Bu tarayıcı artık desteklenmiyor.
En son özelliklerden, güvenlik güncelleştirmelerinden ve teknik destekten faydalanmak için Microsoft Edge’e yükseltin.
Why is it important to identify your attack surface?
It helps you to understand all the ways in which a cybercriminal could launch an attack.
It's a feature of a modern device management solution that lets you monitor endpoints.
It describes the detailed recommended settings for security to stop an ongoing attack.
Why should you register your endpoints with a cloud identity provider?
This enables your organization to update device configurations using compliance policies.
It enables you to decommission endpoints with a single switch when they're no longer used.
This enables your organization to see and manage access to endpoints.
Your organization uses compliance policies to satisfy security requirements. What should your organization do for noncompliant devices?
Your organization should set remediation rules when you create compliance policies.
Your organization should configure security baselines to remediate noncompliant devices.
Your organization should update those devices so that they automatically become compliant.
You must answer all questions before checking your work.
Bu sayfayı yararlı buldunuz mu?
Bu konu hakkında yardıma mı ihtiyacınız var?
Bu konuyu açıklığa kavuşturmak veya bu konuda size yol göstermek için Ask Learn'ü kullanmayı denemek ister misiniz?