Reference no: EM133374577
Case Study: Microsoft Teams is built on the Microsoft 365 and Office 365 hyper-scale, enterprise-grade cloud. As such, it inherits the advanced security and compliance capabilities Microsoft customers expect with regard to identity and access management.•In the following Microsoft Interactive guide on identity and access management (https://teams-security-interactive-guide.immersivelearning.online/), you will see how Microsoft 365 and Azure AD can improve an organization's security posture by adopting more secure authentication methods, such as Multi-Factor Authentication (MFA) or passwordless authentication. Interactive guides are hands-on experiences where users are provided end-to-end, in-depth, and "click-through" guidance
Part C
•Having privileged access to an application is all that's needed to execute commands with malicious intent to inflict damage to or exfiltrate data from an organization. Such high privileges can be misused to create fake accounts, grant excessive permissions, exfiltrate sensitive data, cause damage to infrastructure, wipe out or hold data for ransom, and set rules and policies that make it extremely hard to detect and restore state back.
• In the following Microsoft Interactive guide - Monitor and control administrator tasks with privileged access management in Office 365. you will see how privileged access management in Office 365 goes beyond traditional access control capabilities by enabling access governance more granularly for specific tasks.
•It's based on the principle of Zero Standing Access, which means users who need privileged access, must request permissions for access, and once received it is just-in-time and just-enough access to perform the job at hand.
Questions:
1. What type of group can you leverage to control access to OneDrive and Sharepoint ?
2. What is the goal of Privileged Access setting here ?