🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 2
Domain 2 — Module 6 of 7 86%
14 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 2: Implement and Manage Microsoft Entra Identity and Access Premium ⏱ ~15 min read

Entra Identity Protection and Risk Policies

Plan and implement Microsoft Entra Identity Protection to detect risky sign-ins, flag compromised users, and automate risk-based responses.

Automated identity threat detection

☕ Simple explanation

Identity Protection is like a credit card fraud department for your user accounts.

When your bank sees a transaction from a country you’ve never visited, they flag it and may block the card. Identity Protection does the same for sign-ins — when a user suddenly signs in from an unusual location, an anonymous IP, or a device with malware, the system detects the risk and responds automatically (require MFA, block access, or force a password change).

You don’t wait for help desk calls to find compromised accounts. The system finds them for you.

Microsoft Entra Identity Protection (requires Entra ID P2) uses Microsoft’s threat intelligence to detect two categories of risk:

  • Sign-in risk — the probability that a specific sign-in attempt was not performed by the legitimate user (detected in real-time or offline)
  • User risk — the probability that a user’s account has been compromised (accumulated over time)

Risk signals feed into risk-based Conditional Access policies that automate responses: require MFA for medium-risk sign-ins, force password change for high-risk users, or block access entirely.

Two types of risk

Sign-in Risk vs User Risk
FeatureSign-in RiskUser Risk
What it measuresLikelihood this specific sign-in is illegitimateLikelihood the user's account is compromised
Detection timingReal-time (during sign-in) or offlineAccumulated over time from multiple signals
Example signalsAnonymous IP, impossible travel, malware-linked IPLeaked credentials, anomalous user activity, suspicious sending patterns
Risk levelsNone, Low, Medium, HighNone, Low, Medium, High
Typical responseRequire MFA for medium+, block for highForce password change for medium+, block for high
Self-remediationComplete MFA to prove identityChange password to prove account control

Risk detection signals

Sign-in risk detections

DetectionWhat It MeansReal-time or Offline
Anonymous IP addressSign-in from Tor, VPN, or known anonymiserReal-time
Atypical travelSign-in from a location unusual for the userOffline
Impossible travelSign-ins from two locations too far apart for travel timeOffline
Malware-linked IPSign-in from an IP known to communicate with bot serversOffline
Unfamiliar sign-in propertiesSign-in with properties not seen before for the userReal-time
Password sprayMultiple accounts targeted with common passwordsOffline
Anomalous tokenToken with unusual characteristicsReal-time

User risk detections

DetectionWhat It Means
Leaked credentialsUser’s credentials found in a known data breach (dark web monitoring)
Anomalous user activityUnusual patterns in user behaviour
Suspicious sending patternsMailbox sending spam or phishing (may indicate compromised account)
User reported suspicious activityUser denies MFA prompt they didn’t initiate

Implementing risk-based policies

Elena designs Identity Protection for MedGuard Health using Conditional Access policies with risk conditions:

Policy 1: Sign-in risk policy

  • Condition: Sign-in risk = Medium or High
  • Grant: Require multi-factor authentication
  • Effect: Risky sign-ins must prove identity with MFA. Legitimate users complete MFA and continue. Attackers are blocked.

Policy 2: User risk policy

  • Condition: User risk = High
  • Grant: Require password change (and MFA)
  • Effect: Accounts flagged as compromised must change their password. This invalidates any stolen credentials.
💡 Exam tip: Risk policies are now Conditional Access policies

Microsoft has migrated Identity Protection risk policies into Conditional Access. The old “Identity Protection > Sign-in risk policy” and “User risk policy” pages still exist for backward compatibility, but the recommended approach is to create risk-based Conditional Access policies.

The exam may ask: “Where should Elena configure risk-based policies?” → Conditional Access (with sign-in risk or user risk as a condition). Not the legacy Identity Protection policy page.

Risk investigation

When Identity Protection flags a user:

  1. Review the risk detection — Entra > Protection > Identity Protection > Risk detections
  2. Investigate the sign-in — check location, device, IP, application
  3. Decide: legitimate (dismiss risk) or compromised (confirm risk)
  4. If compromised: force password change, revoke sessions, investigate further
  5. If legitimate: dismiss the detection (improves the ML model)
ℹ️ Deep dive: Bulk risk operations

At GlobalReach’s scale (20,000 users), Priya can’t investigate every risk detection individually. She uses:

  • Automatic remediation via CA policies — most medium-risk sign-ins resolve themselves when users complete MFA
  • Risk-based reports — filter by risk level, focus investigation on High-risk users
  • Microsoft Graph API — programmatic access to risk detections for integration with SIEM tools
  • Bulk dismiss — after investigation confirms false positives (e.g., a new VPN provider flagging as anonymous IP)

The goal is to investigate High-risk detections manually and let automation handle Medium and Low.

Key concepts to remember

Question

What is the difference between sign-in risk and user risk in Identity Protection?

Click or press Enter to reveal answer

Answer

Sign-in risk evaluates a specific sign-in attempt (e.g., anonymous IP, impossible travel). User risk evaluates whether an account is compromised over time (e.g., leaked credentials, anomalous activity). Sign-in risk is per-session; user risk is per-account and persists until remediated.

Click to flip back

Question

What licensing is required for Microsoft Entra Identity Protection?

Click or press Enter to reveal answer

Answer

Microsoft Entra ID P2 (included in M365 E5 and EMS E5). P1 includes Conditional Access but not Identity Protection risk detections. P2 adds the risk engine, risk-based CA policies, and the Identity Protection dashboard.

Click to flip back

Question

How does a user self-remediate from a high user risk detection?

Click or press Enter to reveal answer

Answer

By changing their password (which proves they still control the account and invalidates any stolen credentials). This requires SSPR to be enabled with password writeback in hybrid environments. The risk-based CA policy forces the password change automatically.

Click to flip back

Knowledge check

Knowledge Check

Elena notices that a MedGuard Health doctor's account has been flagged with High user risk. Identity Protection shows 'Leaked credentials' as the detection. The doctor confirms they haven't noticed any suspicious activity. What should Elena do?

Knowledge Check

Priya sees hundreds of Medium sign-in risk detections daily at GlobalReach. Most are from users accessing M365 from new locations during business travel. What is the most efficient way to handle this?

🎬 Video coming soon


Next up: Conditional Access and MFA Enforcement — the policy engine that ties everything together.

← Previous

Password Protection and Authentication Troubleshooting

Next →

Conditional Access and MFA Enforcement

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.