Configure and govern entitlement with Microsoft Entra ID (SC-5008) – Outline

Detailed Course Outline

Plan and implement entitlement management

When new users or external users join your site, quickly assigning them access to Azure solutions is a must. Explore how to entitle users to access your site and resources.

  • Introduction
  • Define access packages
  • Exercise create and manage a resource catalog with Microsoft Entra entitlement management
  • Configure entitlement management
  • Exercise add terms of use acceptance report
  • Exercise manage the lifecycle of external users with Microsoft Entra identity governance
  • Configure and manage connected organizations
  • Review per-user entitlements
  • Module assessment
  • Summary and resources
Plan, implement, and manage access review

Once identity is deployed, proper governance using access reviews is necessary for a secure solution. Explore how to plan for and implement access reviews.

  • Introduction
  • Plan for access reviews
  • Create access reviews for groups and apps
  • Create and configure access reviews programmatically
  • Monitor access review findings
  • Automate access review management tasks
  • Configure recurring access reviews
  • Module assessment
  • Summary and resources
Monitor and maintain Microsoft Entra ID

Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how users are accessing your Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data.

  • Introduction
  • Analyze and investigate sign-in logs to troubleshoot access issues
  • Review and monitor Microsoft Entra audit logs
  • Exercise connect data from Microsoft Entra ID to Microsoft Sentinel
  • Export logs to third-party security information and event management system
  • Analyze Microsoft Entra workbooks and reporting
  • Monitor security posture with Identity Secure Score
  • Module assessment
  • Summary and resources
Plan and implement privileged access

Ensuring that administrative roles are protected and managed to increase your Azure solution security is a must. Explore how to use PIM to protect your data and resources.

  • Introduction
  • Define a privileged access strategy for administrative users
  • Configure Privileged Identity Management for Azure resources
  • Exercise configure Privileged Identity Management for Microsoft Entra roles
  • Exercise assign Microsoft Entra roles in Privileged Identity Management
  • Exercise assign Azure resource roles in Privileged Identity Management
  • Plan and configure Privileged Access Groups
  • Analyze Privileged Identity Management audit history and reports
  • Create and manage emergency access accounts
  • Module assessment
  • Summary and resources