Summary
As you’ve seen, there is a multitude of configuration options available to help organizations of all sizes meet their identity, authentication, and security needs.
In this chapter, you have learned the differences between cloud, synchronized, and federated identity, as well as the security controls available with EMS and Azure AD premium, such as Conditional Access and access reviews. You learned which identity model can be used to help meet specific requirements—for example, if your organization needs on-premises identity authentication to comply with your security needs, you now know that you should choose between pass-through authentication and federated identity.
You also learned about some of the commonly implemented features of the Microsoft 365 platform, including SSPR and multi-factor authentication.
In the next chapter, you’re going to look at technologies that enable endpoint security control and management.