
MS-102 Exam Information and Outline
Microsoft 365 Administrator
MS-102 Exam Syllabus & Study Guide
Before you start practicing with our exam simulator, it is essential to understand the official MS-102 exam objectives. This course outline serves as your roadmap, breaking down exactly which technical domains and skills will be tested. By reviewing the syllabus, you can identify your strengths and focus your study time on the areas where you need the most improvement.
The information below reflects the latest 2026 course contents as defined by Microsoft. We provide this detailed breakdown to help you align your preparation with the actual exam format, ensuring there are no surprises on test day. Use this outline as a checklist to track your progress as you move through our practice question banks.
Below are complete topics detail with latest syllabus and course outline, that will help you good knowledge about exam objectives and topics that you have to prepare. These contents are covered in questions and answers pool of exam.
Deploy and manage a Microsoft 365 tenant
- Implement and manage a Microsoft 365 tenant
- Create a tenant
- Implement and manage domains
- Configure org settings, including Security & privacy and Organizational profile
- Monitor the health of Microsoft 365 services by using Service Health, including configuration of notifications
- Configure and review Network connectivity insights
- Configure and monitor software updates by using the Microsoft 365 admin center
- Monitor Microsoft 365 adoption and usage
- Configure and manage Microsoft 365 Backup
- Manage users and groups
- Create and manage users in Microsoft Entra, including external users
- Create and manage contacts in the Microsoft 365 admin center
- Create and manage groups, including Microsoft 365 groups and shared mailboxes
- Manage and monitor Microsoft 365 licenses, including group-based licensing
- Perform bulk user management, including PowerShell
- Manage roles and role groups
- Implement and manage roles in Microsoft 365 and Microsoft Entra
- Manage role groups in Microsoft Defender XDR, Microsoft Purview, and Microsoft 365 workloads
- Manage delegation by using administrative units
- Manage Microsoft Entra roles in Microsoft Entra privileged identity management (PIM)
Implement and manage Microsoft Entra identity and access
- Implement and manage identity synchronization with Microsoft Entra tenant
- Prepare for identity synchronization, including IdFix
- Implement and manage directory synchronization by using Microsoft Entra Connect Sync or Microsoft Entra Cloud Sync
- Monitor synchronization by using Microsoft Entra Connect Health
- Troubleshoot synchronization, including Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync
- Implement and manage authentication
- Implement and manage authentication methods
- Implement and manage self-service password reset (SSPR)
- Implement and manage Microsoft Entra Password Protection
- Investigate and resolve authentication issues
- Implement and manage secure access
- Plan for identity protection
- Implement and manage Microsoft Entra ID Protection
- Plan Conditional Access policies
- Implement and manage Conditional Access policies
- Implement and manage multifactor authentication (MFA) by using conditional access policies
Manage security and threats by using Microsoft Defender XDR
- Review and respond to security reports and alerts generated by Microsoft Defender XDR
- Review and respond to threats by using Exposure Management, including the Microsoft Secure Score
- Review and respond to incidents and alerts generated by Microsoft Defender XDR, including guided hunting
- Review and respond to issues identified in Microsoft Defender XDR reports
- Review and respond to threats identified by Threat intelligence
- Implement and manage email and collaboration protection by using Microsoft Defender for Office 365
- Implement threat policies and rules in Microsoft Defender for Office 365
- Configure alert policies in Microsoft Defender for Office 365
- Investigate and respond to email and collaboration threats by using Microsoft Defender for Office 365
- Manage attack simulations, including training campaigns
- Manage restricted entities, including blocked users
- Implement and manage endpoint protection by using Microsoft Defender for Endpoint
- Onboard devices to Defender for Endpoint
- Configure endpoint settings
- Review and respond to vulnerabilities identified in the Microsoft Defender Vulnerability Management dashboard
- Implement and manage Microsoft Defender for Cloud Apps
- Configure the app connector for Microsoft 365
- Configure Microsoft Defender for Cloud Apps policies, including triggering alerts
- Interpret activity log
- Configure Cloud App Discovery
- Review and respond to issues identified in Cloud App Discovery
Manage compliance by using Microsoft Purview
- Implement Microsoft Purview information protection and data lifecycle management
- Implement and manage sensitive information types by using keywords, keyword lists, or regular expressions
- Implement retention labels, retention label policies, and retention policies
- Implement sensitivity labels and sensitivity label policies
- Monitor label usage by using Content explorer, Activity explorer, and label reports
- Implement Microsoft Purview data loss prevention (DLP)
- Configure DLP policies for Exchange, SharePoint, OneDrive, and Teams
- Configure Endpoint DLP
- Review and respond to DLP alerts, events, and reports