Summary and resources

Completed

Now that you have reviewed this module, you should be able to:

  • Review Identity Protection basics.
  • Implement and manage a user risk policy.
  • Implement and manage sign-in risk policies.
  • Implement and manage multifactor authentication (MFA) registration policy.
  • Monitor, investigate, and remediate elevated risky users.
  • Explore Microsoft Defender for Identity

Resources

Use these resources to discover more.