Skip to content

Commit c41891f

Browse files
committed
LP2: Copy modules 01, 04, 05; rename hashed media; remove unreferenced media
1 parent 42193b9 commit c41891f

93 files changed

Lines changed: 428 additions & 289 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.
Lines changed: 63 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,52 +1,63 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.describe-azure-identity-access-security.knowledge-check
3-
title: Module assessment
4-
metadata:
5-
title: Module assessment
6-
description: "Knowledge check"
7-
ms.date: 10/03/2024
8-
author: wwlpublish
9-
ms.author: robbarefoot
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
module_assessment: true
14-
durationInMinutes: 4
15-
content: |
16-
[!include[](includes/10-knowledge-check.md)]
17-
quiz:
18-
title: "Check your knowledge"
19-
questions:
20-
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21-
choices:
22-
- content: "Conditional Access"
23-
isCorrect: true
24-
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25-
- content: "Guest access"
26-
isCorrect: false
27-
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28-
- content: "Passwordless"
29-
isCorrect: false
30-
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31-
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32-
choices:
33-
- content: "Zero Trust"
34-
isCorrect: true
35-
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36-
- content: "Defense-in-depth"
37-
isCorrect: false
38-
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39-
- content: "Role-based access control"
40-
isCorrect: false
41-
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42-
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43-
choices:
44-
- content: "Read only"
45-
isCorrect: false
46-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47-
- content: "Write only"
48-
isCorrect: false
49-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50-
- content: "Read and write"
51-
isCorrect: true
52-
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-identity-access-security.knowledge-check
3+
title: Module assessment
4+
metadata:
5+
title: Module assessment
6+
description: "Knowledge check"
7+
ms.date: 10/03/2024
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
module_assessment: true
14+
durationInMinutes: 4
15+
content: |
16+
[!include[](includes/10-knowledge-check.md)]
17+
quiz:
18+
title: "Check your knowledge"
19+
questions:
20+
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21+
choices:
22+
- content: "Conditional Access"
23+
isCorrect: true
24+
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25+
- content: "Guest access"
26+
isCorrect: false
27+
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28+
- content: "Passwordless"
29+
isCorrect: false
30+
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31+
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32+
choices:
33+
- content: "Zero Trust"
34+
isCorrect: true
35+
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36+
- content: "Defense-in-depth"
37+
isCorrect: false
38+
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39+
- content: "Role-based access control"
40+
isCorrect: false
41+
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42+
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43+
choices:
44+
- content: "Read only"
45+
isCorrect: false
46+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47+
- content: "Write only"
48+
isCorrect: false
49+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50+
- content: "Read and write"
51+
isCorrect: true
52+
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
53+
- content: "Which Azure service is designed to securely store secrets, certificates, and encryption keys for your applications?"
54+
choices:
55+
- content: "Azure Key Vault"
56+
isCorrect: true
57+
explanation: "Azure Key Vault is used to securely store and manage secrets, certificates, and keys."
58+
- content: "Azure Policy"
59+
isCorrect: false
60+
explanation: "Azure Policy helps enforce governance rules, but it doesn't store application secrets or encryption keys."
61+
- content: "Azure Monitor"
62+
isCorrect: false
63+
explanation: "Azure Monitor provides telemetry and observability, not key and secret storage."
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-identity-access-security.describe-encryption-key-management
3+
title: Describe encryption and key management in Azure
4+
metadata:
5+
title: Describe encryption and key management in Azure
6+
description: "Describe encryption and key management in Azure"
7+
ms.date: 03/06/2026
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/9a-describe-encryption-key-management.md)]

learn-pr/wwl-azure/describe-azure-identity-access-security/includes/1-introduction.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
In this module, youll be introduced to the Azure identity, access, and security services and tools. Youll learn about directory services in Azure, authentication methods, and access control. Youll also cover things like Zero Trust and defense in depth, and how they keep your cloud safer. You’ll wrap up with an introduction to Microsoft Defender for Cloud.
1+
In this module, you'll be introduced to the Azure identity, access, and security services and tools. You'll learn about directory services in Azure, authentication methods, and access control. You'll also cover Zero Trust, defense in depth, and how they keep your cloud safer. Finally, you'll review encryption concepts, key management with Azure Key Vault, and Microsoft Defender for Cloud.
22

33
## Learning objectives
44

@@ -11,4 +11,5 @@ After completing this module, you’ll be able to:
1111
- Describe Azure Role Based Access Control (RBAC).
1212
- Describe the concept of Zero Trust.
1313
- Describe the purpose of the defense in depth model.
14+
- Describe encryption concepts and key management options in Azure.
1415
- Describe the purpose of Microsoft Defender for Cloud.

learn-pr/wwl-azure/describe-azure-identity-access-security/includes/11-summary.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. And, you learned about the Defense In Depth and Zero Trust models.
1+
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. You also reviewed encryption concepts and key management options in Azure. And, you learned about the Defense In Depth and Zero Trust models.
22

33
## Learning objectives
44

@@ -11,8 +11,20 @@ You should now be able to:
1111
- Describe Azure Role Based Access Control (RBAC).
1212
- Describe the concept of Zero Trust.
1313
- Describe the purpose of the defense in depth model.
14+
- Describe encryption concepts and key management options in Azure.
1415
- Describe the purpose of Microsoft Defender for Cloud.
1516

1617
## Additional resources
1718

1819
The following resources provide more information on topics in this module or related to this module.<br>[Microsoft Certified: Security, Compliance, and Identity Fundamentals](/learn/certifications/security-compliance-and-identity-fundamentals/) is an entire certification, with associated training, dedicated to helping you better understand and manage Security, Compliance, and identity.
20+
21+
## Explore with Copilot
22+
23+
> [!TIP]
24+
> Try one of these prompts in Copilot Chat:
25+
>
26+
> - "Use one end-to-end scenario to show how SSO, MFA, Conditional Access, and RBAC work together in a Zero Trust design."
27+
> - "Explain the difference between Microsoft Entra ID, Microsoft Entra Domain Services, and external identities with practical examples."
28+
> - "Simulate a security incident and show how encryption, key management, defense in depth, and Microsoft Defender for Cloud reduce risk."
29+
30+
Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
1-
Microsoft Entra ID is a directory service that enables you to sign in and access both Microsoft cloud applications and cloud applications that you develop. Microsoft Entra ID can also help you maintain your on-premises Active Directory deployment.
1+
Microsoft Entra ID is Microsoft's cloud-based identity and access management service. It lets you sign in and access both Microsoft cloud applications and cloud applications that you develop.
22

3-
For on-premises environments, Active Directory running on Windows Server provides an identity and access management service that's managed by your organization. Microsoft Entra ID is Microsoft's cloud-based identity and access management service. With Microsoft Entra ID, you control the identity accounts, but Microsoft ensures that the service is available globally. If you've worked with Active Directory, Microsoft Entra ID will be familiar to you.
3+
If you've worked with on-premises Active Directory, Microsoft Entra ID will feel familiar. The key difference is that you control the identity accounts while Microsoft ensures the service is available globally.
44

5-
When you secure identities on-premises with Active Directory, Microsoft doesn't monitor sign-in attempts. When you connect Active Directory with Microsoft Entra ID, Microsoft can help protect you by detecting suspicious sign-in attempts at no extra cost. For example, Microsoft Entra ID can detect sign-in attempts from unexpected locations or unknown devices.
5+
Connecting the two unlocks extra protection. On its own, on-premises Active Directory doesn't monitor sign-in behavior. Once connected to Microsoft Entra ID, Microsoft can detect suspicious sign-in attempts at no extra cost — for example, sign-ins from unexpected locations or unknown devices.
66

77
## Who uses Microsoft Entra ID?
88

99
Microsoft Entra ID is for:
1010

11-
- **IT administrators**. Administrators can use Microsoft Entra ID to control access to applications and resources based on their business requirements.
11+
- **IT administrators**. Administrators can use Microsoft Entra ID to control access to applications and resources based on workload and security requirements.
1212
- **App developers**. Developers can use Microsoft Entra ID to provide a standards-based approach for adding functionality to applications that they build, such as adding SSO functionality to an app or enabling an app to work with a user's existing credentials.
1313
- **Users**. Users can manage their identities and take maintenance actions like self-service password reset.
1414
- **Online service subscribers**. Microsoft 365, Microsoft Office 365, Azure, and Microsoft Dynamics CRM Online subscribers are already using Microsoft Entra ID to authenticate into their account.
@@ -17,24 +17,26 @@ Microsoft Entra ID is for:
1717

1818
Microsoft Entra ID provides services such as:
1919

20-
- **Authentication**: This includes verifying identity to access applications and resources. It also includes providing functionality such as self-service password reset, multifactor authentication, a custom list of banned passwords, and smart lockout services.
21-
- **Single sign-on**: Single sign-on (SSO) enables you to remember only one username and one password to access multiple applications. A single identity is tied to a user, which simplifies the security model. As users change roles or leave an organization, access modifications are tied to that identity, which greatly reduces the effort needed to change or disable accounts.
22-
- **Application management**: You can manage your cloud and on-premises apps by using Microsoft Entra ID. Features like Application Proxy, SaaS apps, the My Apps portal, and single sign-on provide a better user experience.
23-
- **Device management**: Along with accounts for individual people, Microsoft Entra ID supports the registration of devices. Registration enables devices to be managed through tools like Microsoft Intune. It also allows for device-based Conditional Access policies to restrict access attempts to only those coming from known devices, regardless of the requesting user account.
20+
- **Authentication** — Verifies identity before granting access. Includes self-service password reset, multifactor authentication, banned password lists, and smart lockout.
21+
- **Single sign-on (SSO)** — Lets one identity access multiple applications. SSO benefits and behavior are covered in the authentication methods unit.
22+
- **Application management** — Manages cloud and on-premises apps through features like Application Proxy, SaaS app integration, and the My Apps portal.
23+
- **Device management** — Supports device registration and management through tools like Microsoft Intune. Enables device-based Conditional Access policies that restrict access to known devices.
24+
25+
:::image type="content" source="../media/directory-services-option-entra-capabilities-hub.png" alt-text="Diagram showing Microsoft Entra ID at the center with spokes connecting to Authentication, Single Sign-On, App Management, and Device Management capabilities.":::
2426

2527
## Can I connect my on-premises AD with Microsoft Entra ID?
2628

27-
If you had an on-premises environment running Active Directory and a cloud deployment using Microsoft Entra ID, you would need to maintain two identity sets. However, you can connect Active Directory with Microsoft Entra ID, enabling a consistent identity experience between cloud and on-premises.
29+
Without a connection, an on-premises Active Directory deployment and a cloud Microsoft Entra ID deployment require you to maintain two separate identity sets. Microsoft Entra Connect bridges that gap.
2830

29-
One method of connecting Microsoft Entra ID with your on-premises AD is using Microsoft Entra Connect. Microsoft Entra Connect synchronizes user identities between on-premises Active Directory and Microsoft Entra ID. Microsoft Entra Connect synchronizes changes between both identity systems, so you can use features like SSO, multifactor authentication, and self-service password reset under both systems.
31+
Microsoft Entra Connect synchronizes user identities between on-premises Active Directory and Microsoft Entra ID. Because changes flow between both systems, users get a consistent experience — including SSO, multifactor authentication, and self-service password reset — whether they're accessing on-premises or cloud resources.
3032

3133
## What is Microsoft Entra Domain Services?
3234

33-
Microsoft Entra Domain Services is a service that provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos/NTLM authentication. Just like Microsoft Entra ID lets you use directory services without having to maintain the infrastructure supporting it, with Microsoft Entra Domain Services, you get the benefit of domain services without the need to deploy, manage, and patch domain controllers (DCs) in the cloud.
35+
Microsoft Entra Domain Services provides managed domain services domain join, group policy, LDAP, and Kerberos/NTLM authenticationwithout requiring you to deploy or maintain domain controllers in the cloud.
3436

35-
A Microsoft Entra Domain Services managed domain lets you run legacy applications in the cloud that can't use modern authentication methods, or where you don't want directory lookups to always go back to an on-premises AD DS environment. You can lift and shift those legacy applications from your on-premises environment into a managed domain, without needing to manage the AD DS environment in the cloud.
37+
This is especially useful for legacy applications that can't use modern authentication. You can lift and shift those applications from on-premises into a managed domain without managing an AD DS environment in the cloud.
3638

37-
Microsoft Entra Domain Services integrates with your existing Microsoft Entra tenant. This integration lets users sign into services and applications connected to the managed domain using their existing credentials. You can also use existing groups and user accounts to secure access to resources. These features provide a smoother lift-and-shift of on-premises resources to Azure.
39+
Because Microsoft Entra Domain Services integrates with your existing Microsoft Entra tenant, users can sign in to the managed domain with their existing credentials. Existing groups and user accounts also carry over, providing a smoother migration path.
3840

3941
### How does Microsoft Entra Domain Services work?
4042

@@ -46,7 +48,8 @@ You don't need to manage, configure, or update these DCs. The Azure platform han
4648

4749
A managed domain is configured to perform a one-way synchronization from Microsoft Entra ID to Microsoft Entra Domain Services. You can create resources directly in the managed domain, but they aren't synchronized back to Microsoft Entra ID. In a hybrid environment with an on-premises AD DS environment, Microsoft Entra Connect synchronizes identity information with Microsoft Entra ID, which is then synchronized to the managed domain.
4850

49-
:::image type="content" source="../media/azure-active-directory-sync-topology-7359f2b8-427db2d4.png" alt-text="Diagram of Microsoft Entra Connect Sync synchronizing information back to the Microsoft Entra tenant from on-premises AD.":::
51+
:::image type="content" source="../media/directory-services-option-sync-architecture.png" alt-text="Diagram showing the identity sync flow from on-premises Active Directory through Microsoft Entra Connect to Microsoft Entra ID and Domain Services.":::
5052

5153

5254
Applications, services, and VMs in Azure that connect to the managed domain can then use common Microsoft Entra Domain Services features such as domain join, group policy, LDAP, and Kerberos/NTLM authentication.
55+

0 commit comments

Comments
 (0)