Microsoft Defender for Identity Flashcards
1
Q
What does this tool enable you to do in your organization?
A
Enables you to identify, detect, and investigate advanced threats in your organization.
Example: Using this tool, you can proactively detect and respond to potential cyber threats.
2
Q
What does this tool allow you to monitor?
A
Allows you to monitor user activities and information.
Example: You can track user logins, file access, and data transfers.
3
Q
What can you do throughout the entire cyber-attack kill chain with this tool?
A
Identify and investigate advanced threats throughout the entire cyber-attack kill chain.
Example: This tool helps you trace the steps of a cyber-attack from initial reconnaissance to data exfiltration.