Hello and welcome to this wiser now third part. It's Radio Siri's. We're talking about security. My name is Chris Tomiko on We are in the third module at Second lesson of the third module. We're talking about security in general. We just finished up talking about the way that information protection works.
We're gonna carry on with security management here, so let's get cracking.
Microsoft 365 Security Center. This helps keep on top of issues across your network. It gives you reports, basically, that allow you to keep keep abreast of everything that's happening with your network.
It's It does have a centralized dashboard to monitor your network on. It also recommends improvements for your network. It's a very cool thing. Microsoft have done a big push with a I in recent years, and the security center is probably the most one of the strongest areas that they use it in.
It will actually constantly monitor your environment, your network
on recommend things you should do to make it more secure effectively. It also helps to configure policies for you. It will recommend if things don't look right or, you know, you really sure you meant to do rent meant to do what you You know that tick box that you just ticked.
It will actually help you to reconfigure those policies and get them working on again. Just a very quick in like screenshot there. That's kind of what you're looking at with the security center again. Very visual, very quick to read,
very easy to read as well. So don't worry too much. It's just to give you an idea of what you're looking at when you do look at it.
Microsoft secure score. So this is an overall security score off your organization. It basically means that it it will give you is easy to understand. The higher the score, the better the network effectively in terms of security.
And it gives you a visual representation off your security, as you can see on that screen there.
So it's a little little kind of pie chart, and it fills up with circle as you get closer to getting everything to its best practice level effectively. And then if you do want to drill down into it, you can have like a full report, which we can see here again. These are just for show very visual type things.
Not to kind of get you to really read into them. Because
hopefully after this fundamentals course you'll be inclined to go off and maybe run a trial and have a look at it yourself. Or even, you know, who knows? I might create a another video. Siri's with regards to dealing with Microsoft. 365 in more detail on that might come up.
Who knows? All right, so
that's kind of what we're looking at here with security management. All right, so let's finish up with our tried and trusted pop quiz, shall we?
Using the last three or so videos. What is the name
off the underpinning technology that allows Microsoft's products to talk to each other seamlessly?
Have a think about this, so I will give you a clue. All right. This is, uh
you need to go and have a rest.
Was that that might be too big a clue? I don't know. Go and have a think about it. Pause the video. Maybe Look back on the videos. If you do need to on then come back here.
All right, we welcome back. If you did say Microsoft graph, you would be correct. And the reason I say that you should go and have a rest is because it is based on the rest. A p I the application programming interface. Remember, what rest stands for? It is. Let me get my pen.
Come on. There we go.
That is rest. So they do R E
S t that's where the name comes from. All right.
Excellent. All right. So let's summarize then, in today's video course in this lesson, we discussed the key pillars of security. So there were four key pillars. Keep that in mind
the how Microsoft 365 protects identity and access. So we're talking about that the whip information protection on the conditional access as well was a big one there
Um, and also how it protects against threats. That was the 80 p environment and the security center, which we discussed just towards the beginning of this video.
And I apologize, but I'm gonna write it The British Way
way also discussed how it protects information and that again comes into the whip environment on also like the labelling and the classification of data classification and label
I hope this video has been informative for you. And I'd like to thank you for watching.