Your network contains an Active Directory forest.You deploy Microsoft 365.You plan to implement directory synchronizationYou need to recommend a security solution for the synchronized identities. The solution must meet thefollowing requirements:• Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomesunavailable.• User passwords must be 10 characters or more.Solution: Implement pass-through authentication and configure Microsoft Entra Password protection. Doesthis meet the goal?
Your network contains an Active Directory forest.You deploy Microsoft 365.You plan to implement directory synchronizationYou need to recommend a security solution for the synchronized identities. The solution must meet thefollowing requirements:• Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomesunavailable.• User passwords must be 10 characters or more.Solution: Implement pass-through authentication and configure Microsoft Entra Password protection. Doesthis meet the goal?
You have a Microsoft 365 E5 subscription and use Microsoft Defender for Endpoint Defender for Endpointhas tamper protection enabled.You have a device named Device1 that is onboarded to Defender for Endpoint. You need to configureantivirus and real-time protection for Device1.What should you do in the Microsoft Defender portal?
You are an IT administrator and want to allow emails with attachments to flow without delay from internal senders. Which admin center should you navigate to for creating a transport rule that bypasses Safe Attachments scanning?