Describe how Yammer helps communities connect and grow
Describe the endpoint management capabilities of Microsoft 365 including Microsoft Endpoint Manager (MEM), Windows 365 Cloud PC, and Azure Virtual Desktop
Compare the capabilities of Windows 365 and Azure Virtual Desktop and when it makes sense to implement either
Describe the deployment and release models for Windows-as-a-Service (WaaS) including deployment rings
Identify deployment and servicing methods for Microsoft 365 apps
Describe the capabilities of Viva Insights
Describe the capabilities of the Microsoft 365 Admin center and Microsoft 365 user portal
Describe the reports available in the Microsoft 365 Admin center and other admin centers
Identify key components that need to be protected within an organization’s cloud and onpremises infrastructure
Describe the principle of least privileged access
Describe the principle of explicit verification
Describe the principle of assumed breaches
Describe the identity and access management capabilities in Microsoft 365 including Azure Active Directory and Azure Identity
Describe cloud identity, on-premises identity, and hybrid identity concepts
Describe the purpose and value of implementing multi-factor authentication (MFA)
Describe the purpose and value of conditional access