Ta przeglądarka nie jest już obsługiwana.
Zaktualizuj do Microsoft Edge, aby skorzystać z najnowszych funkcji, aktualizacji bezpieczeństwa i wsparcia technicznego.
How is shadow IT introduced into an organization?
When a large number of users exhibit strange usage patterns across their daily apps.
When a cybercriminal successfully proliferates their attack and gains control of apps or devices.
When users in an organization use nonsanctioned apps that might not be compliant
Your organization wants to continuously monitor and respond to suspicious user actions in apps based on risk indicators like sign-in failures and activities from inactive accounts. How should it do this?
Use malware protection.
Use automated investigation and remediation.
Apply user and entity behavioral analytics.
Your organization wants to be able to scan for proprietary information when documents are being sent through cloud applications. How will it do this?
Use anomaly detection.
Use file policies.
You must answer all questions before checking your work.
Czy ta strona była pomocna?
Potrzebujesz pomocy w tym temacie?
Chcesz spróbować użyć Ask Learn, aby wyjaśnić lub poprowadzić się przez ten temat?