🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 2
Domain 2 — Module 5 of 7 71%
13 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 2: Implement and Manage Microsoft Entra Identity and Access Premium ⏱ ~14 min read

Password Protection and Authentication Troubleshooting

Implement Microsoft Entra Password Protection to ban weak passwords, and develop a systematic approach to investigating and resolving authentication issues.

Stopping weak passwords at the source

☕ Simple explanation

”Company2026!” passes every traditional password policy. It’s got uppercase, lowercase, numbers, and a symbol. But it’s still a terrible password — and attackers know it.

Microsoft Entra Password Protection goes beyond length and complexity rules. It bans known weak passwords, common patterns, and lets you add your own banned terms (like your company name). It works for cloud passwords AND on-premises AD passwords (with an agent).

The second part of this module covers what to do when authentication breaks — systematic troubleshooting using sign-in logs, diagnostic tools, and common resolution patterns.

Microsoft Entra Password Protection evaluates passwords against two lists:

  • Global banned password list — maintained by Microsoft, updated from real-world password spray attack data. Not configurable.
  • Custom banned password list — up to 1,000 terms defined by your organisation (company name, product names, location terms, etc.).

Password Protection applies to cloud password changes, SSPR, and (with the on-prem agent) on-premises AD password changes. It uses a normalisation algorithm that catches variations — “P@ssw0rd” is caught even if “password” is the banned term.

Microsoft Entra Password Protection

How the evaluation works

When a user sets or changes a password, Password Protection:

  1. Normalises the password — converts to lowercase, substitutes common replacements (@ → a, 0 → o, $ → s, etc.)
  2. Checks against the global banned list — thousands of known weak passwords
  3. Checks against your custom banned list — your organisation-specific terms
  4. Applies fuzzy matching — catches variations within edit distance of banned terms
  5. Scores the password — each unique token scores a point; needs 5+ points to pass

Custom banned password list

Elena adds these terms for MedGuard Health:

Banned TermWhat It Catches
medguardMedGuard1!, M3dgu@rd2024, MedGuardHealth
patientPatient123, p@tient!, PatientData2025
aucklandAuckland2024, @uckl@nd!, AucklandNZ
healthHealth123!, H3@lth2025 (already on global list variants)

On-premises deployment

For hybrid environments, Password Protection extends to on-prem AD:

  1. Install the Proxy service — on a domain-joined server with internet access
  2. Install the DC Agent — on every domain controller
  3. Configure mode — Audit (log but don’t block) or Enforce (block weak passwords)
💡 Exam tip: Audit mode first

Always deploy Password Protection in Audit mode first. This logs which passwords would be rejected without actually blocking them. After reviewing the audit data (how many users would be affected, which passwords are weak), switch to Enforce mode.

The exam may ask: “Dev deploys Password Protection for a new client. Users report they can’t change their passwords. What went wrong?” → Check if Enforce mode was enabled without an audit period. Users may be trying common patterns that are now blocked.

Authentication troubleshooting

The sign-in logs — your primary tool

Entra admin center > Monitoring > Sign-in logs shows every authentication attempt with:

ColumnWhat It Tells You
UserWho tried to sign in
ApplicationWhich app they were accessing
StatusSuccess or failure (with error code)
Conditional AccessWhich CA policies were evaluated and their result
MFAWhether MFA was required and how it was satisfied
LocationIP address and geographic location
DeviceOS, browser, compliance status
RiskSign-in risk level (none, low, medium, high)

Common authentication errors

Error CodeMeaningCommon Fix
AADSTS50126Invalid username or passwordVerify credentials, check password sync status
AADSTS50076MFA requiredUser must complete MFA (check if method is registered)
AADSTS53003Blocked by Conditional AccessReview CA policy — user/device doesn’t meet conditions
AADSTS50105User not assigned to applicationAssign the user to the enterprise application
AADSTS700016Application not foundVerify app registration and tenant
AADSTS50059No tenant information in requestCheck sign-in URL includes tenant context

Dev’s troubleshooting methodology

When a client’s user reports “I can’t sign in,” Dev follows this systematic approach:

  1. Check sign-in logs — find the specific failed attempt, note the error code
  2. Check Conditional Access — was a CA policy blocking access? (most common cause at enterprise level)
  3. Check MFA status — is the user registered for MFA? Did the MFA attempt fail?
  4. Check account status — is the account enabled? Is it locked? Is the password expired?
  5. Check sync status — for hybrid users, is the account properly synced? Password hash up to date?
  6. Check application assignment — is the user assigned to the enterprise app they’re trying to access?
ℹ️ Deep dive: Conditional Access troubleshooting with What If

The What If tool in Conditional Access lets you simulate a sign-in scenario:

  • Select a user, application, device platform, location, and risk level
  • The tool shows which CA policies would apply and their outcome (grant, block, MFA required)
  • This is invaluable for diagnosing “why can’t user X access app Y?”

Access: Entra admin center > Protection > Conditional Access > What If

The exam loves the What If tool. If a question asks “How should Elena determine which CA policy is blocking a user?” → Use the What If tool to simulate the scenario.

Key concepts to remember

Question

What two lists does Microsoft Entra Password Protection check against?

Click or press Enter to reveal answer

Answer

1. The global banned password list (maintained by Microsoft from real attack data, not configurable). 2. Your custom banned password list (up to 1,000 terms you define — company name, product names, etc.). Password Protection normalises input to catch common substitutions.

Click to flip back

Question

What is the AADSTS53003 error and how do you troubleshoot it?

Click or press Enter to reveal answer

Answer

AADSTS53003 means the sign-in was blocked by a Conditional Access policy. Troubleshoot by: 1. Check the sign-in log for which CA policy blocked access. 2. Use the What If tool to simulate the scenario. 3. Review the policy conditions — the user/device likely doesn't meet a grant control (MFA, compliant device, etc.).

Click to flip back

Question

What tool lets you simulate a sign-in scenario against Conditional Access policies?

Click or press Enter to reveal answer

Answer

The What If tool in Conditional Access (Entra admin center > Protection > Conditional Access > What If). Select a user, app, device, location, and risk level to see which policies would apply and their outcome.

Click to flip back

Knowledge check

Knowledge Check

Dev's client has deployed Microsoft Entra Password Protection in Enforce mode. A user tries to change their password to 'NimbleCloud2026!' and it's rejected. The user complains that the password meets complexity requirements. Why was it rejected?

Knowledge Check

A MedGuard Health nurse reports she can't access a clinical application from her personal phone. Elena checks the sign-in logs and sees error AADSTS53003. What should Elena do next?

🎬 Video coming soon


Next up: Entra Identity Protection and Risk Policies — detecting risky sign-ins and compromised accounts automatically.

← Previous

Authentication Methods and Self-Service Password Reset

Next →

Entra Identity Protection and Risk Policies

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.