CS-900 Microsoft Security Fundamentals Flashcards

1
Q

Describe the shared responsibility model

A

Identifies which security tasks are handled by the cloud provider, and which security tasks are handled by you, the customer. The responsibilities vary depending on where the workload is hosted. It makes responsibilities clear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Defense in Depth

A

Layered approach to security, rather than relying on a single perimeter. A defense in-depth strategy uses a series of mechanisms to slow the advance of an attack. Each layer provides protection so that, if one layer is breached, a subsequent layer will prevent an attacker getting unauthorized access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zero Trust Model

A

Assumes everything is on an open and untrusted network, even resources behind the firewalls of the corporate network. The Zero Trust model operates on the principle of “trust no one, verify everything.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

A

Is the process of making data unreadable and unusable to unauthorized viewers. To use or read encrypted data, it must be decrypted, which requires the use of a secret key. There are two top-level types of encryptions: symmetric and asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing

A

Uses an algorithm to convert text to a unique fixed-length value called a hash. Each time the same text is hashed using the same algorithm, the same hash value is produced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Salted

A

Refers to adding a fixed-length random value to the input of hash functions to create unique hashes for same input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Compliance

A

Regulations to help protect and govern the use of data. From personal and financial information to data protection and
privacy, organizations can be accountable for meeting dozens of regulations to be compliant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data residency

A

Governs the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally. These regulations can differ significantly depending on jurisdiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data sovereignty

A

The concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed. Can be subject to laws from different countries/regions if processing, storage or collection are done in different locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data privacy

A

Providing notice and being transparent about the collection, processing, use, and sharing of personal data are fundamental principles of privacy laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personal Data or PII

A

Any data that is directly linked or indirectly linkable back to a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Azure Policy

A

Enforce standards and assess compliance across your organization no matter who you are, evaluates all
resources in Azure and Arc enabled resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Azure Role Based Access Control (RBAC)

A

Manages who has access to Azure resources, what they can do with those resources,
and what areas they can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Catalog

A

Find relevant data using a search experience with filters based on various lenses like glossary terms, classifications, sensitivity labels, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Estate Insights

A

Gives a bird’s eye view and at a glance understanding of what data is actively scanned, where sensitive data is, and how it moves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Map

A

Scanning registered data sources is able to capture metadata about enterprise data, to identify and classify sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authentication (AuthN)

A

Process of proving that a person is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authorization (AuthZ)

A

What that person can see and touch and where they can go (Permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identity

A

Set of things that define or characterize someone or something. (Username and password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

4 Pillars:

A

Administration – creation and management/governance of identities for users, devices, and services
Authentication – sufficient proof that you are who you claim to be
Authorization – level of access granted to entity
Auditing – tracking of who does what, when, where, and how (in-depth reporting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identity Provider

A

Creates, maintains, and manages while providing authentication, authorization, and auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Active Directory

A

Stores info about members of the domain including devices and users, verifies their credentials and defines their access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Federation

A

Enables the access of services across organizational or domain boundaries by establishing trust relationships between the respective domain’s identity provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Azure AD Free

A

You can administer users, create groups, sync with on premise AD, create basic reports, config self service passwords, and enable single sign on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Office 365 Apps – Everything from free plus self-service password reset, device writeback (2-way access with on prem).

A

Everything from free plus self-service password reset, device writeback (2-way access with on premise).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Azure AD Premium 1

A

Everything from Free and Office 365 plus advanced admin, dynamic groups, self-service group management, Microsoft IAM, and cloud write back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Azure Ad Premium 2

A

All of the above plus Azure ID protection (risked based conditional access to apps), Privileged ID Management (discover, restrict, and monitor) admins and their access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Users

A

Representations of something that is managed in Azure (employees, guests).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Service Principal

A

Identity for an application, register with Azure AD, enables AuthN and AuthZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Managed Identities

A

Type of service principal that are automatically managed in Azure AD. Eliminate the need for developers to manage credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

System Assigned Identity

A

When you enable managed identity on a service instance. Tied to lifecycle and is deleted when resource is deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

User Assigned Identity– manage as a stand alone can be assigned to 1 or more instances of a service.

A

Manage as a stand alone can be assigned to 1 or more instances of a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Azure AD Registered Devices

A

Provides users with support for bring your own device (BYOD) or mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Azure AD Joined

A

Device joined to Azure AD through an organizational account, which is then used to sign into the device. Azure AD joined devices are generally owned by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Hybrid Azure AD Joined

A

Existing on-premises Active Directory implementations can benefit from the functionality provided by Azure AD. The devices are joined to your on-premises Active Directory and Azure AD requiring organizational account to sign into the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

External Identities

A

Set of capabilities that enable organizations to allow access to external users, such as customers or partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

B2B

A

Allows you to share your organization’s applications and services with guest users from other organizations, while maintaining control over your own data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

B2C

A

Customer identity access management (CIAM) solution. allows external users to sign in with their preferred social, enterprise, or local account identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Hybrid Identity

A

Identity solutions span on-premises and cloud-based capabilities and create a common user identity for authentication and authorization to all resources, regardless of location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Azure AD Password hash synchronization

A

Simplest way to enable authentication for on-premises directory objects in Azure AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Azure AD pass through authentication

A

Allows users to sign into both on-premises and cloud-based applications using the same passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Federated authentication

A

Azure AD hands off the authentication process to a separate trusted authentication system, to validate the user’s password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Windows Hello

A

Replaces passwords with strong two-factor authentication on devices. Key or certificate tied to a device and something that the person knows (a PIN) or something that the person is (biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Fido2

A

Open standard for password less authentication uses an external security key, or a platform key built into a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Azure AD Password Protection

A

Detects, and blocks known weak passwords and their variants, and can also block other weak terms that are specific to your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Protecting against password spray

A

Password spray attacks submit only a few of the known weakest passwords against each of the accounts in an enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Hybrid security

A

Component installed in the on-premises environment receives the global banned password list and custom password protection policies from Azure AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Conditional Access

A

Policies that provides an extra layer of security before allowing authenticated users to access data or other assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Conditional Access Signals

A

User or group membership, Named Location, Device, Application, Real time sign in risk detection, Cloud apps or actions, User risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Access Controls

A

Decisions to grant access, block access, that require extra verification (MFA, Device or App is Compliant, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Sessions controls

A

Enable limited experiences within specific cloud apps. (Blocking copy, paste, cut, print, etc.…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Built-in-Roles

A

Pre-Configured and can not be altered in anyway (Global Admin, User Admin, Billing Admin)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Custom Roles

A

Allows you to choose permissions from a list of available permissions in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Scope

A

Set of Azure AD resources the role member has access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Azure AD Specific

A

Grant permissions to manage resources with Azure only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Azure AD Service Specific

A

For major Microsoft 365 services Azure has built in roles that grant permissions to manage those services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Azure AD Cross Service

A

Roles that span across services like security admin and compliance admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Azure AD Cross Service

A

Roles that span across services like security admin and compliance admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Azure AD RBAC

A

Control access to Azure AD resources like groups, users, and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Azure RBAC

A

Control access to Azure resource like virtual machines or storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Identity Governance

A

Gives the ability to control the identity lifecycle, access lifecycle, and secure privileged access for admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Identity Lifecycle

A

No access (Pre-Employment), Join (Hired), Move (Role change), Leave (retirement). Updating access to what a user needs access to at each point in the journey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Privileged access Lifecycle

A

Monitoring of admin access to reduce risk of misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Entitlement Management

A

Enables managing identity and access at scale by automating access request workflows, access assignments, reviews, and expirations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Challenges when managing employee access to resources

A

Access for external users
Internal users do not know what access they need
Getting approval for access
Holding access for longer than needed

66
Q

Capabilities to address these challenges

A

Delegate to non admins

users can be invited into directory and removed automatically

67
Q

Access Reviews

A

Enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignment

68
Q

Terms of use

A

Are presented to users prior to access, relevant disclaimers

69
Q

Conditional Access

A

Requires users to accept terms of use prior to gaining access

70
Q

Privileged Identity Management (PIM)

A

Enables you to manage, control, and monitor access to important resources

71
Q

Security information and event management (SIEM)

A

Identity protection tool like Microsoft Sentinel

72
Q

Sign-in Risks Detected by Azure AD

A
Anonymous IP address
Atypical travel
Malware linked IP address
Unfamiliar sign-in properties
Password spray 
Azure AD threat intelligence
73
Q

User Risks Detected by Azure AD

A

Leaked credentials

Azure AD threat intelligence

74
Q

Azure Identity Protection reports

A

risky user, risky sign ins, risk detections

75
Q

Distributed Denial of Service (DDoS)

A

Purpose is to overwhelm the resources of your apps and services making them slow and unresponsive

76
Q

Volumetric attacks

A

Flood the network with seemingly legitimate traffic, overwhelming the available bandwidth.

77
Q

Protocol attacks

A

Render a target inaccessible by exhausting server resources with false protocol requests that exploit weaknesses in layer 3 (network) and layer 4 (transport) protocols.

78
Q

Resource (application) layer attacks

A

Target web application packets, to disrupt the transmission of data between hosts.

79
Q

Azure DDoS Protection

A

Designed to protect apps and servers by analyzing network traffic and discarding anything that looks like a DDoS attack
Always on

80
Q

Azure Firewall

A

Managed, cloud-based network security service that protects your Azure virtual network (VNet) resources from attackers

81
Q

Azure Firewall Features

A

Built-in high availability and availability zones
Network and application-level filtering
Outbound SNAT and inbound DNAT to communicate with internet resources
Multiple public IP addresses
Threat intelligence
Integration with Azure Monitor

82
Q

Web Application Firewall (WAF)

A

Centralized protection of your web applications from common exploits and vulnerabilities

83
Q

Azure Virtual Network (VNet)

A

Fundamental building block for your organization’s private network in Azure.

84
Q

Network security groups (NSGs)

A

Allow you to filter network traffic to and from Azure resources in an Azure virtual network

85
Q

Inbound & Outbound Security

A

Evaluated by priority using five information points: source, source port, destination, destination port, and protocol to either allow or deny the traffic
Can not be removed but can be overwritten by new rules with higher priority

86
Q

NSG Rule Properties

A
unique name that describes its purpose
priority order, with lower numbers processed before higher numbers.
Source or destination
Protocol
Direction, in or out
Port range
Action
87
Q

Azure Bastion

A

Service you deploy that lets you connect to a virtual machine using your browser and the Azure portal

88
Q

Just in Time Access (JIT)

A

Allows lock down of the inbound traffic to your VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed
Microsoft Defender for servers to be enabled

89
Q

Bastion Features

A

DP and SSH directly in Azure portal
Remote session over TLS and firewall traversal for RDP/SSH:
No Public IP required on the Azure VM
No hassle of managing NSGs
Protection against port scanning
Hardening in one place to protect against zero-day exploits

90
Q

Azure Storage Service Encryption

A

Protects data at rest by automatically encrypting it and decrypts the data before retrieval

91
Q

Azure Disk Encryption

A

Encrypt Windows and Linux IaaS virtual machine disks (bitlocker)

92
Q

Transparent Data Encryption (TDE)

A

Real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application

93
Q

Azure Key Vault

A

Centralized cloud service for storing your application secrets

94
Q

Cloud security posture management (CSPM)

A

New class of tools designed to assess system automatically and alert IT if vulnerability is found

95
Q

Microsoft Defender for Cloud

A

Tool for threat protection and security posture management by protecting workloads running in
Azure, hybrid, and other cloud platforms by continuously assessing, securing, and defending

96
Q

Cloud workload Protection (CWP)

A

Detect and resolve threats to resources, workloads, and services

97
Q

Defender for Cloud Free

A

Provides the secure score and its related features: security policy, continuous security assessment, and actionable security recommendations

98
Q

Defender for Cloud Enhanced Security

A

Extends the capabilities of the free mode to workloads running in Azure, hybrid, and other cloud platforms, providing unified security management and threat protection across your workloads

99
Q

Defender Enhanced Security Features:

A

Comprehensive endpoint detection and response.
Vulnerability scanning for virtual machines, container registries, and SQL resources
Multi-cloud security
Hybrid security
Threat protection alerts
Track compliance with a range of standards
Access and application controls

100
Q

Azure Security Benchmark (ASB) - provides prescriptive best practices and recommendations to help improve the security of workloads, data, and services on Azure (Very similar to the CCM)

A

Provides prescriptive best practices and recommendations to help improve the security of workloads, data, and services on Azure (Very similar to the CCM)

101
Q

Security Baselines for Azure

A

Provide organizations a consistent experience when securing their environment through improved tooling, tracking, and security features

102
Q

Security information event management (SIEM)

A

Tool to collect data from across the whole estate, including infrastructure, software, and resources and analyzes, looks for correlations or anomalies, and generates alerts and incidents

103
Q

Security orchestration automated response (SOAR)

A

Takes the alerts and triggers action driven automated workflows and process to run security and mitigate issues

104
Q

Sentinel

A

Single solution for alert detection, threat visibility, proactive hunting, and threat response.

105
Q

End-to-end functionality of Microsoft Sentinel

A

Collect
Detect
Investigate
Respond

106
Q

Capacity Reservations

A

You’re billed a fixed fee based on the selected tier, enabling a predictable total cost for Microsoft Sentinel

107
Q

Pay-As-You-Go

A

You’re billed per gigabyte (GB) for the volume of data ingested for analysis in Microsoft Sentinel and stored in the Azure Monitor Log Analytics workspace.

108
Q

365 Defender

A

Enterprise defense suite that protects against sophisticated cyberattacks that can natively coordinate the detection, prevention, investigation, and response to threats across endpoints, identities, email, and applications

109
Q

Defender for Office 365

A

Safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools

110
Q

Defender for Office 365 Keys areas of cover

A

Threat protection policies
Reports
Threat investigation and response capabilities
Automated investigation and response capabilities

111
Q

Defender for Endpoint

A

Is a platform designed to help enterprise networks protect endpoints by preventing, detecting, investigating, and responding to advanced threats. This technology built into Windows 10 and MSFT cloud services.

112
Q

Defender for Endpoint includes

A
Threat and vulnerability management
Attack surface reduction
Next generation protection
Endpoint detection and response
Automated investigation and remediation 
Microsoft Threat Experts
Management and APIs
113
Q

Defender for cloud

A

Comprehensive cross-SaaS solution that operates as an intermediary or CASB between a cloud user and the cloud provider

114
Q

Cloud Access Security Broker (CASB) - a gatekeeper to broker real-time access between your enterprise users and the cloud resources they use at all times and on any device

A

Gatekeeper to broker real-time access between your enterprise users and the cloud resources they use at all times and on any device

115
Q

Defender for cloud Four Pillars

A

Visibility
Threat Protection
Data Security
Compliance

116
Q

Defender for cloud Framework

A

Discover and control the use of Shadow IT
Protect against cyberthreats and anomalies
Protect your sensitive information anywhere in the cloud
Assess your cloud apps’ compliance

117
Q

Defender for Cloud Features and Functionality

A
Cloud Discovery 
Sanction and un-sanctioning apps 
App Connectors 
Conditional Access 
Policies
118
Q

Defender for Identity

A

Uses on premises Active Directory Data to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions

119
Q

Defender Portal

A

Natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks

Must be assigned the appropriate role to access the Portal

120
Q

Hunting

A

Query-based threat-hunting tool that lets security professionals explore up to 30 days of raw data

121
Q

Threat Analytics

A

Threat intelligence solution from expert Microsoft security researchers

122
Q

Secure Score

A

Represents a company security posture

123
Q

Learning Hub

A

Official guidance from resources such as the Microsoft security blog, the Microsoft security community on YouTube, and the official documentation at docs.microsoft.com

124
Q

Reports

A

General security report, and branch into specific reports about endpoints, email & collaboration

125
Q

Service Trust Portal

A

Provides information, tools, and other resources about Microsoft security, privacy, and compliance practices

126
Q

Trust Portal Provides Access to

A
Compliance Manager
Trust Documents
Industries & Regions
Trust Center
Resources
My Library
More - Global admin only
127
Q

Privacy Principles

A
Control
Transparency
Security
Strong Legal Protection
No Content Based Targeting
Benefits to You
128
Q

Priva

A

Microsoft’s way of assisting customers with privacy. Using a privacy by default stance

129
Q

Purview Compliance Portal

A

Tools and data that are needed to help understand and manage an organization’s compliance needs
Requires Global Admin, Compliance Admin, or Compliance data admin to access

130
Q

Compliance Manager

A

Feature of Purview to help with compliance requirements by inventorying risks, managing controls, staying current with regulations and certs

131
Q

Compliance Manager Key Elements

A

Controls - requirement of a regulation, standard, or policy defining how to assess and manage
Assessments - grouping of controls from a specific regulation, standard, or policy
Templates - help admins to quickly create assessments, can be modified for specific needs
Improvement Actions - centralize compliance activities, recommended guidance to align with data protection regulations and standards

132
Q

Benefits of Compliance Manager

A

Translating complicated regulations, standards, company policies, or other control framework
Providing access to a large variety of out-of-the-box assessments and custom assessments
Mapping regulatory controls against recommended improvement actions
Providing step-by-step guidance on how to implement the solutions
Helping admins and users to prioritize actions that will have the highest impact

133
Q

Use and Benefits of Compliance Score

A

Measures progress in completing recommended improvement actions within controls
Understand current compliance posture
Prioritize actions based on their potential to reduce risk

134
Q

Purview Data Lifecycle Management

A

Import, store, and classify business-critical data so you can keep what you need and delete what you don’t

135
Q

Know your data

A

Understand data landscape and identify important data across on-premises, cloud, and hybrid environments

136
Q

Protect your data

A

Apply flexible protection actions including encryption, access restrictions, and visual markings

137
Q

Prevent data loss

A

Detect risky behavior and prevent accidental oversharing of sensitive information

138
Q

Govern your data

A

Automatically keep, delete, and store data and records in a compliant manner

139
Q

Three ways to identify items for classification:

A

Manually, pattern recognition, machine learning

140
Q

Sensitivity Labels

A

Add layer of security that is used to determine what can be done with the content

141
Q

Label Policies

A

Publish labels to be used to groups or users

142
Q

Endpoint data loss Prevention

A

Extends the activity monitoring and protection to items that are physically stored

143
Q

Data loss prevention in Microsoft Teams

A

Administrators can define policies that prevent users from sharing sensitive information in a Teams chat session or channel, whether in a message, or a file

144
Q

Retention Label and Policies

A

Help organizations to manage and govern information by ensuring content is kept only for a required time, and then permanently deleted

145
Q

Records Management

A

solution to manage regulatory, legal, and business-critical records across their corporate data

146
Q

Records Management Features

A

Labeling content as a record.
Establishing retention and deletion policies within the record label
Triggering event-based retention.
Reviewing and validating disposition.
Proof of records deletion.
Exporting information about disposed items.

147
Q

Insider Risk Management

A

Helps minimize internal risks by enabling an organization to detect, investigate, and act on risky and malicious activities.

148
Q

Insider risk management workflow

A

Identify, investigate, and address internal risks using policy templates, comprehensive activity signaling across Microsoft 365, and a flexible workflow

149
Q

Insider risk management is centered around

A

Transparency
Configurability
Integrated
Actionable

150
Q

Communication Compliance

A

Helps minimize communication risks by enabling organizations to detect, capture, and take remediation
actions for inappropriate messages

151
Q

Information Barriers

A

policies that admins can configure to prevent individuals or groups from communicating with each other
Can only be used as a two-way solution. Cannot block in one direction

152
Q

eDiscovery Solutions in Purview

A

identifying and delivering electronic information that can be used as evidence in legal cases.

153
Q

Three Levels of eDiscovery Solutions

A

Content Search - tool to search for content across Microsoft 365 data sources and then export the search results to a local computer
eDiscovery (Standard) – above plus, enabling you to create eDiscovery cases and assign eDiscovery managers to specific cases.
eDiscovery (Premium) – above plus, provides an end-to-end workflow to identify, preserve, collect, review, analyze, and export content that’s responsive to your organization’s internal and external investigations

154
Q

Audit Solutions in Purview

A

help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations

155
Q

Audit Standard

A

Ability to log and search for audited activities and power your forensic, IT, compliance, and legal investigations. On by default for all orgs

156
Q

Audit Premium

A

Builds on standard with audit log retention policies and longer retention of audit records, audit records for high-value crucial events to help investigate possible security or compliance breaches and determine the scope of compromise, more bandwidth to access auditing logs

157
Q

Azure Policy

A

Enforce standards and assess compliance across your organization no matter who you are, evaluates all resources in Azure and Arc enabled resources

158
Q

Azure Policy Triggers

A

A resource has been created, deleted, or updated in scope with a policy assignment.
A policy or an initiative is newly assigned to a scope.
A policy or an initiative that’s been assigned to a scope is updated.
The standard compliance evaluation cycle (happens once every 24 hours

159
Q

Azure Blueprints

A

Way to define a repeatable set of Azure resources, for rapid deployment and provisioning of new environments

160
Q

Microsoft Purview

A

Unified data governance service that helps organizations manage and govern their on-premises, multi-cloud, and software-as-a-service (SaaS) data. With Microsoft Purview, organization can create a holistic, up-to-date map of the organization’s data landscape with automated data discovery, sensitive data
classification, and end-to-end data lineage.