Describe the most common types of threats against endpoints, applications, and identities
Describe the deployment and release models for Windows-as-a-Service (WaaS) including deployment rings
Describe available billing and bill management options including billing frequency and methods of payment
Describe Microsoft Secure Score benefits and capabilities
Identify factors that drive organizations to move to the cloud
Describe the pricing model for Microsoft cloud services including enterprise agreements, cloud solution providers, and direct billing
Describe Microsoft 365 Defender, Defender for Endpoint, Defender for Office 365, Defender for Identity, and the Microsoft Defender Portal
Compare advantages of cloud-based services versus on-premises services
Compare the capabilities of Windows 365 and Azure Virtual Desktop and when it makes sense to implement either
Describe public, private, and hybrid scenarios
Describe the purpose and value of conditional access
Describe Microsoft’s privacy principles
Describe the endpoint management capabilities of Microsoft 365 including Microsoft Endpoint Manager (MEM), Windows 365 Cloud PC, and Azure Virtual Desktop
Describe the purpose and value of implementing multi-factor authentication (MFA)
Describe privacy management concepts
Describe differences between Office 365, Microsoft 365, and Windows 365