Sharing End User Controls Sharing can be done by almost all clients. Supported clients include the following: Outlook sharing is particularly interesting because it allows users to attach files to email messages as cloud attachments, thus automatically sharing those files out of their OneDrive personal storage. Endusers can even configure the permissions the recipients can ...
Category: Describe the Zero-Trust Model
Infrastructure – Describe Zero Trust Principles for Microsoft 365
Infrastructure Applying zero trust principles to your infrastructure means that, as an administrator, you need to take a holistic view of everything that interacts with your organization’s data, including servers, cloud infrastructure and platforms, and development environments. You can use a tool such as Microsoft Defender for Cloud, which is a Cloud Security Posture Management ...
Encryption – Describe Zero Trust Principles for Microsoft 365
Encryption Encryption, a critical part of the zero-trust strategy, is a mechanism that protects information from unauthorized access. Data stored or transmitted in clear text can potentially be intercepted or modified by bad actors. Encryption can help protect against both unauthorized access and data alteration. Microsoft 365 implements several encryption technologies across the platform. Encryption ...
Describe the Identity and Access Management Capabilities of Microsoft 365 – Understand Identity and Access Management Solutions
Describe the Identity and Access Management Capabilities of Microsoft 365 Entra ID provides a full suite of identity and access management capabilities, including the provisioning, role and privilege assignment, delegation, and retirement of identity. In addition to acting as an identity store, Entra also enables policy-based access, secure authorization, auditing, and entitlement management. The key ...