Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
The company has the offices shown in the following table.

Contoso has IT, human resources (HR), legal, marketing, and finance departments. Contoso uses Microsoft 365.

Existing Environment


Infrastructure

The network contains an Active Directory domain named contoso.com that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. Password writeback is enabled.
The domain contains servers that run Windows Server 2016. The domain contains laptops and desktop computers that run Windows 10 Enterprise.
Each client computer has a single volume.
Each office connects to the Internet by using a NAT device. The offices have the IP addresses shown in the following table.

From the Multi-Factor Authentication page, an address space of 198.35.3.0/24 is defined in the trusted IPs list.
Azure Multi-Factor Authentication (MFA) is enabled for the users in the finance department.
The tenant contains the users shown in the following table

Customer Lockbox is enabled in Microsoft 365.


Microsoft Endpoint Manager Configuration


The devices enrolled in Microsoft Endpoint Manager are configured as shown in the following table

The Mark devices with no compliance policy assigned as the setting are set to Compliant.


Requirements


Technical Requirements

Contoso identifies the following technical requirements:
Use the principle of least privilege
Enable User1 to assign the Reports reader role to users
Ensure that User6 approves Customer Lockbox requests as quickly as possible
Ensure that User9 can enable and configure Azure AD Privileged Identity Management

Quiz
0 votes, 0 avg
14
Created by admin@beexam.com

Microsoft 365

Microsoft Security Administration(MS-500) Case Study-7

Test your skills in computer security with Microsoft 365 Security Administration

1 / 5

Device 2 is compliant?

2 / 5

Device 5 is compliant?

3 / 5

Device 6 is compliant?

4 / 5

Which policies apply to which devices? To answer, select the appropriate options in the answer area.

DevicePolicy1

5 / 5

Which policies apply to which devices? To answer, select the appropriate options in the answer area.

DevicePolicy2

Your score is

The average score is 61%

0%

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

Microsoft Security Administration(MS-500) Case Study-3

January 25, 2022 0 Comments 0 tags

Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattleand New York.The company has the offices shown in the following

3 Shocking Types of Malwares

Types of Malware
October 9, 2021 0 Comments 1 tag

Malware is a broader term used in the computer field for most unwanted malicious software. This software’ may get installed onto your computers with or without your permission and can

Learn about Update Management on Windows 10

November 20, 2021 0 Comments 0 tags

Microsoft periodically releases software updates (also known as patches) that are important for your software after release. Microsoft has product teams that are responsible for continually monitoring and improving their