Microsoft 365 Security, Compliance, and Deployment Flashcards

FrontBack
How does Microsoft 365 ensure data encryptionMicrosoft 365 uses encryption at rest and in transit to protect data
Name three key security features of Microsoft 365Microsoft Defender for Office 365 Advanced Threat Protection and Conditional Access
What compliance standards does Microsoft 365 supportMicrosoft 365 supports GDPR HIPAA ISO 27001 and more
What is FastTrack for Microsoft 365FastTrack helps organizations plan deploy and adopt Microsoft 365 services
What are the key tools for deployment in Microsoft 365Tools include FastTrack Microsoft Endpoint Manager and Configuration Manager
What is included in Microsoft Defender for Office 365Protection against phishing malware and business email compromise
What is the role of Intune in Microsoft 365 securityIntune manages mobile devices apps and access policies
How does Microsoft 365 handle data loss prevention DLPDLP prevents sensitive information from being shared externally or mishandled
What support options does Microsoft offer for businesses using Microsoft 365Options include online documentation community support and premium support plans
What are the steps for deploying Microsoft 365Plan the deployment configure tenant settings assign licenses and roll out to users
What is Multi-Factor Authentication MFA and why is it importantMFA adds an extra layer of security by requiring two or more forms of authentication
How does Microsoft 365 support secure remote workThrough VPN-less access MFA and secure file sharing
What is Conditional Access in Microsoft 365Conditional Access controls access based on user conditions such as location or device
What is the purpose of the Microsoft 365 Security and Compliance CenterIt provides tools to manage compliance policies and monitor security risks
What is Zero Trust in Microsoft 365 securityZero Trust assumes no implicit trust and verifies every request as if it originates from an open network