Skip to content

Commit 3a8905f

Browse files
committed
retire permissions management
1 parent 0bce132 commit 3a8905f

14 files changed

+129
-285
lines changed

learn-pr/wwl-sci/.openpublishing.redirection.wwl-sci.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,6 +311,16 @@
311311
{
312312
"source_path_from_root": "/learn-pr/paths/purview-implement-manage-dlp-retention/index.yml",
313313
"redirect_url": "/training/paths/purview-implement-manage-dlp/"
314-
}
314+
},
315+
{
316+
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-secure-privileged-access/5-design-solution-cloud-infrastructure-entitlement-management.yml",
317+
"redirect_url": "https://learn.microsoft.com/training/modules/design-solutions-secure-privileged-access/",
318+
"redirect_document_id": false
319+
},
320+
{
321+
"source_path_from_root": "/learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/5a-describe-entra-permissions-management.yml",
322+
"redirect_url": "https://learn.microsoft.com/training/paths/describe-capabilities-of-microsoft-identity-access/",
323+
"redirect_document_id": false
324+
}
315325
]
316326
}

learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/5a-describe-entra-permissions-management.yml

Lines changed: 0 additions & 13 deletions
This file was deleted.
Lines changed: 64 additions & 76 deletions
Original file line numberDiff line numberDiff line change
@@ -1,76 +1,64 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.describe-identity-protection-governance-capabilities-of-azure-ad.knowledge-check
3-
title: Module assessment
4-
metadata:
5-
title: Module assessment
6-
description: "Knowledge check"
7-
ms.date: 08/02/2024
8-
author: wwlpublish
9-
ms.author: ceperezb
10-
ms.topic: unit
11-
durationInMinutes: 3
12-
content: |
13-
[!include[](includes/6-knowledge-check.md)]
14-
quiz:
15-
title: "Check your knowledge"
16-
questions:
17-
- content: "Your organization has implemented important changes in their customer facing web-based applications. You want to ensure that any user who wishes to access these applications agrees to the legal disclaimers. Which Microsoft Entra feature should you implement?"
18-
choices:
19-
- content: "Entitlement management."
20-
isCorrect: false
21-
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't address the business requirement for users to agree to terms of use."
22-
- content: "Microsoft Entra Terms of Use."
23-
isCorrect: true
24-
explanation: "Correct. Microsoft Entra Terms of Use presents information to users before they access data and can be configured to require users to accept the terms of use."
25-
- content: "Identity Protection."
26-
isCorrect: false
27-
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
28-
29-
- content: "An organization is project-oriented with employees often working on more than one project at a time. Which solution is best suited to managing user access to this organization’s resources?"
30-
choices:
31-
- content: "Microsoft Entra Terms of Use."
32-
isCorrect: false
33-
explanation: "Incorrect. Microsoft Entra Terms of Use presents information to users before they access data but doesn't manage access rights."
34-
- content: "Identity Protection."
35-
isCorrect: false
36-
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
37-
- content: "Entitlement management."
38-
isCorrect: true
39-
explanation: "Correct. Entitlement management is well suited to handling project-based access needs. Entitlement management automates access requests, access assignments, reviews, and expiration for bundles of resources relevant to a project."
40-
41-
- content: "An organization has recently conducted a security audit and found that four people who have left were still active and assigned global admin roles. The users have now been deleted but the IT organization has been asked to recommend a solution to prevent a similar security lapse happening in future. Which solution should they recommend?"
42-
choices:
43-
- content: "Entitlement management."
44-
isCorrect: false
45-
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't prevent users who have left the organization retaining access rights."
46-
- content: "Privileged Identity Management."
47-
isCorrect: true
48-
explanation: "Correct. Privileged Identity Management mitigates the risks of excessive, unnecessary, or misused access permissions."
49-
- content: "Identity Protection."
50-
isCorrect: false
51-
explanation: "Incorrect. Identity Protection allows you to detect identity-based risk but doesn't mitigate the risk of inappropriate privileges being assigned to users who have left the organization."
52-
53-
- content: "Your IT organization recently discovered that several user accounts in the finance department have been compromised. The CTO has asked for a solution to reduce the impact of compromised user accounts. The IT admin team is looking into Microsoft Entra features. Which one should they recommend?"
54-
choices:
55-
- content: "Identity Protection."
56-
isCorrect: true
57-
explanation: "Correct. Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. This includes user risk, the probability that a given identity or account is compromised, and sign-in risk, the probability that a given authentication request isn't authorized by the identity owner."
58-
- content: "Conditional Access."
59-
isCorrect: false
60-
explanation: "Incorrect. Conditional Access policies are used to enforce organizational rules for access."
61-
- content: "Entitlement management."
62-
isCorrect: false
63-
explanation: "Incorrect. Entitlement management is an Azure tool that automates access to the applications and data needed for someone to be productive in a particular project or role."
64-
65-
- content: An organization is adopting a multicloud strategy and struggling with managing access permissions. They want to implement least privilege access across their entire infrastructure. What should they do to ensure secure and compliant access to their expanding cloud estate?
66-
choices:
67-
- content: Rely solely on cloud providers' native access management models.
68-
isCorrect: false
69-
explanation: Incorrect. These models can be inconsistent and may not provide the level of control needed for a Zero Trust security strategy.
70-
- content: Manually review and adjust permissions for each identity and resource on a regular basis.
71-
isCorrect: false
72-
explanation: Incorrect. This approach isn't scalable and doesn't provide comprehensive visibility or control over permissions.
73-
- content: Implement a cloud infrastructure entitlement management (CIEM) product like Microsoft Entra Permissions Management that provides comprehensive visibility and control over permissions for any identity and any resource in Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP).
74-
isCorrect: true
75-
explanation: Correct. This product helps organizations address the Zero Trust principle of least privilege access by detecting, automatically right-sizing (remediating), and continuously monitoring unused and excessive permissions.
76-
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-identity-protection-governance-capabilities-of-azure-ad.knowledge-check
3+
title: Module assessment
4+
metadata:
5+
title: Module assessment
6+
description: "Knowledge check"
7+
ms.date: 08/02/2024
8+
author: wwlpublish
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/6-knowledge-check.md)]
14+
quiz:
15+
title: "Check your knowledge"
16+
questions:
17+
- content: "Your organization has implemented important changes in their customer facing web-based applications. You want to ensure that any user who wishes to access these applications agrees to the legal disclaimers. Which Microsoft Entra feature should you implement?"
18+
choices:
19+
- content: "Entitlement management."
20+
isCorrect: false
21+
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't address the business requirement for users to agree to terms of use."
22+
- content: "Microsoft Entra Terms of Use."
23+
isCorrect: true
24+
explanation: "Correct. Microsoft Entra Terms of Use presents information to users before they access data and can be configured to require users to accept the terms of use."
25+
- content: "Identity Protection."
26+
isCorrect: false
27+
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
28+
29+
- content: "An organization is project-oriented with employees often working on more than one project at a time. Which solution is best suited to managing user access to this organization’s resources?"
30+
choices:
31+
- content: "Microsoft Entra Terms of Use."
32+
isCorrect: false
33+
explanation: "Incorrect. Microsoft Entra Terms of Use presents information to users before they access data but doesn't manage access rights."
34+
- content: "Identity Protection."
35+
isCorrect: false
36+
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
37+
- content: "Entitlement management."
38+
isCorrect: true
39+
explanation: "Correct. Entitlement management is well suited to handling project-based access needs. Entitlement management automates access requests, access assignments, reviews, and expiration for bundles of resources relevant to a project."
40+
41+
- content: "An organization has recently conducted a security audit and found that four people who have left were still active and assigned global admin roles. The users have now been deleted but the IT organization has been asked to recommend a solution to prevent a similar security lapse happening in future. Which solution should they recommend?"
42+
choices:
43+
- content: "Entitlement management."
44+
isCorrect: false
45+
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't prevent users who have left the organization retaining access rights."
46+
- content: "Privileged Identity Management."
47+
isCorrect: true
48+
explanation: "Correct. Privileged Identity Management mitigates the risks of excessive, unnecessary, or misused access permissions."
49+
- content: "Identity Protection."
50+
isCorrect: false
51+
explanation: "Incorrect. Identity Protection allows you to detect identity-based risk but doesn't mitigate the risk of inappropriate privileges being assigned to users who have left the organization."
52+
53+
- content: "Your IT organization recently discovered that several user accounts in the finance department have been compromised. The CTO has asked for a solution to reduce the impact of compromised user accounts. The IT admin team is looking into Microsoft Entra features. Which one should they recommend?"
54+
choices:
55+
- content: "Identity Protection."
56+
isCorrect: true
57+
explanation: "Correct. Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. This includes user risk, the probability that a given identity or account is compromised, and sign-in risk, the probability that a given authentication request isn't authorized by the identity owner."
58+
- content: "Conditional Access."
59+
isCorrect: false
60+
explanation: "Incorrect. Conditional Access policies are used to enforce organizational rules for access."
61+
- content: "Entitlement management."
62+
isCorrect: false
63+
explanation: "Incorrect. Entitlement management is an Azure tool that automates access to the applications and data needed for someone to be productive in a particular project or role."
64+

learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/includes/1-introduction.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,3 @@ In this module, you'll learn how to:
77
- Describe the capabilities of Microsoft Entra ID Governance.
88
- Describe Privileged Identity Management (PIM).
99
- Describe the capabilities of Microsoft Entra ID Protection.
10-
- Describe permissions management.

learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/includes/5a-describe-entra-permissions-management.md

Lines changed: 0 additions & 41 deletions
This file was deleted.

learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/includes/7-summary-resources.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
1-
In this module, you learned how Microsoft Entra ID provides tools to help you protect and govern identities. You learned about identity life-cycle management and how Identity Protection can detect potential identity risks. Finally, you learned how solutions such as access reviews, privileged identity management, and permissions management all help organizations adhere to the concepts of least privilege access, a core principle of a Zero Trust security strategy.
1+
In this module, you learned how Microsoft Entra ID provides tools to help you protect and govern identities. You learned about identity life-cycle management and how Identity Protection can detect potential identity risks. Finally, you learned how solutions such as access reviews and privileged identity management help organizations adhere to the concepts of least privilege access, a core principle of a Zero Trust security strategy.
22

33
Now that you've completed this module, you're able to:
44

55
- Describe the capabilities of Microsoft Entra ID Governance.
66
- Describe Privileged Identity Management (PIM).
77
- Describe the capabilities of Microsoft Entra ID Protection.
8-
- Describe permissions management.
98

109
### Learn more
1110

@@ -18,5 +17,4 @@ For more information about the topics raised in this module, see:
1817
- [Microsoft Entra Privileged Identity Management](/azure/active-directory/privileged-identity-management/pim-configure)
1918
- [What is Identity Protection?](/azure/active-directory/identity-protection/overview-identity-protection)
2019
- [Microsoft Copilot in Microsoft Entra](/training/modules/security-copilot-embedded-experiences/4-copilot-for-entra)
21-
- [What's Permissions Management?](/azure/active-directory/cloud-infrastructure-entitlement-management/overview)
2220
- [Describe the concepts behind Microsoft Entra Verified ID](/training/modules/describe-verified-id-concepts/)

0 commit comments

Comments
 (0)