Microsoft 365 Fundamentals Practice Test (MS-900)
Use the form below to configure your Microsoft 365 Fundamentals Practice Test (MS-900). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft 365 Fundamentals MS-900 Information
The Microsoft 365 Fundamentals (MS-900) certification is an entry-level credential designed for individuals looking to demonstrate foundational knowledge of Microsoft's cloud services. This certification focuses on core concepts of Microsoft 365, including cloud computing models, productivity solutions, collaboration tools, security, compliance, and pricing structures. It provides a broad understanding of Microsoft 365's offerings, which makes it an excellent starting point for individuals new to cloud services or Microsoft technologies.
The certification exam covers four key areas: cloud concepts, core Microsoft 365 services and concepts, security, compliance, and trust in Microsoft 365, as well as Microsoft 365 pricing and support. Candidates are expected to understand the different types of cloud services—SaaS, PaaS, and IaaS—and how these services are integrated into Microsoft 365. This includes being familiar with the productivity capabilities of apps like Microsoft Word, Excel, PowerPoint, Outlook, and OneDrive, as well as the collaboration solutions offered through Teams, SharePoint, and Exchange. Candidates also learn about Microsoft’s endpoint management tools and deployment models, providing a foundational understanding of how these services are used in both hybrid and cloud-based environments.
Security, compliance, and trust are critical components of the Microsoft 365 Fundamentals certification. Candidates are introduced to security features such as Microsoft Defender, which offers a suite of tools to protect data, devices, and identities. They also learn about compliance features like Microsoft Purview, which helps organizations maintain regulatory compliance through solutions like data loss prevention and eDiscovery. Additionally, identity and access management services such as Microsoft Entra ID, multi-factor authentication (MFA), and conditional access policies ensure secure access to Microsoft 365 services.
Another key focus of the certification is pricing and licensing. Candidates explore various billing and pricing models available for Microsoft 365, including enterprise agreements and cloud solution providers. Understanding the different support options available, such as how to create a support request or interpret service health status, is also covered, ensuring that individuals can manage and troubleshoot Microsoft 365 services effectively.
The Microsoft 365 Fundamentals certification is designed for a wide range of individuals, including business decision-makers, IT professionals, and those new to Microsoft’s cloud ecosystem. By earning this certification, individuals can better understand the value that Microsoft 365 brings to businesses, from its productivity tools to its robust security and compliance features. This foundational knowledge serves as a stepping stone for further certifications or more specialized roles within the Microsoft ecosystem.
For more details on the exam topics and to access resources for studying, candidates can refer to the official study guide provided by Microsoft. Additionally, more information about the Microsoft 365 Fundamentals certification itself, including practice assessments and exam details, can be found on the Microsoft certification page.
This certification is ideal for those looking to gain a fundamental understanding of cloud services and Microsoft 365, providing a solid foundation for further career advancement or deeper technical roles.

Free Microsoft 365 Fundamentals MS-900 Practice Test
- 20 Questions
- Unlimited time
- Describe cloud conceptsDescribe Microsoft 365 apps and servicesDescribe security, compliance, privacy, and trust in Microsoft 365Describe Microsoft 365 pricing, licensing, and support
Which security model requires that every access request be authenticated, authorized, and encrypted, treating all network traffic as untrusted regardless of its origin?
Zero Trust Model
Trusted Network Model
Perimeter Security Model
Open Access Model
Answer Description
The Zero Trust Model requires that every access request is authenticated, authorized, and encrypted, treating all resources as if they are on an open network. This approach enhances security by eliminating implicit trust within the network. Traditional models like the Perimeter Security Model assume that everything inside the network is trusted, which can be a vulnerability if the perimeter is breached. The Trusted Network Model and Open Access Model do not enforce strict verification of every access request as the Zero Trust Model does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Zero Trust Model?
How does Zero Trust enhance security compared to traditional models?
What technologies are commonly used to implement Zero Trust principles?
Your organization requires a Microsoft 365 purchasing option that supports flexible monthly billing and allows you to adjust license quantities as needed.
Which purchasing option BEST meets these requirements?
Purchase directly from Microsoft
Purchase through a Cloud Solution Provider (CSP)
Purchase through an Open Value agreement
Enter into an Enterprise Agreement (EA)
Answer Description
Purchasing through a Cloud Solution Provider (CSP) is the best option for organizations needing flexibility. CSPs offer monthly billing cycles and the ability to adjust license quantities as the organization's needs change.
Purchasing directly from Microsoft via a Microsoft Customer Agreement (MCA) can offer monthly billing, but is often geared towards annual or multi-year commitments with less flexibility than CSP for scaling down.
Entering into an Enterprise Agreement (EA) is designed for large organizations (500+ users) committing to a multi-year term. While licenses can be added, they can typically only be reduced annually, offering less flexibility.
Purchasing through an Open Value agreement is a volume licensing program that provides rights to the latest software versions but generally involves a three-year agreement term and is less flexible for monthly adjustments compared to CSP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Cloud Solution Provider (CSP)?
How does purchasing directly from Microsoft differ from CSP in terms of flexibility?
Why is an Enterprise Agreement (EA) less flexible than CSP for small organizations?
Which Microsoft 365 service provides a cloud-based endpoint management solution to manage devices and applications without requiring on-premises server infrastructure?
Configuration Manager
Microsoft Defender for Endpoint
Windows Autopilot
Microsoft Intune
Answer Description
The correct answer is Microsoft Intune. Intune is a cloud-based unified endpoint management (UEM) service that allows organizations to manage devices (desktops, mobile devices, virtual endpoints) and applications entirely from the cloud. This eliminates the need for on-premises servers.
- Configuration Manager is Microsoft's traditional on-premises management solution.
- Windows Autopilot is a technology used for provisioning and setting up new devices, but it relies on an MDM service like Intune for ongoing management.
- Microsoft Defender for Endpoint is a security platform for threat detection and response, not a primary device management tool.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Unified Endpoint Management (UEM)?
How does Microsoft Intune differ from Configuration Manager?
Can Windows Autopilot replace Microsoft Intune as a management solution?
An organization's IT department plans to provide employees with productivity applications, an upgraded Windows operating system, and advanced security features. They prefer to manage these through a unified subscription.
Which subscription service should they choose?
Windows 10 Enterprise
Office 365
Enterprise Mobility + Security
Microsoft 365
Answer Description
Microsoft 365 is a comprehensive subscription that combines Office 365 productivity apps, Windows 10 Enterprise upgrade, and Enterprise Mobility + Security features. This unified subscription meets the organization's needs for productivity tools, operating system upgrades, and advanced security in one package. Office 365 offers productivity apps but does not include the operating system upgrade or advanced security features. Windows 10 Enterprise provides the operating system upgrade but lacks productivity apps and the full security suite. Enterprise Mobility + Security delivers advanced security features but does not encompass productivity tools or the operating system upgrade.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is included in Microsoft 365 that makes it a unified subscription?
How does Microsoft 365 differ from Office 365?
What are the advanced security features in Enterprise Mobility + Security within Microsoft 365?
Users in your organization suddenly cannot access SharePoint Online. As the Microsoft 365 administrator, you need help from Microsoft to resolve the outage.
Which action should you take to submit a support request directly to Microsoft?
Run the Microsoft Support and Recovery Assistant (SaRA) tool on a client computer.
Use the Support > New service request option in the Microsoft 365 admin center.
Open the Service Health dashboard and click Report an issue.
Post the problem in the Microsoft 365 Tech Community forums and mark it urgent.
Answer Description
Administrators create Microsoft 365 service requests in the Microsoft 365 admin center. From the portal, choose Support > New service request (or Help & support > Contact support) to log a ticket that is tracked by Microsoft support engineers.
Creating a post in community forums or Microsoft Q&A does not open an official ticket. The Microsoft 365 Service Health dashboard lets you view incidents but does not submit new requests. The Support and Recovery Assistant (SaRA) can diagnose local client issues but does not lodge a service-level ticket.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Service Health dashboard in Microsoft 365?
What is the Microsoft Support and Recovery Assistant (SaRA) tool used for?
How can you submit a service request in the Microsoft 365 admin center?
A company wants to enhance employee well-being and productivity by providing personalized analytics and recommendations, such as suggestions for focused work time and maintaining work-life balance.
Which Microsoft Viva app offers these capabilities?
Microsoft Viva Insights
Microsoft Viva Topics
Microsoft Viva Connections
Microsoft Viva Learning
Answer Description
Microsoft Viva Insights provides personal and organizational analytics to help improve productivity and well-being. It offers features like recommendations for focused work time, mindfulness breaks, and insights on work patterns that may lead to burnout.
Viva Learning facilitates access to learning content
Viva Connections enhances employee engagement with company communications.
Viva Topics helps in knowledge discovery by organizing content and expertise.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of analytics does Microsoft Viva Insights provide?
How does Viva Insights help prevent employee burnout?
Can Viva Insights integrate with other Microsoft tools or platforms?
An organization needs to identify and mitigate potential internal threats posed by employees who may be leaking sensitive data. Which Microsoft Purview solution should they use to monitor, detect, and respond to these risks?
Microsoft Purview Data Lifecycle Management
Microsoft Purview eDiscovery
Microsoft Purview Insider Risk Management
Microsoft Purview Compliance Manager
Answer Description
Microsoft Purview Insider Risk Management is specifically designed to help organizations detect, investigate, and take action on risky activities occurring inside their organization, such as data leaks by employees. It provides tools to monitor user behavior, identify potential insider threats, and remediate them. In contrast, Microsoft Purview eDiscovery is used for finding and exporting content in response to legal matters, Data Lifecycle Management focuses on managing the retention and deletion of data, and Compliance Manager offers assessments to manage compliance requirements but does not monitor internal user activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Purview Insider Risk Management?
How is Insider Risk Management different from eDiscovery?
What type of risks can Insider Risk Management detect?
A consulting firm wants its employees to store work documents in a cloud-based solution, access them offline, and share them securely with clients and team members.
Which Microsoft 365 app would best meet these needs?
Microsoft OneDrive
Microsoft Teams
Microsoft Exchange
Microsoft SharePoint
Answer Description
Microsoft OneDrive is designed for individual users to store files in the cloud, allowing access from anywhere, including offline access, and facilitates secure sharing with others. It synchronizes files across devices, making it ideal for consultants needing access on the go.
Microsoft Teams is a collaboration platform focused on chat, meetings, and team communication, but it isn't primarily used for individual cloud storage or offline file access.
Microsoft SharePoint is geared towards creating intranet sites and managing organization-wide documents and content collaboratively, rather than providing personal cloud storage with offline access.
Microsoft Exchange is an email and calendaring server solution and does not offer features for storing and sharing work documents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does OneDrive enable offline access to files?
How is OneDrive different from SharePoint when it comes to file storage?
What security measures does OneDrive offer for file sharing?
Your company wants to simplify the deployment process of new Windows devices, reducing the time it takes to get devices configured and ready for use by employees. They are seeking a solution where new devices can be shipped directly from the supplier to employees, and upon first boot, the device will automatically enroll and configure itself according to company policies without IT manually setting up each device.
Which Microsoft 365 solution should you recommend to meet these requirements?
Microsoft Endpoint Configuration Manager
Windows Autopilot
Co-management with Microsoft Intune
Microsoft Endpoint Analytics
Answer Description
Windows Autopilot is the best solution to meet the company's requirements for simplifying device deployment, this is because it automates the deployment of new devices by allowing them to be shipped directly from the supplier to the end-user. When the user turns on the device for the first time, Windows Autopilot automatically enrolls the device in the organization's management environment and applies configuration policies, apps, and settings without requiring IT staff to manually set up the device. This streamlines the deployment process and reduces the time and effort required by IT.
Microsoft Endpoint Configuration Manager is an on-premises solution primarily used for managing existing devices and requires IT intervention for device imaging and deployment.
Microsoft Endpoint Analytics provides insights into device performance and health but does not handle device deployment.
Co-management with Microsoft Intune allows devices to be managed by both Configuration Manager and Intune but does not by itself offer a solution for automated device deployment directly from supplier to employee.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main benefits of Windows Autopilot?
How does Windows Autopilot work during the first boot of a device?
How does Windows Autopilot differ from Microsoft Endpoint Configuration Manager?
A company adopting a flexible work model wants to allow employees to access and edit shared documents simultaneously from different locations. Which service in Microsoft 365 facilitates this capability?
Exchange Online
Power Automate
SharePoint Online
Microsoft Forms
Answer Description
SharePoint Online enables multiple users to access, share, and co-author documents in real-time from any location, supporting collaboration in a flexible work environment. Microsoft Forms is used for creating surveys and quizzes, Power Automate automates workflows between apps and services, and Exchange Online provides email and calendar services—none of which specifically facilitate simultaneous document editing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does SharePoint Online enable real-time collaboration?
How is SharePoint Online different from OneDrive?
What is the role of version history in SharePoint Online?
When Self-Service Password Reset (SSPR) is enabled in Microsoft 365, which action must a user take before the service allows the password-reset process to complete?
Connect from an Azure AD-joined device on the corporate network to satisfy Conditional Access location requirements.
Verify their identity with the authentication method(s) configured for SSPR (for example, a text-message code or Microsoft Authenticator prompt).
Obtain explicit approval from a Global Administrator each time a reset is attempted.
Open a support ticket with Microsoft, who then triggers the password reset on the user's behalf.
Answer Description
Users do not need administrator approval to use SSPR. Instead, they must successfully verify their identity through the authentication methods that an administrator has allowed for SSPR (for example, a code sent by SMS, an Authenticator app approval, or another configured option). This verification step ensures the person requesting the reset is the legitimate account owner while eliminating help-desk involvement, which reduces support overhead and restores access quickly. Options that mention administrator, help-desk, or network-location approval are incorrect because no such approval is required once SSPR is enabled.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What authentication methods can be used for SSPR?
How does SSPR enhance security compared to traditional password-reset processes?
What role does an administrator play in configuring SSPR?
An organization wants to enhance its security by ensuring that all access requests are authenticated and authorized, regardless of the user's location or the network they're using. They plan to verify every user and device before granting access to resources, both inside and outside their network. Which security model does this organization intend to implement?
Least Privilege security model
Defense-in-Depth security model
Zero Trust security model
Perimeter-Based security model
Answer Description
The Zero Trust security model operates on the principle of not trusting any user or device by default, regardless of whether they are inside or outside the network. It requires continuous verification of identities and access privileges before granting access to resources, aligning with the organization's strategy. The Perimeter-Based security model assumes that users within the network are trusted, which doesn't meet the organization's requirement to verify all users and devices. The Defense-in-Depth model focuses on layered security controls but doesn't specifically mandate verifying every access request. The Least Privilege model ensures users have only the access necessary for their roles but doesn't address verifying all access requests regardless of location.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Zero Trust security model?
How does Zero Trust differ from Perimeter-Based security?
What technologies are commonly used to implement a Zero Trust security model?
An organization wants to assess its Microsoft 365 security configurations across identities, devices, apps, and data, and receive guidance on how to strengthen them. Which Microsoft tool provides a single, quantifiable measurement of the organization's overall security posture along with prioritized improvement recommendations?
Microsoft Defender for Endpoint
Microsoft Secure Score
Microsoft Compliance Manager
Microsoft Entra ID
Answer Description
Microsoft Secure Score delivers a numerical assessment of an organization's security posture across Microsoft 365 workloads. The dashboard displays the current score, historical trends, and a list of prioritized improvement actions that administrators can implement or mark as risk-accepted.
Microsoft Defender for Endpoint includes a Secure Score for Devices that measures only endpoint configuration, not the full tenant. Microsoft Entra ID shows an Identity Secure Score limited to identity-related controls. Microsoft Compliance Manager tracks regulatory controls and provides a compliance score, not a security posture score with Microsoft 365-wide recommendations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does Microsoft Secure Score measure?
How is Microsoft Secure Score different from Microsoft Defender Secure Score for Devices?
How does Microsoft Secure Score prioritize improvement actions?
You are a Microsoft 365 administrator for Contoso Ltd. A new employee account has been created in Azure Active Directory, and you need to assign the user a Microsoft 365 Apps for enterprise license. When you attempt to add the license in the Microsoft 365 admin center, you receive an error stating that a required property is missing.
Usage location
Time zone
Preferred language
Company billing address
Answer Description
Microsoft 365 requires that each user has a Usage location specified before a license can be assigned. This setting informs Microsoft which country’s data residency and service availability rules apply to the user (for example, services such as Teams Audio Conferencing are not offered in all regions). If Usage location is left blank, the licensing service blocks the assignment and returns an error indicating that a mandatory property is missing. Preferred language and time zone are optional user properties, and the tenant-level billing address does not satisfy the per-user requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Usage location in Microsoft 365?
Why is Usage location required for license assignment in Microsoft 365?
How can you set a Usage location for a user in Azure Active Directory?
Which statement best describes Microsoft Purview Information Protection's capabilities for labeling and protecting content in Microsoft 365?
Administrators can configure conditions so that sensitivity labels are applied automatically to documents and email when the content meets those conditions.
Automatic labeling is limited to files stored in SharePoint Online and OneDrive; email messages cannot be labeled automatically.
When a sensitivity label is applied automatically, it always overrides any higher-priority label that a user previously applied manually.
Sensitivity labels can be applied only when a user manually selects a label; no automatic labeling capabilities exist.
Answer Description
Administrators can configure sensitivity labels or auto-labeling policies that automatically detect data (by matching sensitive information types, trainable classifiers, etc.) and apply the appropriate label to documents and emails without user action. This automatic labeling works across Office apps, SharePoint, OneDrive, and Exchange Online and supplements manual labeling rather than replacing higher-priority labels that a user may already have applied.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of sensitivity labels in Microsoft Purview Information Protection?
How does automatic labeling work in Microsoft Purview Information Protection?
What are trainable classifiers and how do they enhance automatic labeling?
You are a Microsoft 365 administrator for your company, where all users are assigned Microsoft 365 E3 licenses. The security team requests that a select group of users gain access to Microsoft Defender for Office 365 features to improve email security.
What is the most cost-effective way to fulfill this requirement?
Purchase Microsoft 365 E5 licenses for all users
Purchase Microsoft Defender for Office 365 add-on licenses for the specified users
Upgrade the base licenses of the specified users from Microsoft 365 E3 to Microsoft 365 E5
Enable Microsoft Defender for Office 365 features in the admin center without additional licenses
Answer Description
The most cost-effective solution is to purchase Microsoft Defender for Office 365 add-on licenses for the specified users. Add-on licenses enhance the functionality of base licenses by providing additional features to selected users without the need to upgrade their entire base license.
Upgrading the base licenses from Microsoft 365 E3 to E5 for those users would provide the necessary features but at a higher cost compared to the add-on licenses.
Purchasing Microsoft 365 E5 licenses for all users is unnecessary and would result in significantly higher expenses.
It is not possible to enable Microsoft Defender for Office 365 features in the admin center without additional licenses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Defender for Office 365?
How is the Microsoft Defender add-on different from upgrading to Microsoft 365 E5?
What are some use cases for Microsoft Defender for Office 365 in email security?
A company wants to purchase Microsoft 365 services and prefers to work with a partner that offers personalized support and flexible billing options.
Which purchasing model should they choose?
Enter into an Enterprise Agreement with Microsoft
Buy directly from Microsoft with direct billing
Use the Microsoft Open License program
Purchase licenses through a Cloud Solution Provider
Answer Description
Purchasing licenses through a Cloud Solution Provider allows companies to work with a Microsoft partner that can offer personalized support and flexible billing options. The partner provides value-added services and can tailor offerings to the company's specific needs.
An Enterprise Agreement is typically suited for larger organizations and involves a direct agreement with Microsoft, lacking the personalized third-party support.
Buying directly from Microsoft with direct billing does not provide the additional support and flexibility offered by a partner.
The Microsoft Open License program is for perpetual licenses and is being phased out, making it less suitable for cloud services like Microsoft 365.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Cloud Solution Provider (CSP)?
How does a CSP differ from purchasing directly from Microsoft?
Why is the Microsoft Open License program less suitable for cloud services like Microsoft 365?
Your organization has noticed an increase in attempts to access corporate resources from unknown locations. As an administrator, you want to enhance security by restricting access based on the user's sign-in risk level and the context of the access request. Which feature of Microsoft Entra ID allows you to enforce policies that control access based on conditions?
Conditional Access
Multi-Factor Authentication
Identity Protection
Self-Service Password Reset
Answer Description
Conditional Access in Microsoft Entra ID allows administrators to create and enforce policies that control access to resources based on specific conditions such as sign-in risk, user location, device compliance, and more. By implementing Conditional Access policies, you can dynamically respond to changing risks and ensure that access to sensitive data is appropriately secured.
Identity Protection helps detect and remediate identity-based risks but doesn't directly enforce access policies. Multi-Factor Authentication (MFA) requires additional verification methods during sign-in but doesn't allow for conditional enforcement based on context. Self-Service Password Reset (SSPR) enables users to reset their passwords without administrator intervention but doesn't control access conditions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Conditional Access in Microsoft Entra ID?
How does sign-in risk influence Conditional Access decisions?
Can Conditional Access integrate with device compliance checks?
As an IT administrator for a company using Microsoft 365, you encounter an issue where several users are unable to access their mailboxes. After exhausting available documentation and community forums without resolving the problem, what is the most appropriate next step to obtain support from Microsoft?
Wait for the issue to resolve and check the service health dashboard periodically.
Post the issue on social media tagging Microsoft support.
Reinstall Office applications on affected users' computers.
Create a service request in the Microsoft 365 admin center to contact Microsoft support.
Answer Description
Creating a service request in the Microsoft 365 admin center is the correct method to directly engage Microsoft support for assistance with issues unresolved by self-help resources. This approach ensures that your case is handled by support engineers who can provide targeted help. Posting on social media is not a formal support channel and may not result in timely or professional assistance. Waiting without action does not address the issue proactively, and reinstalling Office applications is unlikely to solve mailbox access problems caused by service-related issues.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Microsoft 365 admin center?
How do I create a service request in the Microsoft 365 admin center?
What is the service health dashboard, and how does it help?
You are an IT administrator at a company that uses Microsoft 365 services. Your organization wants to protect its email and collaboration tools from phishing attacks and malware.
Which Microsoft Defender solution should you implement to provide advanced threat protection for Exchange Online, SharePoint Online, OneDrive, and Microsoft Teams?
Microsoft Defender for Office 365
Microsoft Defender for Cloud Apps
Microsoft Defender for Identity
Microsoft Defender for Endpoint
Answer Description
Microsoft Defender for Office 365 provides comprehensive protection for Microsoft 365 services such as Exchange Online, SharePoint Online, OneDrive, and Microsoft Teams against advanced threats like phishing and malware. It is specifically designed to secure email and collaboration tools.
Microsoft Defender for Endpoint protects devices like desktops and laptops.
Microsoft Defender for Identity monitors on-premises Active Directory signals to identify compromised identities.
Microsoft Defender for Cloud Apps helps secure the use of cloud applications but does not specifically target email and collaboration platforms.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What features does Microsoft Defender for Office 365 provide?
How is Microsoft Defender for Office 365 different from Microsoft Defender for Endpoint?
Can Microsoft Defender for Office 365 integrate with other security tools?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.