Implement and manage sign-in risk policy
Implement and manage MFA registration policy
Monitor, investigate and remediate risky users
Implement security for workload identities
Configure custom Azure roles
Create and configure managed identities
Use managed identities to access Azure resources
Analyze Azure role permissions
Configure Azure Key Vault RBAC and policies
Discover and manage apps by using Microsoft Defender for Cloud Apps
Configure connectors to apps
Implement application-enforced restrictions
Configure conditional access app control
Create access and session policies in Microsoft Defender for Cloud Apps
Implement and manage policies for OAUTH apps