MS-102 Study Guide | Microsoft 365 Administrator

MS-102 Study Guide Microsoft 365 Administrator

MS-102 Preparation Details

Preparing for the MS-102 Microsoft 365 Administrator certification exam? Start here with a complete, objective-wise MS-102 study guide designed to help you pass faster.

This guide brings together official Microsoft documentation, key concepts, and curated resources for every MS-102 exam objective, making it ideal for both beginners and last-minute revision.

Looking for the best MS-102 preparation resources in one place? This page covers everything you need to get exam-ready with confidence.

If this helped you, share it with others preparing for the MS-102 certification exam.

Exam Voucher for MS-102 with 1 Retake

Get 40% OFF with the combo

MS-102 Troubleshooting Microsoft Teams Prep

CourseraMicrosoft 365 Administrator
UdemyMicrosoft 365 Administrator Expert with SIMS
WhizlabsMicrosoft 365 Administrator Expert bundle

Deploy and manage a Microsoft 365 tenant (25–30%)

Implement and manage a Microsoft 365 tenant

Create a tenant

Tenant roadmap for Microsoft 365

MS-102 Configure your Microsoft 365 tenant – Training

Implement and manage domains

Add a domain to Microsoft 365

Domains Frequently Asked Questions

Configure org settings, including Security & privacy and Organization profile

MS-102 Configure your Microsoft 365 tenant – Training

Overview of tasks to set up Business Central

Monitor the health of Microsoft 365 services by using Service Health, including configuration of notifications

Manage tenant health and services in Microsoft 365 – Training

How to check Microsoft 365 service health

Configure and review Network connectivity insights

Microsoft 365 Network Insights

Microsoft 365 network connectivity overview

Configure and monitor software updates by using the Microsoft 365 admin center

MS-102 Configure your Microsoft 365 tenant – Training

Manage tenant health and services in Microsoft 365 – Training

Monitor Microsoft 365 adoption and usage

Microsoft 365 usage analytics

Microsoft Adoption Score

Configure and manage Microsoft 365 Backup

Manage tenant health and services in Microsoft 365 – Training

Microsoft 365 Backup overview

Manage users and groups

Create and manage users in Microsoft Entra ID, including external users

Manage users, licenses, guests, and contacts in Microsoft 365 – Training

Add or delete users – Microsoft 365 admin center

B2B collaboration overview – Microsoft Entra External ID

Create and manage contacts in the Microsoft 365 admin center

Manage users, licenses, guests, and contacts in Microsoft 365 – Training

Create and manage groups, including Microsoft 365 Groups and manage shared mailboxes

Microsoft 365 Groups overview for administrators

Manage Microsoft 365 groups

Create a shared mailbox

Manage and monitor Microsoft 365 licenses, including group-based licensing

Assign licenses to a group using the Microsoft 365 admin center

What is group-based licensing in Microsoft Entra ID?

Perform bulk user management, including Microsoft Graph PowerShell and Microsoft Entra PowerShell

Manage Microsoft 365 user accounts, licenses, and groups with PowerShell

Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell – Training

Manage roles and role groups

Implement and manage roles in Microsoft 365 and Microsoft Entra ID

Microsoft Entra built-in roles

About admin roles in the Microsoft 365 admin center

Manage permissions for Microsoft Defender XDR, Microsoft Purview and other Microsoft 365 workloads using roles or role groups

Permissions in the Microsoft Purview portal

Roles and role groups in Microsoft Defender for Office 365 and Microsoft Defender XDR

Manage delegation by using administrative units

Administrative units in Microsoft Entra ID

Manage users in an administrative unit – Microsoft Entra

Manage Microsoft Entra ID roles in Microsoft Entra Privileged Identity Management (PIM)

What is Privileged Identity Management?

Assign Microsoft Entra roles in PIM

Plan a Privileged Identity Management deployment

Implement and manage Microsoft Entra identity and access (25–30%)

Implement and manage identity synchronization with Microsoft Entra tenant

Prepare for identity synchronization, including IdFix

Prepare for identity synchronization to Microsoft 365 – Training

Prepare directory attributes for synchronization with Microsoft 365 by using the IdFix tool

Implement and manage directory synchronization by using Microsoft Entra Connect Sync or Microsoft Entra Cloud Sync

Microsoft Entra Connect Sync: Understand and customize synchronization

What is Microsoft Entra Cloud Sync?

Microsoft Entra Connect cloud sync tutorial for a new forest

Monitor synchronization by using Microsoft Entra Connect Health

Using Microsoft Entra Connect Health with sync

Microsoft Entra Connect Health: Diagnose duplicated attribute synchronization errors

Troubleshoot synchronization, including Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync

Microsoft Entra Connect: Troubleshoot errors during synchronization

Microsoft Entra Cloud Sync troubleshooting

Implement and manage authentication

Implement and manage authentication methods

Manage authentication methods – Microsoft Entra ID

Authentication methods in Microsoft Entra ID

Implement and manage self-service password reset (SSPR)

Enable Microsoft Entra self-service password reset

Deployment considerations for Microsoft Entra self-service password reset

Self-service password reset deep dive

Implement and manage Microsoft Entra Password Protection

What is Microsoft Entra Password Protection?

Plan and deploy on-premises Microsoft Entra Password Protection

Investigate and resolve authentication issues

Troubleshoot self-service password reset

Troubleshoot sign-in problems with Conditional Access

Sign-in diagnostic in Microsoft Entra ID

Implement and manage secure access

Plan for identity protection

What is Microsoft Entra ID Protection?

Plan a Microsoft Entra ID Protection deployment

Implement and manage Microsoft Entra Identity Protection

Microsoft Entra ID Protection risk-based access policies

Configure the MFA registration policy – Microsoft Entra ID Protection

Remediate risks and unblock users in Microsoft Entra ID Protection

Plan Conditional Access policies

Plan a Conditional Access deployment

What is Conditional Access?

Implement and manage Conditional Access policies

Plan a Conditional Access deployment

Building a Conditional Access policy

Common Conditional Access policies

Implement and manage multifactor authentication (MFA) by using Conditional Access policies

Require MFA for all users with Conditional Access

Deployment considerations for Microsoft Entra multifactor authentication

Risk-based user sign-in protection in Microsoft Entra ID

Manage security and threats by using Microsoft Defender XDR (30–35%)

Review and respond to security reports and alerts generated by Microsoft Defender XDR

Review and respond to threats by using Microsoft Security Exposure Management, including the Microsoft Secure Score

Microsoft Security Exposure Management overview

Microsoft Secure Score

Improve your security posture with Microsoft Secure Score

Review and respond to incidents and alerts generated by Microsoft Defender XDR, including advanced hunting

Incidents and alerts in the Microsoft Defender portal

Investigate incidents in the Microsoft Defender portal

Advanced hunting overview – Microsoft Defender XDR

Review and respond to issues identified in Microsoft Defender XDR reports

Visualize security impact with the unified security summary

Reports overview in the Microsoft Defender portal

Review and respond to threats identified by Microsoft Defender Threat Intelligence

Threat analytics in Microsoft Defender

Understand the analyst report section in threat analytics

What is Microsoft Defender Threat Intelligence?

Implement and manage email and collaboration protection by using Microsoft Defender for Office 365

Implement threat policies and rules in Microsoft Defender for Office 365

Configure threat policies – Microsoft Defender for Office 365

Preset security policies in EOP and Microsoft Defender for Office 365

Anti-malware policies – Microsoft Defender for Office 365

Configure alert policies in Microsoft Defender for Office 365

Alert policies in the Microsoft Defender portal

Investigate and respond to email and collaboration threats by using Microsoft Defender for Office 365

Threat investigation and response capabilities in Microsoft Defender for Office 365

Security Operations Guide for Defender for Office 365

Remediate risks with Microsoft Defender for Office 365 – Training

Manage attack simulations, including training campaigns

Get started using Attack simulation training

Simulate a phishing attack with Attack simulation training

Attack simulation training deployment considerations and FAQ

Manage restricted entities, including blocked users

Microsoft Defender for Office 365 in the Microsoft Defender portal

Remove blocked users from the Restricted entities page

Implement and manage endpoint protection by using Microsoft Defender for Endpoint

Onboard devices to Microsoft Defender for Endpoint

Onboard devices to Microsoft Defender for Endpoint

Get devices onboarded to Microsoft Defender for Endpoint

Onboarding using Microsoft Intune – Microsoft Defender for Endpoint

Configure endpoint settings

Manage endpoint security policies in Microsoft Defender for Endpoint

Configure Microsoft Defender for Endpoint with Intune and onboard devices

Review and respond to vulnerabilities identified in the Microsoft Defender Vulnerability Management dashboard

Defender Vulnerability Management dashboard

Exposure score in Defender Vulnerability Management

Security recommendations in Defender Vulnerability Management

Implement and manage Microsoft Defender for Cloud Apps

Configure the app connector for Microsoft 365

Connect Microsoft 365 to Microsoft Defender for Cloud Apps

App connectors in Microsoft Defender for Cloud Apps

Configure Microsoft Defender for Cloud Apps policies, including triggering alerts

Control cloud apps with policies – Microsoft Defender for Cloud Apps

Alert policies in Microsoft Defender for Cloud Apps

Interpret activity log

Activity log in Microsoft Defender for Cloud Apps

Configure Cloud App Discovery

Set up Cloud Discovery – Microsoft Defender for Cloud Apps

Cloud Discovery in Microsoft Defender for Cloud Apps

Review and respond to issues identified in Cloud App Discovery

Cloud Discovery anomaly detection policy – Microsoft Defender for Cloud Apps

Review discovered apps – Microsoft Defender for Cloud Apps

Manage compliance by using Microsoft Purview (10–15%)

Implement Microsoft Purview information protection and data lifecycle management

Implement and manage sensitive information types by using keywords, keyword lists, or regular expressions

Learn about sensitive information types – Microsoft Purview

Create a custom sensitive information type in the Microsoft Purview portal

Create a custom sensitive information type using PowerShell

Implement retention labels, retention label policies, and retention policies

Learn about retention policies and retention labels – Microsoft Purview

Create and configure retention policies – Microsoft Purview

Create retention labels for exceptions to your retention policies

Implement sensitivity labels and sensitivity label policies

Learn about sensitivity labels – Microsoft Purview

Get started with sensitivity labels – Microsoft Purview

Create and configure sensitivity labels and their policies

Monitor label usage by using Content explorer, Activity explorer, and label reports

Get started with content explorer – Microsoft Purview

Get started with Activity explorer – Microsoft Purview

Classifiers overview – Microsoft Purview

Implement Microsoft Purview data loss prevention (DLP)

Configure DLP policies for Microsoft 365 workloads, including Exchange Online, SharePoint Online, OneDrive, Teams, Power BI, and Microsoft 365 Copilot

Learn about data loss prevention – Microsoft Purview

Data Loss Prevention policy reference – Microsoft Purview

Learn about using Microsoft Purview DLP to protect interactions with Microsoft 365 Copilot

Configure Endpoint DLP

Learn about Endpoint data loss prevention – Microsoft Purview

Get started with Endpoint data loss prevention – Microsoft Purview

Review and respond to DLP alerts, events, and reports

Get started with the DLP alerts dashboard – Microsoft Purview

Learn about investigating data loss prevention alerts – Microsoft Purview

View the reports for data loss prevention – Microsoft Purview

This brings us to the end of the MS-102 Microsoft 365 Administrator exam study guide.

What do you think? Let me know in the comments section if I have missed out on anything. Also, I love to hear from you how your preparation is going on!

In case you are preparing for other Microsoft 365 certification exams, check out the Microsoft 365 study guide for those exams.

Follow Me to Receive Updates on MS-102 Exam


Want to be notified as soon as I post? Subscribe to the RSS feed / leave your email address in the subscribe section. Share the article to your social networks with the below links so it can benefit others.

Share the MS-102 Study Guide in Your Network

You may also like