Microsoft • SC-401
Plan and implement information security of sensitive data using Microsoft Purview and related services. Covers information protection, data loss prevention, retention, and managing risks and alerts.
Questions
939
Duration
100 minutes
Passing Score
700/1000
Difficulty
AssociateLast Updated
Jan 2026
The SC-401 exam, Administering Information Security in Microsoft 365, validates a candidate's ability to plan and implement information security for sensitive data using Microsoft Purview and related Microsoft services. The exam covers a broad set of data security disciplines including information protection, data loss prevention (DLP), data lifecycle retention, and insider risk management—all within the Microsoft 365 ecosystem. It also addresses the increasingly critical domain of protecting data used by AI services, reflecting Microsoft's focus on securing AI-driven workloads through tools like Data Security Posture Management (DSPM) for AI.
Passing SC-401 earns the Microsoft Certified: Information Security Administrator Associate certification, which replaced the retired SC-400 (Information Protection and Compliance Administrator) certification as of May 31, 2025. The exam encompasses deep technical skills across Microsoft Purview's sensitivity labels, exact data match classifiers, trainable classifiers, endpoint DLP, adaptive scopes, insider risk policies, and audit capabilities—as well as integration points with Microsoft Defender for Cloud Apps, Microsoft Defender XDR, and Microsoft Entra. Candidates must demonstrate proficiency not only in configuring these tools but also in interpreting policy precedence, managing alerts and cases, and responding to security incidents.
This certification is designed for information security administrators and compliance professionals who work primarily within Microsoft 365 environments. Ideal candidates hold roles such as Information Security Administrator, Compliance Specialist, Security Analyst, Microsoft 365 Security Engineer, or Governance and Risk Consultant. These professionals are responsible for designing and enforcing data protection policies, responding to DLP and insider risk alerts, and collaborating with workload administrators, business application owners, and governance stakeholders to implement organization-wide security controls.
The certification is particularly well-suited for mid-career professionals who already have hands-on experience with Microsoft 365 services and are looking to formalize and advance their expertise in the data security and compliance space. It also serves as a stepping stone toward the expert-level Microsoft Certified: Cybersecurity Architect Expert credential.
Microsoft does not enforce formal prerequisites for SC-401, but strong familiarity with the Microsoft 365 platform is essential for success. Candidates should have working knowledge of Microsoft Purview services (including sensitivity labels, DLP policies, retention policies, and insider risk management), Microsoft Entra (formerly Azure AD), the Microsoft Defender portal, and Microsoft Defender for Cloud Apps. Comfort with PowerShell for administrative scripting is also expected, as some exam topics involve command-line management of Purview components.
In terms of experience, Microsoft recommends that candidates have practical, hands-on experience administering information security within a Microsoft 365 tenant. Familiarity with data governance concepts such as data classification, information barriers, records management, and regulatory compliance frameworks will provide important context. Candidates who previously held the SC-400 certification (now retired) will find much of the foundational content familiar, though SC-401 expands coverage into AI data security and updated Purview features.
SC-401 is a proctored exam administered through Pearson VUE and can be taken online or at a testing center. Candidates are given 100 minutes to complete the assessment. The exam contains approximately 65 questions, including a case study with approximately 4 questions and a set of yes/no (binary choice) questions. No performance-based lab (PBT) questions are included. Question types typically include multiple choice, multiple select, drag-and-drop scenario questions, and case study-based items.
The exam is scored on a scale of 1–1000, and a passing score of 700 is required. Scores are reported immediately upon completion. Candidates who fail may retake the exam after 24 hours; subsequent retakes have a variable waiting period per Microsoft's retake policy. The exam is available in English, Portuguese (Brazil), French, German, Japanese, Chinese (Simplified), and Spanish. Non-English speakers may request an additional 30 minutes if taking the exam in a non-native language.
Earning the Microsoft Certified: Information Security Administrator Associate through SC-401 positions professionals for high-demand roles at the intersection of cybersecurity, compliance, and data governance. Certified individuals typically qualify for titles such as Information Security Administrator, Compliance Specialist, Security Analyst, Microsoft 365 Security Engineer, and Governance and Risk Consultant. According to industry salary data for 2025, certified information security administrators in Microsoft environments can expect annual compensation ranging from approximately $90,000 to $120,000 depending on experience, geography, and organization size—with senior and consulting roles commanding higher figures.
The certification carries strong market recognition because it validates expertise in Microsoft Purview, one of the most widely deployed enterprise compliance platforms globally. It directly replaces the retired SC-400 certification, meaning organizations that previously required SC-400 are now looking for SC-401 holders. The credential also integrates well into broader Microsoft security career paths: it builds on the SC-900 foundations and aligns with the SC-100 (Cybersecurity Architect Expert) expert-level certification for those pursuing advanced roles. Microsoft certifications renew annually via a free online assessment on Microsoft Learn, keeping the credential current without requiring a full re-examination.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 939 questions.
1. Contoso has created multiple sensitivity labels with different priority levels for their organization. The label named Public Data has a priority number of 3, Standard Internal has priority 5, and Confidential has priority 8. Two labels are simultaneously applied to the same document, creating a conflict. Which label will take precedence?
Explanation
In Microsoft 365 sensitivity labeling, higher priority numbers take precedence when label conflicts occur. Confidential with priority 8 ranks higher than Standard Internal at priority 5 and Public Data at priority 3. This design ensures that more restrictive classifications override less restrictive ones when conflicts arise. The creation date doesn't determine precedence, and the system doesn't make random selections - it follows the explicit priority hierarchy defined by administrators.
2. Tailwind Traders is implementing Adaptive Protection and wants to understand how risk level assignments change over time. A user is assigned elevated risk on Monday based on confirmed high-severity alerts. By Friday, no new risky activities are detected. Assuming Tailwind configured a 7-day risk level timeframe, what will happen to this user's risk level assignment?
Explanation
Adaptive Protection automatically resets risk levels based on the configured timeframe setting. With a 7-day timeframe, the elevated risk assignment will automatically reset seven days after assignment (on the following Monday) unless other factors extend it. Risk levels can also reset when the associated alert is dismissed or the case is resolved, but automatic timeframe-based reset is the primary mechanism for preventing outdated risk assessments from indefinitely restricting users. The risk level doesn't remain elevated indefinitely, and it doesn't immediately reset—it follows the configured timeframe duration.
3. Contoso's data governance team must create a comprehensive inventory of all files containing credit card numbers (a sensitive information type) across Exchange, SharePoint, OneDrive, and Teams. They need to know the file names, locations, current classification status, and retention settings. Which approach should they use?
Explanation
Data Explorer allows filtering on specific sensitive information types like credit card numbers and provides a consolidated view across all workloads with file metadata, classification status, and retention settings. The export functionality generates the comprehensive inventory needed. Activity Explorer tracks user actions rather than identifying data inventory. Information Protection reports show detection trends but not detailed file lists. Content Explorer (classic) requires manual navigation to each location separately.
4. Contoso has identified three categories of sensitive data in their organization: customer personally identifiable information, intellectual property documents, and financial records. They want to implement a comprehensive information protection strategy that includes detecting this sensitive data, applying visual markings and encryption, preventing accidental oversharing, and ensuring compliant retention. Which sequence of actions represents the correct order for implementing Contoso's data protection strategy?
Explanation
The correct sequence follows Microsoft's data protection framework: Know Your Data, Protect Your Data, Prevent Data Loss, and Govern Your Data. First, you must detect and identify sensitive data using sensitive information types to understand what you are protecting. Second, you apply protection actions including encryption, access restrictions, and visual markings through sensitivity labels. Third, you prevent data loss by detecting risky behavior and preventing accidental oversharing through DLP policies and rules. Finally, you govern your data by automatically retaining, deleting, and storing data in a compliant manner. Attempting to apply protection before identifying sensitive data is ineffective. Preventing data loss before establishing detection mechanisms is not feasible. Retention policies should be implemented last after protection and loss prevention measures are in place.
5. Fabrikam needs to implement sensitivity labels but encounters a critical issue: three team members cannot access the label creation interface in the Microsoft Purview Compliance Portal despite having elevated permissions in their departments. What is the most likely cause of this access issue?
Explanation
Access to label creation and policy publishing requires explicit role assignment of Compliance Administrator, Security Administrator, or Information Protection Admin roles through Microsoft Entra ID or the Purview Compliance Portal. Departmental permissions do not grant access to these administrative features. Publishing delays affect label visibility in user applications, not administrative access to creation interfaces. Application versions don't restrict access to the Purview portal itself. Label policy scoping affects which users receive labels, not which administrators can create them. Double key encryption is a label setting, not a prerequisite for accessing the creation interface. Role assignment is the fundamental requirement for administrative access to label management.
One-time access to this exam