Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
The company has the offices shown in the following table.

Contoso has IT, human resources (HR), legal, marketing, and finance departments. Contoso uses Microsoft 365.

Existing Environment


Infrastructure

The network contains an Active Directory domain named contoso.com that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. Password writeback is enabled.
The domain contains servers that run Windows Server 2016. The domain contains laptops and desktop computers that run Windows 10 Enterprise.
Each client computer has a single volume.
Each office connects to the Internet by using a NAT device. The offices have the IP addresses shown in the following table.

From the Multi-Factor Authentication page, an address space of 198.35.3.0/24 is defined in the trusted IPs list.
Azure Multi-Factor Authentication (MFA) is enabled for the users in the finance department.
The tenant contains the users shown in the following table

Customer Lockbox is enabled in Microsoft 365.


Microsoft Endpoint Manager Configuration


The devices enrolled in Microsoft Endpoint Manager are configured as shown in the following table

The Mark devices with no compliance policy assigned as the setting are set to Compliant.


Requirements


Technical Requirements

Contoso identifies the following technical requirements:
Use the principle of least privilege
Enable User1 to assign the Reports reader role to users
Ensure that User6 approves Customer Lockbox requests as quickly as possible
Ensure that User9 can enable and configure Azure AD Privileged Identity Management

Quiz
0 votes, 0 avg
14
Created by admin@beexam.com

Microsoft 365

Microsoft Security Administration(MS-500) Case Study-7

Test your skills in computer security with Microsoft 365 Security Administration

1 / 5

Device 2 is compliant?

2 / 5

Device 5 is compliant?

3 / 5

Device 6 is compliant?

4 / 5

Which policies apply to which devices? To answer, select the appropriate options in the answer area.

DevicePolicy1

5 / 5

Which policies apply to which devices? To answer, select the appropriate options in the answer area.

DevicePolicy2

Your score is

The average score is 61%

0%

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

7 ways the public can spy on your IP Address

November 7, 2021 0 Comments 0 tags

So, you think your IP Address is not known to the public on the internet, you are not quite 100% correct. There are ways people on the internet and people

Difference between hard reset and soft reset on mobile devices?

Mobile Device
November 13, 2021 0 Comments 0 tags

When your phone freezes, it could be annoying as the touchscreen could become unresponsive at times. In some cases, buttons do not register anything with the mobile phone. This could

Learn about Update Management on Windows 10

November 20, 2021 0 Comments 0 tags

Microsoft periodically releases software updates (also known as patches) that are important for your software after release. Microsoft has product teams that are responsible for continually monitoring and improving their