Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam MS-700 Topic 4 Question 99 Discussion

Actual exam question for Microsoft's MS-700 exam
Question #: 99
Topic #: 4
[All MS-700 Questions]

Your company has a Microsoft 365 E5 subscription.

You enable guest access for Microsoft Teams.

You need to prevent all users from downloading and opening files that contain malware by using Microsoft Teams channels.

What should you do first?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Karol
1 months ago
If I had a dollar for every time someone tried to solve a malware problem by adding an identity provider, I'd be rich. Definitely the DLP policy is the way to go.
upvoted 0 times
...
Ashlyn
1 months ago
The end-user protection baseline policy? Sounds fancy, but I doubt that's the solution here. Let's keep it simple and go with the DLP policy.
upvoted 0 times
Yong
4 days ago
Definitely, it's better to be safe than sorry.
upvoted 0 times
...
Ressie
8 days ago
C) From the Azure Active Directory admin center, add an identity provider.
upvoted 0 times
...
Ronny
10 days ago
I think that's the best option to prevent malware.
upvoted 0 times
...
Glendora
13 days ago
B) From the Microsoft 365 Defender portal, select Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams
upvoted 0 times
...
Elly
13 days ago
I agree, let's go with the DLP policy.
upvoted 0 times
...
Dorothea
18 days ago
A) From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
upvoted 0 times
...
...
Salley
2 months ago
Adding an identity provider from the Azure AD admin center? Nah, that's not going to help with the malware problem. I'm sticking with the DLP policy option.
upvoted 0 times
Daniel
9 days ago
C) From the Azure Active Directory admin center, add an identity provider.
upvoted 0 times
...
Mickie
10 days ago
Adding a DLP policy is the way to go to prevent malware.
upvoted 0 times
...
Annette
19 days ago
B) From the Microsoft 365 Defender portal, select Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams
upvoted 0 times
...
Veronika
20 days ago
A) From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
upvoted 0 times
...
...
Carey
2 months ago
Activating Defender for Office 365 seems like a good idea, but that's more of a general security measure. I'd go with the DLP policy to really target the Teams channels specifically.
upvoted 0 times
...
Lezlie
2 months ago
Hmm, I think the best option here is to create a data loss prevention (DLP) policy from the Microsoft Purview compliance portal. That way, we can set up specific rules to prevent malware downloads in Teams channels.
upvoted 0 times
Thaddeus
1 months ago
I think creating a DLP policy would be more specific to our needs in this case.
upvoted 0 times
...
Almeta
1 months ago
B) From the Microsoft 365 Defender portal, select Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams
upvoted 0 times
...
Oretha
1 months ago
That sounds like a good idea. It will help us control what files can be downloaded in Teams.
upvoted 0 times
...
Nan
2 months ago
A) From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
upvoted 0 times
...
...
Marcelle
3 months ago
Hmm, that makes sense too. Let's wait for more opinions before deciding.
upvoted 0 times
...
Golda
3 months ago
I disagree, I believe the correct answer is B) From the Microsoft 365 Defender portal, select Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams.
upvoted 0 times
...
Marcelle
3 months ago
I think the answer is A) From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77