Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Microsoft 365 Certified Fundamentals MS-900 Exam Guide - Third Edition

You're reading from  Microsoft 365 Certified Fundamentals MS-900 Exam Guide - Third Edition

Product type Book
Published in Nov 2023
Publisher Packt
ISBN-13 9781837636792
Pages 376 pages
Edition 3rd Edition
Languages
Authors (3):
Aaron Guilmette Aaron Guilmette
Profile icon Aaron Guilmette
Yura Lee Yura Lee
Profile icon Yura Lee
Marcos Zanre Marcos Zanre
Profile icon Marcos Zanre
View More author details

Table of Contents (15) Chapters

Preface 1. Chapter 1: Describe the Different Types of Cloud Services Available 2. Chapter 2: Describe the Benefits and Considerations for Using Cloud, Hybrid, or On-Premises Services 3. Chapter 3: Describe the Productivity Solutions of Microsoft 365 4. Chapter 4: Describe the Collaborative Solutions of Microsoft 365 5. Chapter 5: Describe Endpoint Modernization, Management Concepts, and Deployment Options in Microsoft 365 6. Chapter 6: Describe the Analytics Capabilities of Microsoft 365 7. Chapter 7: Describe Zero Trust Principles for Microsoft 365 8. Chapter 8: Understand Identity and Access Management Solutions 9. Chapter 9: Describe the Threat Protection Solutions of Microsoft 365 10. Chapter 10: Describe the Trust, Privacy, Risk, and Compliance Solutions of Microsoft 365 11. Chapter 11: Identify Microsoft 365 Pricing and Billing Management Options 12. Chapter 12: Identify Licensing Options Available in Microsoft 365 13. Chapter 13: Identify Support Options for Microsoft 365 Services 14. Other Books You May Enjoy

Describe the Zero-Trust Model

Traditional Information Technology (IT) security measures have relied primarily on treating the corporate infrastructure as a boundary—everything inside the local network is safe, while anything outside the firewall is a threat.

However, the proliferation of mobile devices, hybrid work, and Bring-Your-Own-Device (BYOD) scenarios has allowed organizational data to be freely transported beyond the corporate network boundary. Firewalls in an office setting are not effective when the data you are trying to protect is on a tablet computer that was left at a restaurant or on the subway.

With that in mind, Microsoft (and the tech industry as a whole) has pivoted from the traditional security perimeter defense perspective to a model called zero trust.

Zero trust is based on the concept of minimizing an organization’s risk footprint by interrogating the security of everything that attempts to access data or services. The zero-trust model...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}