Summary and knowledge check
In this module, you learned how the architecture of Microsoft 365 implements security and privacy features to protect customers who use Microsoft 365 multi-tenant services.
Now that you have completed this module, you should be able to:
- Describe the high-level architecture of Microsoft 365 services and dependencies.
- List the security principles built into Microsoft 365 architecture.
- Explain how Microsoft 365 implements network, service, and tenant isolation.
- Explain how Microsoft 365 protects its infrastructure from DDoS attacks.
- Describe how Microsoft 365 maintains service, data, and network resiliency.
- Explain how Microsoft 365 performs architecture validation to verify the security posture of Microsoft 365 services.