Summary
Microsoft 365 was built with security features in mind. Administrators should take some time to understand the wide range of features and controls that are available to them for delegating and administering the security aspects of tenants.
In this chapter, you learned about the security concepts and controls for managing identity, documents, networking, and devices. In addition, we discussed managing access to resources through credentials, network perimeter controls, and Conditional Access. Finally, we discussed the benefit and visibility that Secure Score brings to an organization and how it can be used to continuously improve and monitor an organization's security stance.
In the next chapter, we will cover identity protection and management.