Summary
Microsoft 365 was built with security features in mind. Administrators should take some time to review the wide range of features and controls that are available to them for delegating and administering the security aspects of tenants.
In this chapter, you learned about the overall principles of zero-trust security and its concepts and controls, including managing identity, endpoints, apps, data, infrastructure, and networking. In addition, you grasped ways to manage access to resources through credentials, network perimeter controls, and Conditional Access, as well as using encryption as a layer to protect against unauthorized access or data modification.
In the next chapter, you will cover identity protection and management.