Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring Microsoft Defender for Identity integration with Active Directory.From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.Solution: You add each account as a Sensitive account.Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring Microsoft Defender for Identity integration with Active Directory.From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.Solution: From Azure AD Identity Protection, you configure the sign-in risk policy.Does this meet the goal?
You are configuring Microsoft Cloud App Security.You have a custom threat detection policy based on the IP address ranges of your company's United States-based offices.You receive many alerts related to impossible travel and sign-ins from risky IP addresses.You determine that 99% of the alerts are legitimate sign-ins from your corporate offices.You need to prevent alerts for legitimate sign-ins from known locations.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.
You have a Microsoft 365 tenant that uses Microsoft Exchange Online and Microsoft Defender for Office 365.What should you use to identify whether zero-hour auto purge (ZAP) moved an email message from the mailbox of a user?
You have a Microsoft 365 subscription that contains 1,000 Windows 10 devices. The devices have Microsoft Office 365 installed.You need to mitigate the following device threats:✑ Microsoft Excel macros that download scripts from untrusted websites✑ Users that open executable attachments in Microsoft Outlook✑ Outlook rules and forms exploitsWhat should you use?
Your company has a single office in Istanbul and a Microsoft 365 subscription.The company plans to use conditional access policies to enforce multi-factor authentication (MFA).You need to enforce MFA for all users who work remotely.What should you include in the solution?