Q: 9
You are investigating a suspected data theft incident and need to answer two separate
questions:
1. Who changed several Entra admin roles and consented a suspicious enterprise
application?
2. What potentially sensitive actions a specific user took across Exchange Online,
SharePoint, and Teams in the last 30 days?
Multiple engineers propose di[erent approaches to pull the necessary evidence while
maintaining a clear separation between directory-level configuration changes and cross-
workload user activity.
Which proposed approach best uses the appropriate tools for each part of this
investigation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.