Without a thorough understanding of network security, an organization is vulnerable to attacks and performance issues on its network. This vulnerability can negatively affect the organization's finances and reputation.
In this module, we discussed how authentication and authorization are used to protect a network. We covered how a network is monitored for intrusion, performance, and availability. And we explored the Azure tools that can help in these efforts.
You should now have a better understanding of how to protect the resources, devices, and users on your network.
Need help? See our troubleshooting guide or provide specific feedback by reporting an issue.