Device Management Microsoft 365 allows administrators to manage devices that are used to connect to services. Administrators can enforce features and stipulations, such as requiring a password to unlock a device, ensuring that the device is not rooted or jailbroken, and selectively wiping company data from the device. The following two services are used to ...
Category: Describe Identity Concepts
Document Storage – Describe Zero Trust Principles for Microsoft 365
Document Storage Although documents can be accessed from almost all the services of the suite, Microsoft 365 has three primary interfaces (listed next) where users can store, share, and collaborate on files: The underlying storage component for all these interfaces is SPO. Documents stored in SPO (or any service that leverages SharePoint) are automatically indexed, ...
Auditing – Describe Zero Trust Principles for Microsoft 365
Auditing Auditing determines which actions were executed by which identity, and the time those actions were performed. As described earlier, Microsoft 365 allows administrators to audit actions that are performed in the service regarding file sharing and collaboration, syncing, deletion, and access. A comprehensive zero-trust policy will ensure that auditing data is captured for security ...
Encryption – Describe Zero Trust Principles for Microsoft 365
Encryption Encryption, a critical part of the zero-trust strategy, is a mechanism that protects information from unauthorized access. Data stored or transmitted in clear text can potentially be intercepted or modified by bad actors. Encryption can help protect against both unauthorized access and data alteration. Microsoft 365 implements several encryption technologies across the platform. Encryption ...
Describe Microsoft Granular Delegated Admin Privileges (GDAP) Principles – Describe Zero Trust Principles for Microsoft 365
Describe Microsoft Granular Delegated Admin Privileges (GDAP) Principles Zero trust principles such as least privilege don’t just apply to your organization. In the context of service providers, it’s important to make sure that they are also following secure administration practices. This is whereGranular Delegated Admin Privileges (GDAP) comes into play. GDAP’s capabilities empower partners to ...