Skill Area | Key Capabilities |
Conditional Access | Design policies (risk-based, device, location) |
Entra ID P2 Features | Risk-based MFA, Identity Protection, Access Reviews |
Privileged Identity Management (PIM) | JIT elevation, role governance, approval workflows |
Authentication | MFA (phishing-resistant), passwordless, FIDO2 |
External Identity | B2B/B2C collaboration controls |
Identity Governance | Lifecycle workflows, entitlement mgmt |
Defender for Endpoint (MDE) | Deployment, onboarding, sensor health |
Threat & Vulnerability Mgmt | Exposure scoring, remediation planning |
Attack Surface Reduction | ASR rules, device control, exploit protection |
Endpoint Detection & Response | Investigation, response actions, automation |
Integration | MDE + Intune + Sentinel correlations |
Device Enrollment | Autopilot, hybrid join, Azure AD join |
Compliance Policies | Conditional access integration |
Configuration Profiles | Baselines, security hardening |
Application Management | Win32, M365 apps, patching strategy |
Mobile Application Mgmt (MAM) | BYOD app protection policies |
Defender for Office 365 | Safe Links, Safe Attachments, anti-phish |
Defender for Identity | On-prem AD monitoring, lateral movement detection |
Defender for Cloud Apps | CASB, session controls, shadow IT |
XDR Integration | Cross-workload correlation, incident mgmt |
Automation | Automated investigation and response (AIR) |
JIT Access | PIM design and enforcement |