
Microsoft 365 Certified Fundamentals MS-900 Exam Guide
By :

As you've seen, there is a multitude of configuration options available to help organizations of all sizes meet their identity, authentication, and security needs.
In this chapter, we discussed the differences between cloud, synchronized, and federated identity, as well as the security controls available with EMS, such as conditional access and access reviews. We learned which identity model can be used to help meet specific requirements – for example, if your organization needs on-premises identity authentication to comply with your security needs, you'll now know that you should choose between pass-through authentication and federated identity.
In the next chapter, we're going to look at technologies that enable endpoint security control and management.
Change the font size
Change margin width
Change background colour