Summary and knowledge check

Completed

In this module, you learned how the architecture of Microsoft 365 implements security and privacy features to protect customers who use Microsoft 365 multi-tenant services.

Now that you have completed this module, you should be able to:

  • Describe the high-level architecture of Microsoft 365 services and dependencies.
  • List the security principles built into Microsoft 365 architecture.
  • Explain how Microsoft 365 implements network, service, and tenant isolation.
  • Explain how Microsoft 365 protects its infrastructure from DDoS attacks.
  • Describe how Microsoft 365 maintains service, data, and network resiliency.
  • Explain how Microsoft 365 performs architecture validation to verify the security posture of Microsoft 365 services.

Check your knowledge

1.

Which of the following protects customers from being adversely affected by other tenants using Microsoft 365 multi-tenant services?

2.

Which Microsoft 365 security principle uses multiple security controls to provide increased protection?

3.

How does Microsoft validate the architecture of Microsoft 365?

4.

Which data resiliency principle involves shared responsibility between Microsoft 365 and our customers?

5.

Microsoft’s unique scale and global footprint bolster which aspect of DDoS defense?