What should you create from the Endpoint Management admin center?
You have a Microsoft 365 E5 subscription. All users have Mac computers. All the computers are enrolled in Microsoft Endpoint Manager and onboarded to Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). You need to configure Microsoft Defender ATP on the computers. What should you create from the Endpoint Management...
Which option should you select?
You need to create the Safe Attachments policy to meet the technical requirements. Which option should you select?A . ReplaceB . Enable redirectC . BlockD . Dynamic DeliveryView AnswerAnswer: D Explanation: Reference: https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/safe-attachments.md
Which devices should you identify?
You have a hybrid Azure Active Directory (Azure AD) tenant and a Microsoft Endpoint Configuration Manager deployment. You have the devices shown in the following table. You plan to enable co-management. You need to identify which devices support co-management without requiring the installation of additional software. Which devices should you...
What should you create in Microsoft Endpoint Manager?
You have Windows 10 devices that are managed by using Microsoft Endpoint Manager. You need to configure the security settings in Microsoft Edge. What should you create in Microsoft Endpoint Manager?A . an app configuration policyB . an appC . a device configuration profileD . a device compliance policyView AnswerAnswer:...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you create in the Microsoft Defender Security Center?
Your company has digitally signed applications. You need to ensure that Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) considers the digitally signed applications safe and never analyzes them. What should you create in the Microsoft Defender Security Center?A . a custom detection ruleB . an allowed/blocked list ruleC ....
Which type of policy should you configure, and how many policies should you configure?
HOTSPOT You need to configure the information governance settings to meet the technical requirements. Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
On which devices can you manage apps by using app configuration policies in Microsoft Endpoint Manager?
You have a Microsoft 365 E5 subscription. Users have the devices shown in the following table. On which devices can you manage apps by using app configuration policies in Microsoft Endpoint Manager?A . Device1, Device4, and Device6B . Device2, Device3, and Device5C . Device1, Device2, Device3, and Device6D . Device1,...
On which server should you install the Azure ATP sensor?
On which server should you install the Azure ATP sensor?A . Server 1B . Server 2C . Server 3D . Server 4E . Server 5View AnswerAnswer: A Explanation: Reference: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning However, if the case study had required that the DCs can't have any s/w installed, then the answer would have...
What should you do?
HOTSPOT You have an Azure subscription and an on-premises Active Directory domain. The domain contains 50 computers that run Windows 10. You need to centrally monitor System log events from the computers. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection...