You have a hybrid Microsoft Exchange Server organization. All users have Microsoft 365 E5 licenses.You plan to implement a Microsoft Defender for Office 365 anti-phishing policy.You need to enable mailbox intelligence for all users.What should you do first?
HOTSPOT -You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.Four Windows 10 devices are joined to the tenant as shown in the following table.On which devices can you use BitLocker To Go and on which devices can you turn on auto-unlock? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
HOTSPOT -You have a Microsoft 365 subscription that contains a user named User1.You enroll devices in Microsoft Intune as shown in the following table.Each device has two line-of-business apps named App1 and App2 installed.You create application control policies targeted to all the app types in Microsoft Endpoint Manager as shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.Hot Area:
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.You discover that several security alerts are visible from the Microsoft Defender for Identity portal.You need to identify which users in contoso.com can close the security alerts.Which users should you identify?
You have a Microsoft 365 E5 subscription that contains 1,000 Windows 10 devices. The devices are onboarded to Microsoft Defender for Endpoint.You need to view a consolidated list of the common vulnerabilities and exposures (CVE) that affect the devices. The solution must minimize administrative effort.Which Threat & Vulnerability Management page should you use?
You have several Conditional Access policies that block noncompliant devices from connecting to services.You need to identify which devices are blocked by which policies.What should you use?