Chapter 2
Implement Microsoft 365 security and threat management
In a traditional environment, applications and services are hosted and managed from an organization’s on-premises data center. Intellectual property, employee data, and other sensitive information are contained within the confines of that organization. In the modern workplace, applications and services are hosted in cloud environments, such as Office 365, reducing overhead for IT and providing greater flexibility to the end user. This transition requires IT administrators to address new challenges around information protection and application security.
In this chapter we cover cloud-based security services for Microsoft 365. This includes a deep dive into Cloud App Security, Advanced ...
Get Exam Ref MS-101 Microsoft 365 Mobility and Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.