Tento prohlížeč se už nepodporuje.
Upgradujte na Microsoft Edge, abyste mohli využívat nejnovější funkce, aktualizace zabezpečení a technickou podporu.
How is shadow IT introduced into an organization?
When a large number of users exhibit strange usage patterns across their daily apps.
When a cybercriminal successfully proliferates their attack and gains control of apps or devices.
When users in an organization use nonsanctioned apps that might not be compliant
Your organization wants to continuously monitor and respond to suspicious user actions in apps based on risk indicators like sign-in failures and activities from inactive accounts. How should it do this?
Use malware protection.
Use automated investigation and remediation.
Apply user and entity behavioral analytics.
Your organization wants to be able to scan for proprietary information when documents are being sent through cloud applications. How will it do this?
Use anomaly detection.
Use file policies.
You must answer all questions before checking your work.
Byla tato stránka užitečná?
Potřebujete pomoct s tímto tématem?
Chcete vyzkoušet použití funkce Zeptat se a Učit se k objasnění nebo nechcete provést tímto tématem?