🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 3
Domain 3 — Module 1 of 8 13%
16 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 3: Manage Security and Threats by Using Microsoft Defender XDR Premium ⏱ ~16 min read

Defender XDR: Security Posture and Threat Intelligence

Navigate the unified Microsoft Defender XDR portal, use Exposure Management to assess security posture, improve Secure Score, and leverage Threat Intelligence.

The unified security operations hub

☕ Simple explanation

Defender XDR is the single pane of glass where every security signal across your M365 environment converges.

Rather than jumping between separate consoles for email threats, identity risks, endpoint detections, and cloud app anomalies, security.microsoft.com pulls everything into one portal. Exposure Management shows you where your attack surface is weakest. Secure Score quantifies your posture. Threat Intelligence tells you what adversaries are doing right now and whether your environment is exposed to their techniques.

For the MS-102 exam, you need to know how to navigate this portal, interpret its reports, and take action on what it surfaces.

Microsoft Defender XDR (Extended Detection and Response) at security.microsoft.com unifies signal correlation across six Defender workloads: Defender for Endpoint, Defender for Office 365, Defender for Identity, Defender for Cloud Apps, Microsoft Entra Identity Protection, and Microsoft Purview Data Loss Prevention.

Three capabilities are critical for this exam objective:

  • Security Exposure Management — continuous assessment of your attack surface, attack path analysis, and security initiatives that group related improvement actions
  • Secure Score — a quantified posture metric (0-100%) with prioritised improvement actions, peer comparison, and regression tracking
  • Threat Intelligence (Defender TI) — curated threat analytics reports, indicators of compromise (IoCs), and adversary profiles that map to your environment

All three feed into the incident and alert pipeline — which we cover in the next module.

Navigating the Defender XDR portal

The portal at security.microsoft.com organises capabilities into sections that map directly to exam objectives:

Portal SectionWhat You Find ThereExam Relevance
Incidents and alertsCorrelated multi-workload incidents, individual alertsIncident investigation (next module)
HuntingAdvanced hunting (KQL), custom detection rulesThreat hunting (next module)
Exposure ManagementAttack surface, attack paths, security initiatives, Secure ScoreThis module
Threat IntelligenceThreat analytics, Intel Explorer, Intel profilesThis module
ReportsSecurity dashboards, email and collaboration reports, device healthThis module
Actions and submissionsAction center, user-reported messages, admin submissionsEmail threat module

Elena bookmarks the Exposure Management dashboard as her morning-check page at MedGuard Health — it surfaces the most impactful posture gaps before she dives into incident triage.

Security Exposure Management

Exposure Management is a proactive posture capability — it answers “where are we weak?” before an attacker finds out.

Attack surface

The attack surface view aggregates your exposed assets across workloads:

  • Devices — unmanaged endpoints, devices with outdated OS or missing EDR
  • Identities — accounts without MFA, stale admin accounts, over-privileged service principals
  • Cloud apps — unsanctioned SaaS apps discovered by Defender for Cloud Apps, OAuth app consent risks
  • Data — sensitive content in unprotected locations, DLP policy gaps

Attack paths

Attack path analysis models how an attacker could chain weaknesses together to reach a critical asset. For example: a user account with no MFA on a device without EDR that has local admin on a server hosting patient records.

Elena uses this at MedGuard to demonstrate to leadership why patching a “low severity” endpoint vulnerability matters — because it sits on a path to their electronic health record system.

Security initiatives

Initiatives group related improvement actions by theme — such as “Ransomware Protection” or “Zero Trust” — giving you a structured roadmap rather than an unranked to-do list.

💡 Exam tip: Exposure Management vs Secure Score

The exam may present scenarios where you need to choose between Exposure Management and Secure Score. The distinction: Secure Score is a numeric metric with individual improvement actions. Exposure Management is broader — it includes Secure Score, plus attack surface views, attack path analysis, and security initiatives. Think of Secure Score as one component within Exposure Management.

Microsoft Secure Score

Secure Score quantifies your security posture as a percentage. Every improvement action adds points — the higher the score, the more hardened your environment.

How Secure Score works

  1. Total possible points — the maximum score if every improvement action were completed
  2. Current score — points earned from completed and partially completed actions
  3. Percentage — current / total possible (displayed as the headline metric)

Improvement actions

Each action has:

  • Points — how much completing it adds to your score
  • Status — To address, Planned, Risk accepted, Resolved through third party, Resolved through alternate mitigation, Completed
  • Implementation category — whether it requires configuration, user training, or both
  • Impact — High, Medium, or Low (not just points — some high-point actions are easy wins, others are complex)

Elena prioritises actions by impact-to-effort ratio. A 9-point action requiring “enable MFA for all admins” is a quick win; a 5-point action requiring “deploy Defender for Endpoint to all devices” is a multi-week project.

Score comparison

Secure Score includes a comparison tab showing how your score stacks up against:

  • Similar organisations — filtered by industry, seat count, and licensing
  • Your own history — trend line over 90 days to track improvement or regression
ℹ️ Deep dive: When Secure Score drops

Score regressions happen for three reasons:

  1. Microsoft adds new improvement actions — the total possible points increase, so your percentage drops even though you haven’t changed anything
  2. A previously completed action regresses — for example, an admin disables a policy that was earning points
  3. Your environment changes — new users provisioned without MFA, new devices onboarded without EDR

Elena sets up a weekly review cadence to catch regressions early. She also marks low-priority actions as “Risk accepted” with documented justification — this removes them from her active list without hiding them.

Threat Intelligence

Defender Threat Intelligence (Defender TI) provides curated, actionable intelligence about active threats.

Threat analytics

The Threat analytics dashboard in the portal surfaces:

  • Analyst reports — Microsoft security researchers publish detailed write-ups of active campaigns, including TTPs (tactics, techniques, and procedures), affected industries, and recommended mitigations
  • Exposure indicators — for each threat, the portal shows whether your environment has exposed assets (vulnerable devices, unpatched software, missing protections)
  • Mitigations status — which recommended mitigations you’ve already implemented and which are outstanding

Intel Explorer and profiles

  • Intel Explorer — search for indicators (IPs, domains, file hashes, URLs) to check if they’ve been associated with known threats
  • Intel profiles — detailed adversary profiles covering threat actors, their targets, known tools, and infrastructure

Elena subscribes to threat analytics for healthcare-targeted campaigns. When a new report lands about a ransomware group targeting hospitals, she immediately checks MedGuard’s exposure status and prioritises any outstanding mitigations.

💡 Exam tip: Threat Intelligence licensing

Threat analytics (basic reports and exposure data) is included with Defender XDR licensing. The full Defender TI experience (Intel Explorer, Intel profiles, advanced indicator search) requires an additional Defender Threat Intelligence licence. The exam typically focuses on threat analytics within the Defender XDR portal — not the premium TI features.

XDR reports and dashboards

The Reports section provides pre-built dashboards that the exam expects you to interpret:

Key Defender XDR Reports
FeatureWhat It ShowsWhen to Use It
Incident reportIncident volume, classification breakdown, MTTRTrack SOC performance and incident trends over time
Device healthSensor status, OS distribution, AV statusIdentify devices with missing or degraded Defender for Endpoint coverage
Vulnerable devicesDevices with unpatched CVEs, exploitability scoresPrioritise patching based on active exploitation data
Email and collaborationMalware, phishing, spam detection rates, override trendsValidate email protection effectiveness and tune policies
Threat protection statusDetection trends across all Defender workloadsSpot spikes in detections that may indicate an active campaign

Elena reviews the email and collaboration report weekly to validate that Safe Attachments and Safe Links are catching threats at MedGuard — and that users aren’t overriding protections by adding sender exceptions.

Key concepts to remember

Question

What three capabilities make up Security Exposure Management in Defender XDR?

Click or press Enter to reveal answer

Answer

1) Attack surface assessment — aggregates exposed assets across devices, identities, cloud apps, and data. 2) Attack path analysis — models how an attacker could chain weaknesses to reach critical assets. 3) Security initiatives — groups related improvement actions by theme (e.g., Ransomware Protection, Zero Trust) for structured remediation.

Click to flip back

Question

How is Microsoft Secure Score calculated?

Click or press Enter to reveal answer

Answer

Secure Score = current points earned / total possible points, expressed as a percentage. Points come from completing improvement actions across identity, device, app, and data categories. The total possible changes as Microsoft adds new actions or your environment changes (new users, new devices).

Click to flip back

Question

What does the 'exposure' indicator in a Threat Analytics report tell you?

Click or press Enter to reveal answer

Answer

It shows whether your environment has assets that are vulnerable to the specific threat described in the report — such as unpatched devices, missing security configurations, or unprotected users. It maps the threat's TTPs against your actual environment state so you can prioritise mitigations.

Click to flip back

Question

Where do you find Secure Score in the Defender XDR portal?

Click or press Enter to reveal answer

Answer

Under Exposure Management > Secure Score at security.microsoft.com. It was previously at its own URL (securescore.microsoft.com) but has been consolidated into the unified Defender XDR portal.

Click to flip back

Knowledge check

Knowledge Check

Elena notices that MedGuard Health's Secure Score dropped by 4% overnight, but no one changed any security policies. The IT team hasn't made any configuration changes. What is the most likely explanation?

Knowledge Check

Dev Patel is advising Oakwood Financial on where to start their security posture improvement. The Secure Score shows 45% with 23 improvement actions in 'To address' status. Dev has limited time and needs maximum impact. What approach should he recommend?

Knowledge Check

Elena sees a new Threat Analytics report titled 'Healthcare-targeted ransomware campaign using vulnerable VPN appliances.' The report shows MedGuard has 3 exposed devices. What should Elena do first?

🎬 Video coming soon


Next up: Investigate Incidents with Advanced Hunting — where Elena correlates alerts across workloads and uses KQL to hunt for threats hiding in MedGuard’s telemetry.

← Previous

Conditional Access and MFA Enforcement

Next →

Investigate Incidents with Advanced Hunting

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.