Author: Sophia Lisk

  • Protecting endpoints-Describe security, compliance, privacy, and trust in Microsoft 365-2

    In Microsoft 365, UEM capability is implemented in the Microsoft 365 Enterprise and Business Premium products and in the Enterprise Mobility + Security (EMS) product. Microsoft Intune is also available as a separate product in two plans and a suite that provides a range of capabilities. The Microsoft tools relevant to the UEM effort in…

    Read More: Protecting endpoints-Describe security, compliance, privacy, and trust in Microsoft 365-2
  • Something you are-Describe security, compliance, privacy, and trust in Microsoft 365

    The something you are is usually some type of biometric scan. The Windows Hello for Business feature in Windows 10 and 11 supports multifactor authentication with biometric scans as one of the factors. It is also possible to use the Microsoft Authenticator app for mobile devices as a biometric scanner that enables users to access…

    Read More: Something you are-Describe security, compliance, privacy, and trust in Microsoft 365
  • Microsoft Defender for Cloud Apps-Describe security, compliance, privacy, and trust in Microsoft 365

    Microsoft Defender for Cloud Apps is a cloud access security broker (CASB), essentially an intermediary between Microsoft 365 cloud users and the cloud-based Software as a Service (SaaS) apps they run. Like the other Defender products, the administrative interface for Defender for Cloud Apps has been integrated into the Microsoft 365 Defender portal. Defender for…

    Read More: Microsoft Defender for Cloud Apps-Describe security, compliance, privacy, and trust in Microsoft 365
  • Describe Microsoft Secure Score benefits and capabilities-Describe security, compliance, privacy, and trust in Microsoft 365

    Microsoft Secure Score is a feature found in the Microsoft 365 Defender portal that displays a dashboard of the network’s overall security posture, as shown in Figure 3-26. Secure Score is designed to help administrators learn more about the inner security workings of their networks. FIGURE 3-26 The Microsoft Secure Score Overview dashboard The Secure…

    Read More: Describe Microsoft Secure Score benefits and capabilities-Describe security, compliance, privacy, and trust in Microsoft 365
  • Describe the capabilities and benefits of Microsoft Sentinel and Microsoft 365 Lighthouse-Describe security, compliance, privacy, and trust in Microsoft 365

    Security Information and Event Management (SIEM) is a type of product that combines two technologies: security event management (SEM) and security information management (SIM). Together, the two technologies form a solution that can gather and analyze information about a network’s security events. SIEM tools collect information from logs and various other security mechanisms and evaluate…

    Read More: Describe the capabilities and benefits of Microsoft Sentinel and Microsoft 365 Lighthouse-Describe security, compliance, privacy, and trust in Microsoft 365
  • Self-service password reset-Describe security, compliance, privacy, and trust in Microsoft 365

    Self-service password reset (SSPR) is a feature in Azure Active Directory that enables users to reset their own forgotten passwords, change their existing passwords, and unlock their accounts when they have been frozen. This can significantly reduce routine trouble calls without sacrificing identity security. Before users can reset their own passwords, administrators must enable SSPR…

    Read More: Self-service password reset-Describe security, compliance, privacy, and trust in Microsoft 365
  • Microsoft Defender for Endpoint-Describe security, compliance, privacy, and trust in Microsoft 365

    Endpoints are the devices connected to a network: computers, smartphones, tablets, wireless access points, routers, and firewalls. All endpoints are potential points of vulnerability, and Microsoft Defender for Endpoint is designed to discover, configure, and monitor these endpoints. Defender for Endpoint can also remediate the issue when it detects suspicious behavior. As with all of…

    Read More: Microsoft Defender for Endpoint-Describe security, compliance, privacy, and trust in Microsoft 365
  • Password authentication-Describe security, compliance, privacy, and trust in Microsoft 365

    A password is something you know, and this has been the standard means of authenticating users’ identities for many years. Password authentication costs nothing to implement, and it can be relatively secure. However, there are many possible flaws in the password authentication model. For example, passwords can be forgotten, shared, written down, easily guessed, or…

    Read More: Password authentication-Describe security, compliance, privacy, and trust in Microsoft 365
  • Protecting endpoints-Describe security, compliance, privacy, and trust in Microsoft 365-1

    At one time, enterprise network security consisted of company-owned computers (deployed and managed internally), and protected using password policies, firewalls, antivirus software, and dial-up and virtual private network connections for a few remote users. Network administrators controlled all the equipment, and a generation of Client Management Tools (CMTs) appeared, such as Microsoft’s System Center Configuration…

    Read More: Protecting endpoints-Describe security, compliance, privacy, and trust in Microsoft 365-1
  • Protecting identities-Describe security, compliance, privacy, and trust in Microsoft 365

    All identities are a potential source of risk for the entire network, no matter what level of privileges they possess. Once attackers compromise one identity, it becomes relatively easy to spread laterally within the enterprise and compromise others. Therefore, administrators should try to protect all identities, not just the ones with administrative privileges. One of…

    Read More: Protecting identities-Describe security, compliance, privacy, and trust in Microsoft 365

Search

Popular Posts

  • Summary-Describe security, compliance, privacy, and trust in Microsoft 365
    Summary-Describe security, compliance, privacy, and trust in Microsoft 365

    Thought experiment In this thought experiment, demonstrate your skills and knowledge of the topics covered in this chapter. You can find the answers to this thought experiment in the next section. Ralph is the Director of the Brooklyn datacenter at Contoso Corp. The company currently has three office buildings in the New York area with…

  • Anticipating threats-Describe security, compliance, privacy, and trust in Microsoft 365
    Anticipating threats-Describe security, compliance, privacy, and trust in Microsoft 365

    Arguably, the most difficult part of the risk management planning process is trying to anticipate all the possible threats that could afflict the company’s data in the future. The three basic risk factors for the data—confidentiality, integrity, and availability—can be exploited in any number of specific ways, but the general threat categories are listed in…

  • Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365
    Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365

    The third element of the digital estate that must be considered when creating a risk management plan is the people who actually access the data. Whether deliberately or inadvertently, users are a constant vulnerability—if not an actual threat—to the organization’s data. After quantifying the organization’s information assets and their value and inventorying the hardware used…

Tags