You need to meet the technical requirement for large-volume document retrieval.What should you create?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 subscription.You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization.You need to be notified if the SharePoint sharing policy is modified in the future.Solution: From the Security & Compliance admin center, you create a threat management policy.Does this meet the goal?
You have a Microsoft 365 subscription.All users have their email stored in Microsoft Exchange Online.In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.What should you do?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are deploying Microsoft Endpoint Manager.You successfully enroll Windows 10 devices in Endpoint Manager.When you try to enroll an iOS device in Endpoint Manager, you get an error.You need to ensure that you can enroll the iOS device in Endpoint Manager.Solution: You add your user account as a device enrollment manager.Does this meet the goal?
HOTSPOT -You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
On which server should you install the Defender for Identity sensor?