Category: Service Trust Portal

  • Summary-Describe security, compliance, privacy, and trust in Microsoft 365

    Thought experiment In this thought experiment, demonstrate your skills and knowledge of the topics covered in this chapter. You can find the answers to this thought experiment in the next section. Ralph is the Director of the Brooklyn datacenter at Contoso Corp. The company currently has three office buildings in the New York area with…

    Read More: Summary-Describe security, compliance, privacy, and trust in Microsoft 365
  • Priva rights requests-Describe security, compliance, privacy, and trust in Microsoft 365

    In recent years, there has been legislation passed in many countries providing citizens with the right to request that organizations disclose any personal information about them that they possess. These might seem like simple requests to the requestor, but for an organization that maintains a large data store, locating all of the requested information concerning…

    Read More: Priva rights requests-Describe security, compliance, privacy, and trust in Microsoft 365
  • Auditing-Describe security, compliance, privacy, and trust in Microsoft 365

    Microsoft Purview includes auditing capabilities that log operations for many Microsoft 365 applications and services. Administrators can search the audit log directly from the Microsoft Purview portal, providing detailed information that can be useful during security, compliance, and legal investigations. Microsoft Purview can provide two levels of audit logging, as follows: FIGURE 3-49 The Audit…

    Read More: Auditing-Describe security, compliance, privacy, and trust in Microsoft 365
  • Data-Describe security, compliance, privacy, and trust in Microsoft 365

    All the security functions applying to the other five Zero Trust criteria essentially protect the organization’s data—its most valuable resource. Administrators must consider the data’s security in all possible states: in-motion, at-rest, and in-use. Depending on the nature and sensitivity of the data, each state might require different security measures. Microsoft 365 supports tools that…

    Read More: Data-Describe security, compliance, privacy, and trust in Microsoft 365
  • MDM and MAM-Describe security, compliance, privacy, and trust in Microsoft 365

    Securing devices begins with their enrollment using Microsoft Intune when administrators must decide what type of management they will impose on the device. Mobile Device Management (MDM) grants the organization nearly complete control over the device, requiring the user to comply with all the enterprise policies. MDM even allows an administrator to remotely wipe the…

    Read More: MDM and MAM-Describe security, compliance, privacy, and trust in Microsoft 365
  • Endpoints-Describe security, compliance, privacy, and trust in Microsoft 365

    An endpoint is any device that connects to the network from any location, whether the device belongs to the company, an employee, or a guest user. Zero Trust calls for security policies to be applied and enforced uniformly on endpoints of all types by tools such as Microsoft Intune, regardless of the users’ identities or…

    Read More: Endpoints-Describe security, compliance, privacy, and trust in Microsoft 365
  • Identity-Describe security, compliance, privacy, and trust in Microsoft 365

    It’s easy to build a perfectly secure house; just leave out all the windows and doors. Your possessions will be safe, but you won’t be able to get at them. In the same way, it would be easy to build a perfectly secure network by establishing a formidable perimeter around the sensitive resources and not…

    Read More: Identity-Describe security, compliance, privacy, and trust in Microsoft 365
  • Describe the Zero Trust model-Describe security, compliance, privacy, and trust in Microsoft 365

    At one time, enterprise security could be considered a perimeter surrounding an organization. Data remained largely within the organization’s sites and could be protected from unauthorized access by firewalls, virtual private networks (VPNs), and physical barriers. Even when data began to be accessible beyond the organization using Internet websites and portable devices, the company still…

    Read More: Describe the Zero Trust model-Describe security, compliance, privacy, and trust in Microsoft 365
  • Microsoft 365 Lighthouse-Describe security, compliance, privacy, and trust in Microsoft 365

    Small- and medium-sized businesses often lack IT personnel with a sufficient security background to manage and monitor the network using the tools provided in Microsoft 365. This creates a market for managed service providers (MSPs) who can lend their security expertise to their clients to help them protect their networks. Microsoft 365 Lighthouse is a…

    Read More: Microsoft 365 Lighthouse-Describe security, compliance, privacy, and trust in Microsoft 365
  • Protecting documents-Describe security, compliance, privacy, and trust in Microsoft 365

    The fundamental purpose of identities is to protect documents and other data. When protecting identities, the threat of lateral penetration forces administrators to apply equal protection to all of them, regardless of their privileges. However, the security can and should be more selective when protecting documents. While an enterprise might have hundreds or thousands of…

    Read More: Protecting documents-Describe security, compliance, privacy, and trust in Microsoft 365

Search

Popular Posts

  • Summary-Describe security, compliance, privacy, and trust in Microsoft 365
    Summary-Describe security, compliance, privacy, and trust in Microsoft 365

    Thought experiment In this thought experiment, demonstrate your skills and knowledge of the topics covered in this chapter. You can find the answers to this thought experiment in the next section. Ralph is the Director of the Brooklyn datacenter at Contoso Corp. The company currently has three office buildings in the New York area with…

  • Anticipating threats-Describe security, compliance, privacy, and trust in Microsoft 365
    Anticipating threats-Describe security, compliance, privacy, and trust in Microsoft 365

    Arguably, the most difficult part of the risk management planning process is trying to anticipate all the possible threats that could afflict the company’s data in the future. The three basic risk factors for the data—confidentiality, integrity, and availability—can be exploited in any number of specific ways, but the general threat categories are listed in…

  • Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365
    Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365

    The third element of the digital estate that must be considered when creating a risk management plan is the people who actually access the data. Whether deliberately or inadvertently, users are a constant vulnerability—if not an actual threat—to the organization’s data. After quantifying the organization’s information assets and their value and inventorying the hardware used…

Tags