🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 2
Domain 2 — Module 4 of 7 57%
12 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 2: Implement and Manage Microsoft Entra Identity and Access Premium ⏱ ~15 min read

Authentication Methods and Self-Service Password Reset

Implement and manage modern authentication methods — from passwordless to MFA — and configure SSPR to reduce help desk calls.

Authentication at the Expert level

☕ Simple explanation

You already know what MFA is. At the Expert level, the question is: how do you deploy the RIGHT authentication methods across 20,000 users with different devices, roles, and risk profiles?

Think of it like a building with multiple entrances. Some doors need a key card (password), some need a fingerprint (biometric), some need both (MFA), and some need a special badge that only works during business hours (conditional). Your job is designing which doors use which locks — and making sure everyone can get in without calling security every five minutes.

Microsoft Entra ID supports multiple authentication methods, managed centrally through the Authentication methods policy in the Entra admin center. At the Expert level, you need to understand:

  • Which methods are phishing-resistant (FIDO2, Windows Hello, certificate-based)
  • How to target methods to groups (not every method for every user)
  • The migration from per-user MFA to Conditional Access-based MFA
  • How SSPR registration converges with MFA registration
  • How to troubleshoot authentication failures

Authentication methods landscape

MethodSecurity LevelPhishing ResistantBest For
Password onlyLowNoLegacy — being eliminated
Password + SMS OTPMediumNoTransition — better than password only, but SMS can be intercepted
Password + Authenticator pushGoodNoStandard MFA for most organisations
Authenticator passwordlessStrongNoUsers who want phone-based passwordless
FIDO2 security keyVery strongYesHigh-security roles, shared workstations
Windows Hello for BusinessVery strongYesCorporate-managed Windows devices
Certificate-based authVery strongYesGovernment, regulated industries, smart cards
PasskeysVery strongYesFuture standard — device-bound or synced

Configuring authentication methods

Authentication methods are managed in Entra admin center > Protection > Authentication methods > Policies.

Each method can be:

  • Enabled for all users or targeted to specific groups
  • Configured with method-specific settings (e.g., FIDO2 key restrictions, Authenticator number matching)

Priya’s authentication strategy for GlobalReach:

User GroupPrimary MethodSecondary MethodWhy
ExecutivesWindows Hello for BusinessFIDO2 key (backup)Phishing-resistant, high-value targets
Office workersMicrosoft Authenticator (passwordless)SMS (fallback only)Balance of security and usability
Frontline workersFIDO2 security keysAuthenticator pushShared devices, can’t use biometrics
External contractorsAuthenticator push (with number matching)Email OTPB2B guests use their own devices
💡 Exam tip: Number matching is now mandatory

Microsoft Authenticator push notifications now require number matching by default — the user must enter a number displayed on the sign-in screen into the Authenticator app. This prevents MFA fatigue attacks where attackers spam push notifications hoping the user approves one.

The exam may ask: “How does Priya prevent MFA fatigue attacks?” → Number matching is already enforced by default on Authenticator push notifications.

Self-Service Password Reset (SSPR)

SSPR lets users reset their own passwords without calling the help desk. At 20,000 users, this is essential — Priya estimates it reduces help desk tickets by 30-40%.

SSPR configuration

SettingOptionsRecommendation
Enabled forNone, Selected group, AllAll users (after pilot with selected group)
Authentication methods required1 or 2 methods2 methods (more secure)
Methods availableEmail, phone, security questions, Authenticator, FIDO2Email + Authenticator (avoid security questions)
Registration enforcementRequire registration at sign-inYes — force users to register methods
Registration reconfirmationDays before re-confirmation180 days
Password writebackWrite reset passwords back to on-prem ADEnable (requires Entra Connect or Cloud Sync)

Password writeback

In hybrid environments, SSPR needs to write the new password back to on-premises AD. Without writeback:

  • User resets password in the cloud
  • Cloud password changes
  • On-prem password stays the same
  • User has two different passwords — chaos

Password writeback solves this by synchronising the new cloud password back to AD. It’s configured in the sync tool (Connect Sync or Cloud Sync) and works with password hash sync, pass-through authentication, and AD FS federation.

ℹ️ Deep dive: Combined SSPR and MFA registration

Microsoft now uses combined registration — users register for both SSPR and MFA in a single experience. When a user signs in for the first time (or is prompted to register), they set up methods that work for both:

  • Microsoft Authenticator → works for MFA push AND SSPR verification
  • Phone number → works for MFA SMS/call AND SSPR phone verification
  • Email → works for SSPR only (not MFA)

Combined registration is enabled by default. The exam may ask where to manage it: Entra admin center > Protection > Authentication methods > Registration > Combined registration.

Key concepts to remember

Question

Name three phishing-resistant authentication methods supported by Microsoft Entra ID.

Click or press Enter to reveal answer

Answer

1. FIDO2 security keys, 2. Windows Hello for Business, 3. Certificate-based authentication. Passkeys are also phishing-resistant. These methods use cryptographic proof that can't be intercepted or replayed by attackers.

Click to flip back

Question

What is password writeback and why is it needed?

Click or press Enter to reveal answer

Answer

Password writeback synchronises passwords reset in the cloud back to on-premises AD. Without it, a user who resets their password via SSPR would have different passwords for cloud and on-prem. Requires Connect Sync or Cloud Sync. Works with password hash sync, pass-through authentication, and AD FS.

Click to flip back

Question

What is combined registration in Microsoft Entra?

Click or press Enter to reveal answer

Answer

A unified registration experience where users set up authentication methods for both MFA and SSPR at the same time. Methods like Microsoft Authenticator work for both. This is enabled by default and reduces the number of registration prompts users receive.

Click to flip back

Knowledge check

Knowledge Check

Priya enables SSPR for all GlobalReach users with password writeback. A user in Singapore resets their password via the cloud portal, but their on-premises AD password doesn't change. What should Priya check?

Knowledge Check

Elena wants to enforce phishing-resistant authentication for MedGuard Health's administrators who access sensitive patient data systems. Which authentication method should she require?

🎬 Video coming soon


Next up: Password Protection and Authentication Troubleshooting — banning weak passwords and diagnosing sign-in failures.

← Previous

Monitor and Troubleshoot Identity Sync

Next →

Password Protection and Authentication Troubleshooting

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.