Q: 10
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.
You need to identify which users access Facebook from their devices and browsers. The solution
must minimize administrative effort.
What should you do first?
Options
Discussion
Option A every time for fast identification, barely any admin overhead.
A imo, had almost the same in a practice set last month, first step is mark Facebook unsanctioned.
C tbh, since creating a Defender for Cloud Apps access policy lets you specify Facebook and see user activity. Feels like the direct way, but I get why A is tempting for quick tagging.
Its C, create a Defender for Cloud Apps access policy.
C/D? I always thought creating a Defender for Cloud Apps access policy (C) was the first step if you want to track who is using something like Facebook. Conditional Access could also come in here, so not 100%.
A imo. Tagging Facebook as unsanctioned in Defender for Cloud Apps lets you filter its usage right away, minimizing admin work. C feels like a trap here since that's more for blocking or controlling rather than just quick identification. Agree?
Its A, but if you needed to block or restrict access instead of just identify users, I'd switch to C.
C/D? I'm not sure, I'd probably start with C instead for identifying specific access. Could be wrong.
C seems like the way to go, since a Defender for Cloud Apps access policy could let you target Facebook traffic directly and see those users. I thought that would be the fastest route. Not super confident though, maybe I'm missing some shortcut in A?
A imo. Tagging Facebook as unsanctioned in Defender for Cloud Apps makes it super quick to filter and report on who accessed it. C can look tempting but it's more about enforcing controls, not just spotting usage with minimal work. If you wanted to block, sure, but for this question I think A fits best. Anyone see a reason C would actually be less effort here?
Be respectful. No spam.