HOTSPOT -
You have a Microsoft 365 tenant.
You need to identify users who have leaked credentials. The solution must meet the following requirements:
✑ Identify sign-ins by users who are suspected of having leaked credentials.
✑ Flag the sign-ins as a high-risk event.
✑ Immediately enforce a control to mitigate the risk, while still allowing the user to access applications.
What should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
abelchior
Highly Voted 3 years, 8 months agoBaderJ
Highly Voted 3 years, 7 months agoAdemola_12
Most Recent 1 year, 2 months agoTuvshinjargal
1 year, 2 months agocsi_2025
2 months agoTony416
8 months agoEmnCours
1 year, 9 months agoHeshan
1 year, 9 months agodule27
1 year, 10 months agochrisp1992
2 years, 4 months agoZubairr13
2 years, 9 months agorachee
2 years, 10 months agoXyz_40
2 years, 11 months agoJun143
3 years, 1 month agoBluediamond
3 years, 2 months agoBluediamond
3 years, 2 months agoPravda
3 years, 3 months ago