdministratorEverything β€” all services, all settingsBreak-glass accounts only (max 2-4)
User AdministratorCreate/manage users, reset passwords, manage groupsHelp desk leads, user provisioning teams
Licence AdministratorAssign/remove licencesTeams handling licence requests
Exchange AdministratorExchange Online settings, mailboxes, mail flowEmail team
SharePoint AdministratorSharePoint/OneDrive settings, sites, storageCollaboration team
Teams AdministratorTeams settings, policies, voice configurationTeams/UC team
Security AdministratorSecurity settings across Defender, Entra, PurviewSecurity operations team
Compliance AdministratorPurview compliance features, DLP, retentionCompliance team
Privileged Role AdministratorManage Entra role assignments and PIM policiesIdentity governance team
Global ReaderRead-only access to everythingAuditors, reporting, oversight
πŸ’‘ Exam tip: Global Admin is almost never the right answer

When the exam asks β€œWhich role should Elena assign to…” the answer is almost never Global Administrator. The exam rewards least-privilege thinking:

  • Need to manage mailboxes? β†’ Exchange Administrator
  • Need to configure DLP? β†’ Compliance Administrator
  • Need to investigate security incidents? β†’ Security Administrator or Security Operator
  • Need to manage Conditional Access? β†’ Conditional Access Administrator
  • Need to read everything for an audit? β†’ Global Reader

If you find yourself selecting Global Admin, re-read the question β€” there’s almost certainly a more specific role.

Workload-specific role groups

Exchange Online role groups

Exchange has its own RBAC system in the Exchange admin center:

Role GroupAccessManaged In
Organization ManagementFull Exchange adminExchange admin center
Recipient ManagementManage mailboxes, groups, contactsExchange admin center
Help DeskView and reset passwords, manage recipientsExchange admin center
Compliance ManagementIn-place eDiscovery, journaling, transport rulesExchange admin center

Microsoft Defender XDR roles

The unified Defender portal (security.microsoft.com) uses its own permission model:

Role/Role GroupAccessPurpose
Security AdministratorFull security configManage Defender policies, alerts, settings
Security OperatorInvestigate and respondManage incidents, run investigations, approve actions
Security ReaderRead-only security dataView incidents, alerts, reports without modification
Attack Simulation AdministratorManage attack simulationsCreate and manage phishing simulations (Defender for Office 365)

Microsoft Purview role groups

Role GroupAccessPurpose
Compliance AdministratorFull Purview adminDLP, retention, sensitivity labels, compliance settings
Compliance Data AdministratorData-related complianceContent search, data classification, data connectors
eDiscovery ManagereDiscovery casesCreate cases, run searches, place holds
Information Protection AdminLabels and encryptionSensitivity labels, Azure Information Protection
Records ManagementRecords and retentionRetention labels, file plans, disposition
ℹ️ Deep dive: How Entra roles and workload roles interact

Here’s the key insight for the exam: Entra ID roles and workload role groups are separate permission systems, but some Entra roles grant permissions in workloads:

  • Global Administrator (Entra) β†’ has full access to ALL workloads (Exchange, Defender, Purview, etc.)
  • Exchange Administrator (Entra) β†’ maps to Organization Management in Exchange
  • Security Administrator (Entra) β†’ grants permissions in both Defender portal and Purview

However, Exchange role groups, Defender custom roles, and Purview role groups can grant permissions that no Entra role provides. For example:

  • eDiscovery Manager (Purview) gives case-level search authority that no Entra role grants
  • Attack Simulation Administrator (Defender) is a purpose-built role not available in Entra

When the exam asks which role to use, consider whether the task is tenant-wide (Entra role) or workload-specific (workload role group).

Elena’s least-privilege design for MedGuard Health

Elena designs the role structure for MedGuard Health’s admin team:

AdminEntra RoleWorkload Role GroupWhy
Elena (Security Ops Lead)Security AdministratorDefender: Security OperatorInvestigate incidents, manage security policies
Compliance OfficerCompliance AdministratorPurview: eDiscovery ManagerManage DLP, retention, run eDiscovery cases
Help Desk (3 staff)Helpdesk AdministratorExchange: Help DeskPassword resets, basic user support
IT ManagerUser Administratorβ€”Create users, manage groups, no security/compliance
External AuditorGlobal ReaderPurview: Compliance Data Administrator (read)View everything, modify nothing

She avoids assigning Global Admin to anyone except two break-glass accounts stored in a physical safe.

Key concepts to remember

Question

Name three Entra ID roles more specific than Global Administrator for common admin tasks.

Click or press Enter to reveal answer

Answer

1. Exchange Administrator β€” manage Exchange Online. 2. Security Administrator β€” manage security across Defender and Purview. 3. User Administrator β€” create/manage users and groups. Always choose the most specific role that covers the required tasks.

Click to flip back

Question

Where are Microsoft Defender XDR permissions managed?

Click or press Enter to reveal answer

Answer

In the Microsoft Defender portal (security.microsoft.com) under Settings > Permissions. Key roles: Security Administrator (full config), Security Operator (investigate and respond), Security Reader (view only), Attack Simulation Administrator (manage phishing sims).

Click to flip back

Question

What is the relationship between the Entra 'Exchange Administrator' role and Exchange Online role groups?

Click or press Enter to reveal answer

Answer

The Entra Exchange Administrator role maps to the Organization Management role group in Exchange Online. Assigning Exchange Administrator in Entra gives the user full Exchange admin rights. For more granular Exchange permissions, use Exchange-specific role groups like Recipient Management or Help Desk.

Click to flip back

Question

Which role should you assign for someone who only needs to manage eDiscovery cases in Purview?

Click or press Enter to reveal answer

Answer

The eDiscovery Manager role group in Microsoft Purview. This is a workload-specific role β€” no Entra ID role provides equivalent targeted eDiscovery permissions. Don't assign Compliance Administrator if only eDiscovery is needed.

Click to flip back

Knowledge check

Knowledge Check

Elena needs to give an external auditor read-only access to view security incidents in Defender XDR, compliance reports in Purview, and user lists in Entra β€” without the ability to modify anything. Which single Entra role achieves this?

Knowledge Check

Dev's client wants their compliance team to manage only DLP policies and sensitivity labels, without access to eDiscovery or security incident management. Which approach follows least privilege?

🎬 Video coming soon


Next up: Delegate with Administrative Units and PIM β€” scoping admin powers to specific departments and activating roles only when needed.

← Previous

Automate with PowerShell: Bulk User Operations

Next β†’

Delegate with Administrative Units and PIM

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.