A new security engineer claims that the only realistic way to troubleshoot oversharing in SharePoint and OneDrive is to ask each site owner to review their permissions manually, because there are no built-in reports that highlight broadly exposed sites or excessive sharing. You disagree and point out that there are dedicated admin-level tools that surface oversharing patterns and can trigger site access reviews. The engineer’s claim that there are no built-in tools to help identify oversharing is correct. True or False?
A security architect is explaining how Microsoft Defender XDR helps reduce analyst workload. Complete the sentence:“Microsoft Defender XDR helps security teams by ______.”
Your security team has been asked to report “how we will move Identity Secure Score from 32% to at least 60% in the next quarter” instead of just quoting the number. They want a view in the Entra portal that shows each actionable recommendation, its impact on the score, and whether it is completed, partially completed, or not started, so they can build a roadmap from it. To build this roadmap, they should primarily use the ________ associated with Identity Secure Score in the Entra admin center.
A sales operations manager at Fabrikam has crafted a detailed Copilot prompt for weekly pipeline reviews. The team wants to:Use the same wording each weekMake it easy for new team members to discover the promptAvoid everyone maintaining their own slightly different textYou are asked how to manage this centrally using built-in Copilot capabilities.Which approach best uses Copilot’s prompt management features to meet these goals?