πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 2
Domain 2 β€” Module 8 of 8 100%
12 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 2: Microsoft Entra Capabilities Premium ⏱ ~11 min read

PIM and Identity Protection

Just-in-time admin access with PIM, and real-time risk detection with Identity Protection β€” two Entra ID P2 capabilities that protect privileged accounts and detect compromised identities.

Privileged Identity Management (PIM)

β˜• Simple explanation

Think of a safe room at a bank. Only authorised managers can enter, and only after requesting access, getting approval, and the door locks again after 4 hours.

In most organisations, admins have their powerful roles permanently. They are Global Admin 24 hours a day, 7 days a week β€” even when they are sleeping, on holiday, or not doing admin work.

PIM changes this. Instead of always having admin access, you activate it when you need it. You request access, someone approves it, you get the role for a limited time, and then it goes away automatically.

If an attacker compromises an admin account at 2am, the role is probably not active β€” there is nothing elevated to exploit.

Microsoft Entra Privileged Identity Management (PIM) provides just-in-time (JIT) and time-bound privileged access to Microsoft Entra ID and Azure resources. Instead of permanently assigning privileged roles, PIM lets users activate roles on demand β€” with approval workflows, justification requirements, and automatic expiry.

PIM reduces the attack surface by ensuring privileged roles are only active when they are needed. It creates a full audit trail of who activated what, when, why, and for how long.

Licence requirement: Microsoft Entra ID P2.

How PIM works

PIM introduces two types of role assignment:

Assignment TypeWhat It MeansWhen The User Has The Role
EligibleThe user CAN activate the role when needed β€” but does not have it by defaultOnly after requesting and (optionally) getting approval. Time-limited.
ActiveThe user HAS the role permanently (traditional assignment)Always β€” 24/7. Used only when JIT is not practical.

The activation flow

  1. An admin marks a user as eligible for a role (e.g., Global Administrator)
  2. The user needs to perform an admin task
  3. The user goes to PIM and requests activation
  4. They provide a justification (why they need it)
  5. An approver reviews and approves the request (if approval is required)
  6. The role activates for a set duration (e.g., 4 hours)
  7. After the time expires, the role automatically deactivates
  8. Everything is logged in the audit trail

Key exam concept: PIM requires Microsoft Entra ID P2. The user is β€œeligible” (can request) but not β€œactive” (does not have the role) until they activate it. This is the core of just-in-time access.

πŸ’‘ Scenario: Alex configures PIM at SecureBank

Director Reyes tells Alex: β€œI don’t want anyone permanently sitting in the Global Administrator role β€” not even me.”

Alex configures PIM:

  • Director Reyes, Alex, and the IT lead are eligible for Global Admin
  • Activation requires MFA, a written justification, and approval from another eligible admin
  • Maximum activation time: 4 hours
  • All activations generate alerts to the security team

When Reyes needs to make a tenant-wide configuration change, she activates the role, explains why, gets Alex’s approval, and has 4 hours to complete the work. At hour four, the role disappears.

β€œWe went from three standing Global Admins to zero,” Alex reports. β€œAnyone who needs it can get it β€” but only for the exact time they need it.”

PIM for Entra roles and Azure resources

PIM works in two areas:

PIM protects privileged roles in both Entra and Azure
FeaturePIM for Entra RolesPIM for Azure Resources
What it managesPrivileged Entra roles (Global Admin, Security Admin, User Admin, etc.)Privileged Azure resource roles (Owner, Contributor, User Access Administrator)
ScopeThe Entra tenantAzure subscriptions, resource groups, or individual resources
ExampleActivate Global Administrator for 2 hours to configure a policyActivate Owner on a production subscription for 1 hour to deploy a fix
Approval required?Configurable per roleConfigurable per role and scope

Why PIM matters

Without PIMWith PIM
Admin roles are active 24/7 β€” even at 2am when nobody is workingRoles are dormant until explicitly activated
A compromised admin account has full power immediatelyA compromised eligible account has no elevated power until activated (which requires MFA + approval)
No record of why someone used their admin accessFull audit trail: who activated, when, why, and for how long
Admins forget they have powerful roles β€” accidental changes happenDeliberate activation creates mindfulness about privileged actions

Microsoft Entra ID Protection

β˜• Simple explanation

Think of a credit card company that calls you when it spots a suspicious transaction.

”Did you just buy a laptop in Brazil? You were in Auckland 10 minutes ago.” The system detected something unusual and flagged it automatically.

Identity Protection does the same thing for sign-ins. It watches every sign-in for suspicious patterns: impossible travel, anonymous networks, known attacker IPs, leaked passwords. When it detects risk, it can automatically require MFA, force a password reset, or block the sign-in entirely.

You do not have to watch a dashboard all day. The system watches for you and responds in real time.

Microsoft Entra ID Protection uses machine learning and Microsoft’s global threat intelligence to detect, investigate, and remediate identity-based risks in real time. It evaluates every sign-in against hundreds of signals and assigns a risk level.

It works in two dimensions: sign-in risk (is this specific sign-in suspicious?) and user risk (is this user account likely compromised?). Risk signals feed into Conditional Access policies, which can automatically enforce remediation actions.

Licence requirement: Microsoft Entra ID P2.

Two types of risk

Risk TypeWhat It MeasuresDetectionsExamples
Sign-in riskHow likely is it that this specific sign-in was NOT performed by the account owner?Evaluated in real time during the sign-inImpossible travel, anonymous IP address, password spray, malicious IP address, unfamiliar sign-in properties
User riskHow likely is it that this user account has been compromised?Evaluated offline β€” builds over timeLeaked credentials found on the dark web, anomalous user activity, threat intelligence indicators

Risk levels

Both sign-in risk and user risk are classified into levels:

LevelWhat It MeansTypical Response
LowSlightly unusual but probably legitimateMonitor β€” no action needed
MediumModerately suspicious β€” warrants investigationRequire MFA to verify the user
HighStrong indicators of compromiseBlock access or force password reset

Common risk detections

These are the specific threats Identity Protection watches for:

DetectionWhat It MeansRisk Type
Impossible travelSign-ins from two locations that are physically impossible in the time between themSign-in
Anonymous IP addressSign-in from an anonymising service (Tor, VPN associated with attackers)Sign-in
Password sprayMultiple accounts targeted with common passwords in a coordinated attackSign-in
Unfamiliar sign-in propertiesSign-in from a location, device, or network the user has never used beforeSign-in
Leaked credentialsThe user’s credentials were found in a public data breachUser
Anomalous user activityUnusual patterns in the user’s behaviour compared to their baselineUser
πŸ’‘ Scenario: Identity Protection catches a compromised account at SecureBank

On Monday morning, Alex sees an alert: Identity Protection flagged a high user risk for Jordan, a loan officer.

What happened:

  1. Jordan’s email and password appeared in a dark web breach dump (leaked credentials β€” user risk)
  2. A sign-in attempt came from a Tor exit node in Romania (anonymous IP β€” sign-in risk)
  3. The Conditional Access policy blocked the sign-in and required Jordan to reset their password

Alex investigates:

  • Jordan was at home in Auckland at the time β€” the Romania sign-in was definitely an attacker
  • Jordan confirms they used the same password on a personal site that was breached

β€œIdentity Protection blocked the attacker before they got in,” Alex tells Director Reyes. β€œJordan reset their password, re-enrolled MFA, and is back to work. No data was accessed.”

Identity Protection and Conditional Access

Identity Protection feeds risk signals into Conditional Access. Together, they create automated risk-based responses:

PolicyTriggerAction
Sign-in risk policySign-in risk is medium or higherRequire MFA to verify the user
Sign-in risk policySign-in risk is highBlock the sign-in entirely
User risk policyUser risk is medium or higherRequire a secure password change
User risk policyUser risk is highBlock all access until admin reviews

Key exam concept: Identity Protection detects risk. Conditional Access enforces the response. They work together β€” Identity Protection is the alarm, Conditional Access is the automatic lock.

PIM vs Identity Protection

These two capabilities solve different problems:

PIM manages privileged access; Identity Protection detects compromised identities
FeaturePrivileged Identity Management (PIM)Identity Protection
Problem it solvesStanding privileged access is risky β€” admins should not be permanently elevatedCompromised identities are hard to detect β€” attackers use stolen credentials
FocusControlling admin/privileged role accessDetecting and responding to identity-based threats
How it worksJust-in-time activation: request, approve, time-limited accessMachine learning detects anomalies, assigns risk levels, triggers automated responses
Key conceptEligible vs active role assignmentsSign-in risk vs user risk
LicenceEntra ID P2Entra ID P2
One-line summaryControl who can be admin, and whenDetect when an identity is compromised

🎬 Video walkthrough

🎬 Video coming soon

PIM and Identity Protection β€” SC-900 Module 8

PIM and Identity Protection β€” SC-900 Module 8

~10 min

Flashcards

Question

What is the difference between 'eligible' and 'active' in PIM?

Click or press Enter to reveal answer

Answer

Eligible: the user CAN activate a privileged role when needed β€” they do not have it by default. Active: the user HAS the role permanently. PIM encourages eligible assignments so roles are only active when explicitly needed.

Click to flip back

Question

What is the difference between sign-in risk and user risk?

Click or press Enter to reveal answer

Answer

Sign-in risk: how suspicious is THIS specific sign-in? (evaluated in real time β€” e.g., impossible travel, anonymous IP). User risk: how likely is it this USER ACCOUNT is compromised? (evaluated over time β€” e.g., leaked credentials, anomalous activity).

Click to flip back

Question

What licence is required for PIM and Identity Protection?

Click or press Enter to reveal answer

Answer

Both require Microsoft Entra ID P2. PIM provides just-in-time privileged access. Identity Protection provides risk-based detection and automated responses.

Click to flip back

Question

How do Identity Protection and Conditional Access work together?

Click or press Enter to reveal answer

Answer

Identity Protection detects risk (sign-in risk and user risk) and assigns risk levels. Conditional Access uses these risk levels as signals in policies β€” e.g., if sign-in risk is high, block access. Identity Protection is the alarm; Conditional Access is the automated response.

Click to flip back

Question

What is 'impossible travel' in Identity Protection?

Click or press Enter to reveal answer

Answer

A risk detection triggered when a user signs in from two geographic locations that are physically impossible to travel between in the time between the two sign-ins. Example: sign-in from Auckland, then 10 minutes later from Romania.

Click to flip back

Knowledge Check

Knowledge Check

Director Reyes wants to ensure that nobody at SecureBank has permanent Global Administrator access β€” but three senior staff must be able to perform admin tasks when urgent issues arise. What should Alex configure?

Knowledge Check

Identity Protection flags a high sign-in risk for Jordan's account. A Conditional Access policy is configured to block access when sign-in risk is high. What happens next?

Knowledge Check

Which statement correctly describes the difference between PIM and Identity Protection?

← Previous

Identity Governance: Entitlements and Access Reviews

Next β†’

Azure Network Defence: DDoS, Firewall & WAF

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.