Summary and knowledge check

Completed

In this module, you learned about how Microsoft 365 uses comprehensive audit logging and monitoring to support security monitoring, maintain service availability, and meet compliance requirements.

Now that you have completed this module, you should be able to:

  • Explain how Microsoft 365 standardizes log data collection.
  • Describe how Microsoft 365 aggregates and protects log data in centralized processing and storage services.
  • List Microsoft 365's retention policies for log data.
  • Explain how Microsoft 365 analyzes log data to support security monitoring and service health monitoring.

Check your knowledge

1.

How does Microsoft 365 respond at scale to security issues detected by security monitoring?

2.

When suspicious activity is detected by security monitoring, who receives security incident escalations?

3.

Which statement below is accurate?