Pass Microsoft 365 Certified Fundamentals Certification Exams in First Attempt Easily
Latest Microsoft 365 Certified Fundamentals Certification Exam Dumps, Practice Test Questions
Accurate & Verified Answers As Experienced in the Actual Test!
- Premium File 449 Questions & Answers
Last Update: Dec 18, 2024 - Training Course 21 Lectures
- Study Guide 317 Pages
Check our Last Week Results!
Download Free Microsoft 365 Certified Fundamentals Practice Test, Microsoft 365 Certified Fundamentals Exam Dumps Questions
File Name | Size | Downloads | |
---|---|---|---|
microsoft |
1003.2 KB | 2007 | Download |
microsoft |
270.5 KB | 1463 | Download |
microsoft |
267.3 KB | 1513 | Download |
microsoft |
257 KB | 1246 | Download |
microsoft |
252.7 KB | 1310 | Download |
microsoft |
181.4 KB | 1287 | Download |
microsoft |
1.7 MB | 1493 | Download |
microsoft |
176.7 KB | 1756 | Download |
microsoft |
175.4 KB | 1819 | Download |
microsoft |
167.5 KB | 1953 | Download |
microsoft |
156.1 KB | 1817 | Download |
microsoft |
147.8 KB | 2058 | Download |
microsoft |
147.7 KB | 2132 | Download |
microsoft |
145.3 KB | 2442 | Download |
Free VCE files for Microsoft 365 Certified Fundamentals certification practice test questions and answers are uploaded by real users who have taken the exam recently. Sign up today to download the latest Microsoft 365 Certified Fundamentals certification exam dumps.
Microsoft 365 Certified Fundamentals Certification Practice Test Questions, Microsoft 365 Certified Fundamentals Exam Dumps
Want to prepare by using Microsoft 365 Certified Fundamentals certification exam dumps. 100% actual Microsoft 365 Certified Fundamentals practice test questions and answers, study guide and training course from Exam-Labs provide a complete solution to pass. Microsoft 365 Certified Fundamentals exam dumps questions and answers in VCE Format make it convenient to experience the actual test before you take the real exam. Pass with Microsoft 365 Certified Fundamentals certification practice test questions and answers with Exam-Labs VCE files.
Understand core Microsoft 365 services and concepts
4. Office 365 ProPlus
In this lecture, we're going to look at the key differences between M365 and the on-premise version of Office 2016. Let's get started. First, throughout this course and all of the lectures, we're going to look in quite a bit of detail at all of the features of M 365. So in this lecture, we're really going to focus onthe key differences between both that you need to know. For the exam, we're going to be looking at the most likely questions in this section. All right, let's discuss Office 2016, which is on the left. So Office 2016, which normally includes Word, Excel, PowerPoint, Outlook, Publisher, and OneNote, is typically accessed via the desktop or your workstation. That also means that you've deployed it to that workstation. So Office 2016 is a licence that you've purchased, that you've deployed, and that you're managing. So a key aspect is that, for example, for support and pricing, especially support, you need to manage and determine sometimes where the issues are before contacting Microsoft because they are on your workstation. As a result, all of this is sometimes referred to as This is a stand-alone version or license. Now, it does come in two flavors. It comes into Office Home and Business 2016 and Office Professional 2016. So this could be on the exam. The key difference between the two versions is that Office Professional 2016 has two additional software capabilities. One of them has Microsoft Access, and the other one is Skype for Business. Another key difference is that if you wish to do any of the upgrades, so, for example, if you had Office Home and Business and you wanted to go to Office Professional 2016, then you have to purchase new licences and you have to upgrade to that. All right, so let's look at Office 365. The first thing—and that could be an exam—the first thing that you notice under the umbrella isthat Office 2016 is included in Office 365. And it's got quite a bit of additional capability that we'll look at in other lectures. So Office 365, then, is a cloud-based subscription-based service where you pay as you go. You pay a monthly subscription versus Office 2016, for which you paid a one-time fee for licences that you can use. Another significant distinction is that, in contrast to your on-premises version of Office 2016, Microsoft continuously maintains and upgrades all of its software and services with Office 365. You must download and install and manage all of the upgrades in order to get the latest features. All right, so to recap for the exam, I would focus on number one. Office 2016 is a standalone. You purchase the licences in Office 365. Office 2016 is included. It is a cloud-based subscription; you pay as you go, and you can cancel anytime, versus the upfront cost of Office 2016. And the price is quite a bit cheaper. With Office 365, you have two versions of Office 2016. The Office: Home and Business versus the Professional And the professional gives you additional software. Microsoft Access and Skype for Business and Office 2016 On premise, you typically access it via your workstations in Office 365, which is mostly cloud based.You have the option of accessing it via the web or, in certain subscriptions, downloading and installing it on your desktop. But still the manageability and the upgrades allthe features is the responsibility of Microsoft. That's all for this lecture. Whenever you're ready, you can go to the next one.
5. Collaboration and Mobility with Microsoft 365
In this lecture, we're going to look at collaboration and mobility with M 365.Let's get started. For this lecture, we're going to use this diagram, which was created by Dion, and I've put some resources in the description of this lecture. This is a great diagram that encompasses Microsoft's current collaboration strategy, which puts groups at the centre of an integrated toolset. So we'll go around and look at all of these applications and see how they fit within collaboration and mobility. So, at the heart of this hub, and this is a term used by Microsoft, and it may appear on the exam. At the centre of this hub are Office 365 Groups. So we see dynamic collaborative teams, applications for projects, processes, and teams. So again, this is at the core of the hub. The next application that will basically lay the foundation as well is SharePoint. So for the Internet and team sites, but SharePoint is much more. It is a document repository as well as a drive. So it's file storage, sync, and sharing. So those two are really also part of the foundation. So in terms of exams, SharePoint and OneDrive really are key enablers because this is where you put your information and share your information. The next one is your Office 365. So this is your traditional document creation and editing: PowerPoint, Excel, and Word. The next thing is really the way you communicate between teams. And here you have basically, through Outlook, emails and a calendar; you have Skype for chat, voice, video meetings, and file sharing. and then Yammer, which is an enterprise social network. Then there's Delve, which is a personalised search and discovery tool that works well with SharePoint and OneDrive. But really, the foundation of this hub is Office 365, supported by your SharePoint and OneDrive for information repositories and information management. Then you have your Office 365 for document creation and editing and the three key applications of Outlook, Skype, and Yammer in terms of communication. So in terms of the exam Another thing to remember and think about with this hub There are some tenants that Microsoft discusses in some of their white papers. which is again the concept of a hub. the idea or the tenets of using groups instead of email. Distribution lists. using chat instead of email. Using cloud like M 365 versus onpremise deployment of Microsoft applications on premise. using mobile and mobility instead of a desktop and sending links or sharing information as opposed to sending attachments. So this really is the strategy of Microsoft. So again, that would be a great question on the examwhat is the strategy or where are they moving from? Again, groups versus distribution lists, chat instead of email, cloud versus on-premises mobile instead of desktop, and sending links or sharing information instead of attachments And the last thing I wanted to cover is Microsoft Intune. So, how do you access and work in this collaborative environment with mobile devices versus desktop? So Microsoft Intune and Enterprise Mobility Management, or EMM So that is also a key foundational aspect of working in this collaborative environment. And Microsoft Intune basically enables you to manage mobile devices, manage mobile applications, protect data on mobile devices, and ensure that applications are compliant with security policy. And that's all I wanted to cover in this lecture on mobility and collaboration with M 365.So whenever you're ready, you cango to the next lecture.
Security, compliance, privacy, and trust in Microsoft 365
1. Security and Compliance Concepts with Microsoft 365
In this lecture, we're going to look at security and compliance concepts with M 365 Specifically for the exam, we're going to look at data protection, which protects sections of data, emails, and documents. We're going to look at devices. We're going to look at threats to security and compliance. So those are the four areas that you need to remember for the exam in terms of the concepts of security and compliance. Data, emails and documents, 1 second devices,three security and threats and four compliance. Let's get started. All right, so we're in the M 365Admin Center, and we've seen this before. If we look at the left-hand side, if we scroll down, then we have the various admin centers, security and compliance, and device management. Those are the two that we're going to look at in this lecture that will cover all of our topics. So the first one we'll go into is device management. So, we've arrived at Microsoft 365 device management.
And again, for the exam, it's just important to know that one of the key concepts for security and compliance is device management. There are two terms that are usually used: mobile device management, which is MDM, and mobile application management, which is Mam. So, as we can see on the left, we have device enrollment for mobile device management. So this is a lifecycle of enrolling devices that are part of the M365 device, device compliance, security baseline, device configuration, the devices themselves, software updates, and client applications. So for the exam, there is really no need to go into a lot of details. It's just important to understand that this is a key concept within security and compliance. We can go in and look at a couple of areas or device enrollment. So, if we click here, we can see those policies for device compliance. So a lot of what happens is that you determine policies that are enforced at the device level. So if we go in policies, then we can create a policy, enter the name, the description platform, which is interesting, and here you can see what M365 supports in terms of device management for Android, Android Enterprise, iOS, Mac OS, and different flavours of Windows. So again, these are all policies on the device for its management, or mobile device management. One question on the exam is whether there's definitely an area of policy that we want to enable, which is called the "white feature." With the "white feature," basically you have the ability to remotely erase any business information that is associated with the mobile device, but still leave on there any personal information that may belong to the user. The other area we can quickly look at is the software updates as well as client applications.
So here you get to see all the applications, some of the policies, some of the monitoring, either for licenses or discovering new applications, and the status of some of the applications that sort of fall all under mobile application management, or Mam. So those are the two things to remember for the exam. Mobile device management, as well as mobile application management, is one of the key features, and one of the key security safeguards for protecting data on these devices is the wipe feature. All right, so let's go back to our main menu. So the Microsoft entry is 65 Admin Center. Now, if we go into the menu and select Security and Compliance, All right, so this brings us to M-365 Security and Compliance. And again, for the exam, it's just important to know some of the key concepts of M365 security and compliance. Here we're going to look at the two other areas, which are privacy and protection of data. And that data can be just plain data, emails, and documents, as well as security or security threats. So, on the left, we'll go down a little bit and look at the different core services and whether they fall more under data protection or security in terms of external threats. The foundational element, the thing that you do need to remember for the exam, that is the foundation for all information and data protection, is classification. We need to classify our data, emails, or documents in order to apply proper policies for protecting that information. And that is done through labels and label policies. So again, there is another lecture, but an example of a label. You can classify the type of data—it could be unclassified, sensitive, or restricted. So whatever labels you use in your organisation to classify data So once you're able to define those labels and create label policies, then some of the services can be enabled. And the first one we can see here is data loss prevention. So that is a key service to remember for the exam: data loss Loss Protection.Then, leveraging your policies, your labels, and your classification through your labels and the DLP service in terms of policy, you can identify, you can monitor, and you can automatically protect sensitive information. So that is the key thing to remember for DLP or data loss protection. It builds on the classification and then can monitor and automatically protect sensitive information. The other area that is important as well is records management.
So a record is any information that is valued by the business and needs to be managed. And a lot of times, managing means backing up, protecting, and having access to that information over time, which could also mean backup, archiving, and even destruction as part of privacy. Usually there's a data retention policy, and once you reach that date, then records must be removed and destroyed. So basically, records management is all about the lifecycle of your data, your emails, and your documents. So that is part of good security and privacy practices. And data governance goes hand in hand with records management. Next we're going to look at threat management. So for threat management, thisis really external threats. And what are those external threats? External threats include malware phishing via email ransomware, which encrypts your data and then demands a ransom in order to decrypt it, as well as a zero-day exploit, which is also classified as malware. And you can see malware protection and phishing protection. There's also all the threat management, like Isaid on the emails, on the documents. So the two key things for the examto remember under external threat, then Microsoft hasan advanced threat protection and it comes underthe acronym ATP, so advanced Threat Protection. And the other one is almost like the DLP policy, but now applied to threats, which is automatic or automated scanning of data, documents, and emails. So those are the services that are associated with external threats. The service associated mostly with data, emails, and documents is data loss protection, data governance, and records management, with the foundation for all of these things being your classification, your labels, and your policies.
And the last area we're going to look at is under compliance.And here we are basically going to go with the service trust. There is another lecture again on the compliance manager, but we're here, so we're going to quickly look at what that means. So let's look at the templates. So in terms of compliance, usually you're compliant to a framework or to a standard, and the ones that are most often used are FedRAMP high for the US federal government, HIPAA for high-tech medical information, and ISO 27001, which is a global standard for information security management systems. NIST 853 is a US government standard that has a number of controls associated with it. So those are the key ones. And you can see here in terms of compliance, so this is automated and action items.So within the compliance manager, there's a workflow. So for the items that you may not be compliant on but that you're working towards, And then there's the automated assessment for M365 under the different templates. And as you can see, it's quite extensive, again using the various standards that we looked at. All right, so to quickly recap, the main concepts for M-365 security and compliance are information or data, emails and documents, devices, security and threats, and compliance. and we looked at each of these areas. So feel free to review this lecture again, looking at some of the key services that M 365 offers in each of these areas, and those would be the ones that would be covered on the exam in terms of key concepts for M 365. All right, that's all for this lecture. Whenever you're ready, you can go to the next one.
2. Identity Protection and Management
In this lecture, we're going to look at identity protection and management. So what does that cover? That covers cloud identity, on-premise identity, and hybrid identity. And the other topic that we're going to look at in this lecture is multifactor authentication, or MFA. This lecture is somewhat more technical than the others, so I will go a little slower. So this lecture will be somewhat longer than the average of the other lectures, but it's important that you understand as there will be a number of questions from this section. All right, so let's get started. So the first step was to log in to the Microsoft 365 Admin Center.
And within the Admin Center on the left, there are a number of tabs or functionalities. Here we've basically selected the users. So let's go in. We have active users, guest users, and deleted users. But we're just going to look at the active users. All right, so we have one active user. This user has a username, which is usually an email address, and it's got a status. So this is within M 365.Now, what's important to understand is that there is a service or software that manages all of the users that are in M365, which is called Microsoft Active Directory, or Ad.Microsoft Ad.So that's more the commoner.But in the exam, it'll be Microsoft Active Directory. So that is a directory that, for the purpose of this exam, is a directory that manages all of our users. So with the M365, you sort of just have the ability to add users and do some basic administration. But if you want to look at the full administration of the users, then we need to go to Azure, and more specifically, Azure and Microsoft Active Directory. So that's the other important thing: in the cloud, it's called Azure AD, while on premises, it's just called AD. So you'll hear things like "Microsoft Ad" or "Microsoft Active Directory." So that's the on-premise version of the software. In the cloud, it's known as Microsoft Azure Ad, but most people just call it Azure Ad. So since we're in M 365, we're really using Azure AD. So. Let's go to Azure. So now I'm in the Azure console. I know there's quite a bit of information, but I will focus on the important things within the exam. You can see Azure Active Directory in the left panel over here. And if we click on our users, you can see that we do have one user, and it's the same username and email address with the email address that we saw in M 365. So this shows you that within Azure we have AzureAD, and that really powers the M 365 subscription.
So this is where you manage all of your users. So let's click on one user, the only user that we have, just to understand some of the concepts that you need to understand going into the exam. So the first thing that we see is our identity. So again, that is important, the exam. How do you identify users? So usually you identify users by username, and usually it's an email address. and this is the case over here. And you may have other information related to the user, which is part of the identity. So we have job information settings; we have contacts. There can be quite a bit of information associated with a user. So think of it as tombstone information. So that is the identity. The next thing is that once you've assigned identities, you will need to authenticate users. So that is usually done, and this is done over here, as well as through a password. You assign a password to that identity. So that's the process of basically, when you log in, you put in your identity, which is your user ID, and your authentication mechanism, which is your password. So what happens after that? Well, the third concept that we need to understand is that after you've identified yourself and provided your authentication, if you're successfully logged in, then you are authorized. You will have authorization within M 365 or within Azure. and usually you're associated with a role. So that's another important concept to understand for the exam. Authorization is usually the assignment of a role. And a role gives you the authority to do certain things within M365 or within Azure. So those are the important concepts that we've covered, identity authentication and authorization. That is managed by a directory service. In this case, it is Azure AD on premise. It is called Microsoft Active Directory. It works exactly the same as what I've discussed over here. You give identities, you create passwords, and then you authorise people. So in the exam, if they're talking about on-premise versus in the cloud, the mechanisms are the same. One uses Microsoft Active Directory; the owner uses either Microsoft or AD. Now, the other scenario that can be on the exam is the hybrid. So let's look at a hybrid diagram so that you understand how that works. Now, when we're connecting on-premises with the cloud, whether through M-365 or Microsoft Azure, here's a diagram from Microsoft. I'll go over it again, focusing on identity authentication and authorization in a hybrid scenario. And at the same time, we'll quickly summarise the cloud as well as the on-premise that we just talked about. As previously discussed, on the left is on-premises Active Directory. And again, the process here is to create identities and assign authentication like passwords. And then when users authenticate themselves, I create an authorization and give them a role. What they can do once authenticated, as we saw, is in the cloud; I use Azure Active Directory, which is linked. So, for example, there could be only one Azure Directory associated with your M 365 subscription. So there's only a one to one.You can only have one Azure AD tied to your subscription. So again, here, the process is the same. We create identities. We saw there was one user with an email address. This user had a password, and this user had roles associated with them. All right, so what is the hybrid scenario? How would this work in a hybrid?
Well, you don't want to create identities in both your on-premises environment and your Azure account because that is duplicating. And then passwords could get out of sync tunes.Some information could be different from one to the other. So as you can see here on this diagram, the normal scenario—and I think that's the one that will be on the exam—is that you create your identities on premise over here. And as you can see, that is the scenario they have provided. And then you sync the password with Azure Active Directory as well as the identity. So, basically, all of the work is done on-site. There's also a trust relationship that is built so that the on-premises environment trusts the Azure Active Directory as a source. And then basically, the passwords are synced over here. So any changes basically on the on premiseis reflected on the Azure Active Directory. So when users are here, we see a cloud sign in. What happens here is that you get authenticated, but it is the same information. That's what is on premise. and that's really the hybrid scenario. Again, you can log on to the on-premises instance or the cloud instance, but the two active directories (on-premises and Azure) are synced. So sometimes, also in the exam, they could ask a question. So what we've talked about over here is the beginning of something called "single sign on." So basically, when I sign on to the Azure Active Directory, I may have access to a number of services because now these services are all attached. So that's the other requirement for single sign-on: that all the SaaS applications over here, as well as your custom applications and Office 365, are all leveraging your Active Directory. So once you sign over here, you only have to sign in once, and you have single sign-on, so you have access to all these applications.
And also, this is synced up with the on-premise Active Directory. So basically, it's much easier to administer. So you have an administrator on premises that does all of the work of creating new users, deleting them, modifying them, and changing passwords. And that is all here; we see the password is synced over here. So in terms of manageability, this is much easier. All right, so the last topic we're going to look at in this lecture is Multifactor Authentication, or MFA. All right, here's another document from Microsoft. It's Azure Multi-Factor factor authentication.So, as previously discussed, we create an identity and provide the person with, most likely, a password for authentication. And also, once they are authenticated, they are authorized. But here we're just going to focus on the authentication part. So authentication is done with something, typically a password. So you can refer to this as one-factor authentication because you only use one item to authenticate yourself. Azure AD as well as Active Directory enable you to have more than one factor. They call it multifactor authentication. So you can probably use a password as well. Here, give an example: you have a trusted device, which can either be a phone or a token, such as a key fob. So those are the two most likely. Here you also have, like, a smart card, so that's the third one, and there are others as well. But for the exam, you have a physical token, or you have your physical phone. I think for the exam, we won't get into the biometrics; we'll just focus on this. So how does it look on the phone? So for most people, when they use a phone as part of multifactor authentication, it will sometimes be referred to as two-step authentication or multi-step authentication. But we'll refer here to two-step authentication, meaning that you put in your user ID. You then put in your password, you press Enter, and if you're authenticated, another window comes up and requests that you add another factor, which would be something that's on your phone. And most people use Google Authenticator. And here is a little picture to see what it looks like.
So this is the Google Authenticator, and it has your email address associated with your M-365. And then every so often, this code over here changes. So when you authenticate it, after you've put in your password, you get a new window, and then you would put in this code: 248 41. So that is your second step or your second factor. You put that in, you press Enter, and then you get authenticated. So that is multifactor authentication. And we can quickly go back to Azure and just go to the top level, Active Directory. So if we scroll down a little bit, just to give you the example here, we have multifactor authentication, and it says here, use MFA to protect your users and data. So this is another level of protection. So it is integrated with Azure ads. So I think that's all for this lecture. We've covered quite a bit. It was a little bit more technical. I went a little slower to try to cover all of the topics and all of the scenarios. So feel free to review this lecture. lowly, look at all the diagrams. And I know it's maybe overwhelming a littlebit going on the Azure portal because there'squite a bit of information there. But it is an important topic and there maybe many questions in the exam with several scenarios. All right, that's all for this lecture. Whenever you're ready, you can go to the next one.
3. Security Usage Scenarios and Services
In this lecture, we're going to look at security usage scenarios and services, including Microsoft Active Directory, or AD. The two most common usage scenarios are either cloud-based or hybrid. And hybrid indicates that it's a hybrid between cloud-based and on-premises services. Let's get started. The first thing we're going to look at is the Azure Ad Pricing Page. We're not going to get into pricing specifics; rather, it's about how pricing is really tied to features. And that's what we're really interested in understanding: the different features for the different subscriptions. Just as a quick reminder, why are we looking at Azure Ad? How does Azure Ad fit into M 365 is?For each M 365, there is one Azure ad associated with your subscription. And Ad is really the repository for this exam anyway, which is for stored identities. So it is a key piece of the M 365. It is the foundation for many activities. All right, let's scroll down here a little bit, and here are some pricing details between the different types of subscription. We're going to focus more on the differences between Basic Premium One and Premium Two and on some of the key differences. And that may be a question on the exam, but it also lays the foundation for some of the different scenarios.
Once we look at this, we'll look at two specific areas that cover our scenarios, which are Ad, single sign-on, and Ad in terms of the hybrid scenario. And then we'll finish off the lecture by going into the admin portal just to see some of these things. So again, just for the purpose of the exam, we're really going to look at some of the key differences. The first one is single sign-on, and we'll look at that shortly. The Basic plan includes ten apps per user. While it is unlimited for Premium One and Premium Two, that most likely will not be on the exam. It is not a key differentiator between these different subscriptions. Some of the reporting basicreport versus Advanced reports. At the end, the advanced reports are really there because with Premium One or Premium Two, you are getting additional capabilities that you can report on. And really, here's the key section, sort of the premium features. So that is not in the basic, but P One and P Two are where advanced group features are. We're not going to go through each one of them, but again, we're going to go down in the area of key differences between P One and P Two. And here we are. So key differences in identity protection So that is available in the P2 subscription but not in the P one.There is a specific lecturethat deals with identity protection. So I won't cover this here. The same is true for Privilege identity management. So this is the management of privileged users and monitoring their activities and their actions because of the impact that they have. Should they be compromised? It's much more expensive than regular user access reviews. Again, this is the process of reviewing and ensuring that people who have access should have access. So it's a kind of workflow governance centred on reviewing access and confirming that it's appropriate for these people at this time. So it's a regular continuous cycle, and those are the key differentiators. So again, for P 2, you have identity protection, privilege, identity management, and access reviews. And, of course, that is not available for the basic. And in terms of the other basicis basic reporting and limited number ofsingle sign on limited to ten application. All right, so now let's look at the two key usage scenarios that you need to know for the exam. The first one is Azure AdConnect, which we see over here.
So on the left we see the on-premise Active Directory, or AD. We see here in the cloud the Azure Active Directory with the M 365 suite of applications, and again, as mentioned, there is one Azure ad associated with your subscription. So it is a key concept. So the Azure ad connects. Another term that you should be familiar with theexam is that it provides capabilities to connect youron premise ad with your cloud Azure ad. All right, so for the exam, a couple of questions go around, and you should understand some of the key capabilities of Azure Ad Connect. Well, one actually is to connect your onpremise with your Azure ad in the cloud. But what else does it do? So the identities are normally created on premise. So identities and your passwords—passwords that are in your Active Directory—are not stored in the clear. They are hashed. So there is something called password hash synchronisation, which means that your on-premises password is synchronised through Azure AD Connect. In this case, the hash is also saved in Azure Active Directory. So when somebody here has a device that signs into the Azure Active Directory, we can authenticate this user thanks to the hashed password that is synced with your on-premises directory.
The other thing that is also synchronised are users and groups. And actually, once we pass all the users here as well as the groups, the groups are just like it sounds: a nagging number of users under a specific group. And a group is usually associated with a policy. So this gets into a little bit of the authorization. So you have your identity. You authenticate yourself with, for example, a password. Then once you're authenticated, you're authorised based on your role. And a role is usually associated with a group that has a policy associated with it. All right. And then the other usage scenario is around Federation, which is called ADFS Active Directory, Federation Services, and SSO What's interesting here for a single sign-on is that we have an auer signing in to Azure Ad, but it doesn't say where the user is located, if the user is on-premises or outside. And this is the next one that we're going to look at. Here. As in the other diagram, we have an intranet user and an extranet meaning on the outside. We have Active Directory, but now we have Directory ADFS, Federation Services Enable, and we have a web application proxy here, but that's not too important. But there is now a federation trust between the on-premises and the Azure Active Directory. So it is a different architecture. So let's quickly look back. So here you have Azure Ad Connect, and in many instances, this would be tied to a private connection. Or you can have the other architecture, which says we don't have Ad Connect but enable federation services through ADFS and the federation. So there's a trust that needs to be established between the Azure ad and On Premise. And then we can have users either on the inside or on the outside that sign in either directory. And that process of signing in and using the same credential you have on the inside is called "federation," as well as "SSO," single sign on. So somebody over here who will go into the Azure Active Directory, which has federated services back on premise, can then log in to the M 365.All right, just a quick recap. As a result, we have Azure AdConnect connecting On Premise and Azure Active Directory. Some of the key services are hash synchronisation as well as users and groups.
Then this, you could say, is a more tightly coupled architecture, while the next one was a more loosely coupled architecture because we are now using ADFS, which is a federation, and establishing more trust between on-premises and the M 365.The other scenario as well is over here youwould tend to the on premise and the M365 subscription are owned by the same organization. And here, it may have more of a loosely coupled relationship. And that's why we have to establish a trust between this subscription and the on-premise. All right. Finally, in this lecture, we'll return to our 365Admin Center and discuss security, compliance, and the securing of compliance. Again, there's a whole lecture on some of the key services over here, and we're going to look specifically at threat management just to look at some of the services associated with this lecture. Again, we do cover this again in another lecture, so it's a bit of a duplicate, but it never hurts if we look at the dashboards. And this gives you an idea of some of the key services, which are malware protection, fishing protection, and threat management. So for advanced threat management, some of the key services associated with it are safe attachments.
Safe links. So for example, in phishing, somebody is trying to make you click on a link. So that is the service behind that: Save Link. Malware protection is more around safe attachments, but it's not only in email, like in Exchange, but as well in SharePoint, OneDrive, and Microsoft Teams. If we click on the review again, dealing with quarantine and restricted users and malware detected in email, one of the key aspects in the M365 is threat investigation and response, which is to identify, monitor, and understand a tax, but most importantly, have automated investigation and response for email-based attacks. And if we click on our policies again, everything is around anti-phishing, anti-spam, and anti-malware. All right, just a very quick recap. We began by looking at Azure Ad, the pricing page, and the key difference between Basic Premium One and Premium Two. We then looked at our two key scenarios for usage that you need to understand for the exam: the on-premises connectivity with the Azure Active Directory in your M 365 subscription, either through Azure AdConnect or using a more loosely coupled architecture with Federation Trust, and having the ability for users to single sign on through ADFS Federation Services. While over here, one of the key features or services was passwords, hash synchronization, and synchronisation of users and groups. And the last thing that we looked at was around the advanced threat protections for M365, especially around safe attachments and safe links, the investigation and automated response, and all around the SharePointOneDrive Microsoft team and actually with Exchange Online, which is a key aspect that deals with anti-phishing, anti-spam, and anti malware.All right, that's all for this lecture. Whenever you're ready, you can go to the next one.
So when looking for preparing, you need Microsoft 365 Certified Fundamentals certification exam dumps, practice test questions and answers, study guide and complete training course to study. Open in Avanset VCE Player & study in real exam environment. However, Microsoft 365 Certified Fundamentals exam practice test questions in VCE format are updated and checked by experts so that you can download Microsoft 365 Certified Fundamentals certification exam dumps in VCE format.
Microsoft 365 Certified Fundamentals Certification Exam Dumps, Microsoft 365 Certified Fundamentals Certification Practice Test Questions and Answers
Do you have questions about our Microsoft 365 Certified Fundamentals certification practice test questions and answers or any of our products? If you are not clear about our Microsoft 365 Certified Fundamentals certification exam dumps, you can read the FAQ below.
Purchase Microsoft 365 Certified Fundamentals Certification Training Products Individually