Author: Sophia Lisk

  • Authentication types-Describe security, compliance, privacy, and trust in Microsoft 365

    The traditional means of authenticating a user’s identity is for the individual to supply an account name and a password. In Microsoft 365, administrators can create password policies that compel users to create long and complex passwords and change them frequently. However, passwords are always subject to potential weaknesses that make them an unwieldy authentication…

    Read More: Authentication types-Describe security, compliance, privacy, and trust in Microsoft 365
  • Microsoft Defender for Identity-Describe security, compliance, privacy, and trust in Microsoft 365

    Microsoft Defender for Identity, formerly known as Azure Advanced Threat Protection (Azure ATP), is a product that protects the identities stored in Active Directory. There was at one time a separate Defender for Identity management portal, but the interface has now been integrated into the Microsoft 365 Defender portal. Defender for Identity monitors the Active…

    Read More: Microsoft Defender for Identity-Describe security, compliance, privacy, and trust in Microsoft 365
  • Describe how Microsoft 365-Describe security, compliance, privacy, and trust in Microsoft 365

    Risk management is a highly specialized undertaking heavily dependent on the type and sensitivity of the information to be protected and the nature of the threats to which the network is most vulnerable. For example, an organization that consists mostly of IT professionals will not be overly susceptible to phishing attacks because they have more…

    Read More: Describe how Microsoft 365-Describe security, compliance, privacy, and trust in Microsoft 365
  • Describe Microsoft 365 Defender-Describe security, compliance, privacy, and trust in Microsoft 365

    As shown in Figure 3-19, Microsoft 365 Defender treats security as though it’s divided into four domains: Identity, Endpoints, Apps, and Email/Collaboration Data. On many enterprise networks, the security operations for the four domains are separate, as each of them requires intense scrutiny. So, the people responsible for Identity security might not know about everything…

    Read More: Describe Microsoft 365 Defender-Describe security, compliance, privacy, and trust in Microsoft 365

Search

Popular Posts

  • Summary-Describe security, compliance, privacy, and trust in Microsoft 365
    Summary-Describe security, compliance, privacy, and trust in Microsoft 365

    Thought experiment In this thought experiment, demonstrate your skills and knowledge of the topics covered in this chapter. You can find the answers to this thought experiment in the next section. Ralph is the Director of the Brooklyn datacenter at Contoso Corp. The company currently has three office buildings in the New York area with…

  • Anticipating threats-Describe security, compliance, privacy, and trust in Microsoft 365
    Anticipating threats-Describe security, compliance, privacy, and trust in Microsoft 365

    Arguably, the most difficult part of the risk management planning process is trying to anticipate all the possible threats that could afflict the company’s data in the future. The three basic risk factors for the data—confidentiality, integrity, and availability—can be exploited in any number of specific ways, but the general threat categories are listed in…

  • Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365
    Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365

    The third element of the digital estate that must be considered when creating a risk management plan is the people who actually access the data. Whether deliberately or inadvertently, users are a constant vulnerability—if not an actual threat—to the organization’s data. After quantifying the organization’s information assets and their value and inventorying the hardware used…

Tags

There’s no content to show here yet.