DRAG DROP -You have a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. All the devices in the tenant are managed by using Microsoft Endpoint Manager.You purchase a cloud app named App1 that supports session controls.You need to ensure that access to App1 can be reviewed in real time.Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.Select and Place:
You configure several Microsoft Defender for Office 365 policies in a Microsoft 365 subscription.You need to allow a user named User1 to view Microsoft Defender for Office 365 reports in the Threat management dashboard.Which role provides User1 with the required role permissions?
You have a Microsoft 365 Enterprise E5 subscription.You use Microsoft Defender for Endpoint.You plan to use Microsoft 365 Attack simulator.What is a prerequisite for running Attack simulator?
You have a Microsoft 365 E5 subscription and a hybrid Microsoft Exchange Server organization.Each member of a group named Executive has an on-premises mailbox. Only the Executive group members have multi-factor authentication (MFA) enabled. Each member of a group named Research has a mailbox in Exchange Online.You need to use Microsoft Office 365 Attack simulator to model a spear-phishing attack that targets the Research group members.What should you do first?
You have a Microsoft 365 E5 subscription.You implement Microsoft Defender for Office 365 safe attachments policies for all users.User reports that email messages containing attachments take longer than expected to be received.You need to reduce the amount of time it takes to receive email messages that contain attachments. The solution must ensure that all attachments are scanned for malware. Attachments that have malware must be blocked.What should you do?
You have several Conditional Access policies that block noncompliant devices from connecting to services.You need to identify which devices are blocked by which policies.What should you use?