Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
✑ Source Anchor: objectGUID
✑ Password Hash Synchronization: Disabled
✑ Password writeback: Disabled
✑ Directory extension attribute sync: Disabled
✑ Azure AD app and attribute filtering: Disabled
✑ Exchange hybrid deployment: Disabled
✑ User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Password Hash Synchronization settings.
Does that meet the goal?
KeepingITreal
Highly Voted 5 years, 2 months agom2L
Highly Voted 5 years, 5 months agoJonclark
Most Recent 2 years, 4 months agohb0011
2 years, 5 months agohb0011
2 years, 5 months agoNarenKA
2 years, 10 months agoEltooth
2 years, 11 months agoarska
3 years, 2 months agomkoprivnj
3 years, 7 months agokobura7
3 years, 7 months agoChris_Rock
3 years, 9 months ago[Removed]
3 years, 10 months agoPrimeAltariz
4 years, 1 month agokiketxu
4 years, 4 months agokiketxu
4 years, 3 months agobingomutant
4 years, 3 months agoprats005
4 years, 2 months agochaoscreater
4 years agollama321
4 years, 1 month agokmsrajan
4 years, 4 months agodoublekill
4 years, 4 months agoAshTac
4 years, 4 months agoshanti0091
4 years, 5 months ago