What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management: Provide just-in-time privileged access to Azure AD and Azure resources Assign time-bound access to resources using start and end dates Require approval to activate privileged roles Enforce multi-factor authentication to activate any role Use justification to understand why users activate Get notifications when privileged roles are activated Conduct access reviews to ensure users still need roles Download audit history for internal or external audit Prevents removal of the last active Global Administrator role assignment
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?
The Content Search tool in the Security & Compliance Center can be used to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Skype for Business.
The first step is to starting using the Content Search tool to choose content locations to search and configure a keyword query to search for specific items.
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-for-content?view=o365-worldwide
What should you use in the Microsoft Defender portal to view security trends and track the protection status of identities?
In the Microsoft 365 Defender (Microsoft Defender XDR) portal, the Reports area is the feature designed to surface security trends and provide protection status views across workloads, including identities. Microsoft guidance explains that the Reports workspace offers curated dashboards and exportable reports for specific domains (for example, Identities, Email & collaboration, Endpoints), so security teams can review trend lines, coverage/health, and status without running queries. For identities specifically (backed by Microsoft Defender for Identity), the reports include overview dashboards and scheduled/on-demand reports that show items such as identity security posture, open health issues, alert volumes over time, and sensor/coverage status. This aligns with SCI learning paths that distinguish portal areas by purpose: Secure score is a measurement of overall posture and recommended actions, Incidents is for triage and response to individual cases, and Hunting is for ad-hoc, query-driven investigations. When the task is to ''view security trends and track the protection status of identities,'' Microsoft directs administrators to the Reports > Identities experience in the Defender portal, which provides the built-in, continuously updated visualizations and summaries required for ongoing monitoring.
Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Microsoft Entra ID Identity Protection is a risk-based conditional access capability that ''automates the detection and remediation of identity-based risks'' and enables admins to investigate risky users and sign-ins. SCI guidance explains that Identity Protection evaluates signals such as user risk and sign-in risk, raises risk detections, and can automatically remediate by enforcing actions like password reset or blocking access via risk-based policies. The portal provides rich investigation experiences for risky users, risky sign-ins, and risk detections, allowing security teams to review evidence and confirm/dismiss risks. In addition, identity risk data can be exported through Azure Monitor/diagnostic settings and integrated with SIEM/SOAR tools, enabling ''export of risk detections and security alerts to third-party solutions'' for correlation and response. Tasks such as configuring external access for partner organizations are handled by B2B collaboration features, and creating/assigning sensitivity labels belongs to Microsoft Purview Information Protection---not Identity Protection. Therefore, the tasks Identity Protection supports are: export risk detection (B), automate detection and remediation of identity-based risks (C), and investigate risks related to user authentication (D).
Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal?view=o365-worldwide
Emily Green
13 days agoKimberly Rodriguez
6 days agoDorothy Martinez
9 days agoKevin Nguyen
10 days agoJustine
1 month agoElza
1 month agoTamie
2 months agoLennie
2 months agoKenda
2 months agoAllene
2 months agoMarcelle
3 months agoAdolph
3 months agoLou
3 months agoStephaine
3 months agoCandida
4 months agoGail
4 months agoHarley
4 months agoTemeka
4 months agoLashanda
5 months agoLacresha
5 months agoDante
5 months agoJanet
5 months agoTwana
5 months agoVallie
6 months agoLouisa
6 months agoWilford
6 months agoMauricio
7 months agoYoulanda
7 months agoBrett
7 months agoEttie
7 months agoJeannine
8 months agoGraciela
8 months agoMarsha
8 months agoAlpha
8 months agoAudria
10 months agoChanel
11 months agoAnjelica
1 year agoWava
1 year agoTwanna
1 year agoTawny
1 year agoRosalind
1 year agoGeraldo
1 year agoTelma
1 year agoBlondell
1 year agoRaymon
1 year agoGerald
2 years agoTrinidad
2 years agoMartina
2 years agoFletcher
2 years agoEthan
2 years agoMyrtie
2 years agoSusana
2 years agoCecil
2 years agoEarnestine
2 years agoFelicia
2 years agoRoslyn
2 years agoShawn
2 years agoRefugia
2 years agoHaley
2 years agonormaa
2 years agothomas
2 years agokellisha
2 years agoperrix
2 years agonewtons
2 years ago