exam questions

Exam MS-500 All Questions

View all questions & answers for the MS-500 exam

Exam MS-500 topic 1 question 22 discussion

Actual exam question from Microsoft's MS-500
Question #: 22
Topic #: 1
[All MS-500 Questions]

HOTSPOT -
You have a Microsoft 365 subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com.
You need to recommend an Azure AD Privileged Identity Management (PIM) solution that meets the following requirements:
✑ Administrators must be notified when the Security administrator role is activated.
✑ Users assigned the Security administrator role must be removed from the role automatically if they do not sign in for 30 days.
Which Azure AD PIM setting should you recommend configuring for each requirement? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:
Reference:
https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts?tabs=new https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-how-to-change-default-settings?tabs=new

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kiketxu
Highly Voted 4 years, 3 months ago
If I'm right....(if not, please appreciated someone point me right) #1 Role activation alert is in "Roles" under Assignments (or Assignments in the blade directly), select i.e. Security Admin role and go to notifications section in settings. #2 Despite under Alerts are two triggers that could raise an alert for "Elegible administrators aren't using their privileged roles (<30days)" or "Potential stale accounts in a privileged role (without setting available)" I don't see anywhere an option to automate removal. So, I would answer "Access Reviews" as the only possible way I found to automate action to remove role. https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts?tabs=new#administrators-arent-using-their-privileged-roles Additional link: https://docs.microsoft.com/es-es/azure/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts?tabs=new
upvoted 45 times
w00t
4 years, 3 months ago
Pretty positive you're right. #1 = ROLE #2 = ALERT They have the answer backwards.
upvoted 2 times
w00t
4 years, 3 months ago
CONFIRMED 1 - ROLE 2 - ALERT If you go into PIM > Roles > Select Any Role > Role Settings > "Send notifications when eligible members activate this role" - This is all within ROLE SETTINGS. Has nothing to do with "Alerts".
upvoted 5 times
...
Anonymousse
2 years, 8 months ago
This has been verified. They do in fact have the answer backwards. I checked in a real environment on 10/22/22. Under Roles is where you define the notifications and under alerts is where you define when to send the alert that the account has not been logged into in X days.
upvoted 2 times
Anonymousse
2 years, 8 months ago
The setting is under Potential stale accounts in a privileged role, but it's just the settings. I can't confirm if it "automatically" removes the role however.
upvoted 1 times
...
...
...
ellik
4 years, 2 months ago
I agree with you as it is mentioned that >>>Regularly review accounts with privileged roles using access reviews and remove role assignments that are no longer needed. I also checked the AAD and you can specify the role and the action to remove-approve-take recommendation
upvoted 1 times
...
prabhjot
3 years, 11 months ago
agree 1) role and 2) Access Review
upvoted 2 times
...
Am3lectric
3 years, 7 months ago
I agree. 1) Roles 2) Access Reviews
upvoted 4 times
...
...
Rafale
Highly Voted 4 years, 3 months ago
Given answers are correct 1- Alert 2- Role
upvoted 15 times
...
GatesBill
Most Recent 2 years, 3 months ago
#1: Roles #2: Access reviews Pretty sure about this and can be confirmed by testing in lab environments.
upvoted 4 times
...
Jonclark
2 years, 4 months ago
This question is outdated. Currently, you would configure this by logging into the Azure portal, opening Privileged Identity Management -> Roles -> (whatever role you want to set the alert for) -> Role Settings. Inside the settings, you'll see a "notifications" tab, which will allow you to set the configuration that meets the requirement. Don't get thrown off by the word "Alert" which you will see elsewhere. Yes, this is an alert, but you configure it as a part of notifications.
upvoted 2 times
...
zerrowall
2 years, 6 months ago
Regarding 2nd question. To fulfill this requirement, you can create an access review with the following options: Inactive users (on tenant level) only - True Days inactive - 30 days Auto apply results to resource - Enable If reviewer don't respond - Remove access General doc is here: https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review#create-access-reviews see the item from 11: "...Or, you can create access reviews only for inactive users (preview). In the Users scope section, set the Inactive users (on tenant level) only to true. If the toggle is set to true, the scope of the review will focus on inactive users only. Then, specify Days inactive with a number of days inactive up to 730 days (two years). Users inactive for the specified number of days will be the only users in the review."
upvoted 2 times
...
TweetleD
2 years, 7 months ago
Answer is wrong. Notifications is under roles and to remove assignment if no sign in after 30 days has to be done in an Access Review
upvoted 3 times
...
ccadenasa
2 years, 8 months ago
The correct answers are Roles and Alerts. In Roles, you can see the Role settings for each role, including Role assignment Alert. Under Alerts, there is a pre-define alert for "Eligible administrators aren't activating their privileged role". By default the number of days is set to 30 but can be reduced or extend it.
upvoted 1 times
...
DragonsGav
2 years, 8 months ago
I believe correct answer is "Roles" for both as per, https://learn.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings
upvoted 3 times
...
Trainee2244
2 years, 9 months ago
#1Role # Access Review I dont get why so many have role and alert x)
upvoted 7 times
...
dakasa
2 years, 10 months ago
I would say both settings are reachable from "Role". https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings
upvoted 1 times
...
Eltooth
2 years, 11 months ago
Roles Access Reviews
upvoted 3 times
...
tatendazw
3 years, 2 months ago
Roles (Roles&Admin > Role settings > scroll to send notifications ...) Access review (Settings > Enable reviewer decision helpers > No sign-in 30 days (If enabled, system recommends reviewers to deny users who have not signed-in within 30 days. Recommendation accounts for both interactive and non-interactive sign-ins.)
upvoted 4 times
...
CatoFong
3 years, 5 months ago
1. Roles 2. Access Review
upvoted 1 times
...
mkoprivnj
3 years, 7 months ago
#1: ROLE #2: ACCESS REVIEWS
upvoted 1 times
...
xroxro
3 years, 7 months ago
#1✑ Administrators must be notified when the Security administrator role is activated. I found the option in role->settings->notification So for me the answer is ROLE #2 ✑ Users assigned the Security administrator role must be removed from the role automatically if they do not sign in for 30 days. There is such option in role I though the answer was ACCESS REVIEW but i did not see an option to remove the role if the user does not login since ... Any help ?
upvoted 3 times
...
BuzzyC
3 years, 7 months ago
It is absolutely 1. Roles 2. Access Reviews Roles > Settings > Send notifications when eligible members activate this role Access Reviews > New > Duration > 30 days, End Never Upon completion settings > If reviewer doesn't respond > Remove access Alerts only alert on issues (stale accounts, users not using PIM etc - it does not action anything, not does it alert on when users are enabling PIM access as they should - which is what the question is asking)
upvoted 3 times
...
aryaid88
3 years, 9 months ago
Alerts and Role - Access review is part of Identity Governance and not part of PIM. Inside PIM under Manage AD role you will find the role assignment and you can edit its attributes.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...