Microsoft Entra ID
Microsoft Entra ID
What is Microsoft Entra authentication?
Authentication methods supported by Microsoft Entra ID
Phishing-resistant authentication methods
What is application management in Microsoft Entra ID?
Role-based access control in Microsoft Entra ID
Microsoft Entra ID supports two types of roles definitions: Built-in roles and Custom roles
How Microsoft Entra roles are different from other Microsoft 365 roles
Categories of Microsoft Entra roles
What is enterprise user management?
Common signals
Common decisions
Commonly applied policies
Zero Trust
There are three ways to get a device identity:
Microsoft Entra registration
Microsoft Entra join
Microsoft Entra hybrid join
Modern device scenario
Resource access
What is hybrid identity with Microsoft Entra ID?
What is app provisioning in Microsoft Entra ID?
Protocol Connector
SCIM SCIM - SaaS
SCIM - On-premises / Private network
LDAP LDAP
SQL SQL
REST Web Services
SOAP Web Services
Flat-file PowerShell
Custom Custom ECMA connectors
Connectors and gateways built by partners
What is Microsoft Entra monitoring and health?
Audit logs include the history of every task performed in your tenant.
Sign-in logs capture the sign-in attempts of your users and client applications.
Provisioning logs provide information around users provisioned in your tenant through a third party service.
How to access activity logs in Microsoft Entra ID
You can access Microsoft Entra activity logs and reports using the following methods:
Stream activity logs to an event hub to integrate with other tools
Access activity logs through the Microsoft Graph API
Integrate activity logs with Azure Monitor logs
Monitor activity in real-time with Microsoft Sentinel
View activity logs and reports in the Microsoft Entra admin center
Export activity logs for storage and queries
What is Microsoft Entra Domain Services?
Microsoft Entra Domain Services provides managed domain services such as domain join, group policy, lightweight
directory access protocol (LDAP), and Kerberos/NTLM authentication. You use these domain services without the
need to deploy, manage, and patch domain controllers (DCs) in the cloud.