📞
Contrxl
Ctrlk
External Links
  • 🏡Home
  • 📰News & Information
  • Systems Administration
    • ⌨️Cisco
    • 🎓Learning Links
    • 💻Microsoft
      • AZ-900
        • 1. Cloud Concepts
        • 2. Architecture
        • 3. Management and Governance
          • 3.1 Cost Management
          • 3.2 Governance and Compliance
            • 3.2.1 Introduction - Compliance and Governance
            • 3.2.2 Describe the Purpose of Microsoft Purview
            • 3.2.3 Describe the Purpose of Azure Policy
            • 3.2.4 Describe the Purpose of Resource Locks
            • 3.2.5 Configure a Resource Lock
            • 3.2.6 Describe the Purpose of the Service Trust Portal
            • 3.2.7 Summary - Compliance and Governance
          • 3.3 Tools for Managing Azure Resources
          • 3.4 Monitoring Tools
    • 📘Microsoft Portal Links
  • Cybersecurity
    • ❓Anonymity Tools
    • 💡OSINT
    • 📚Projects
  • 🦈Hacking
    • ☁️Cloud Attack Vectors
    • Maintaining Persistence
    • 💻Network-Based Vulnerabilities
    • Pivoting
    • Specialised System Vulnerabilities
    • ⚒️Tools
    • 🖥️TryHackMe
    • Web Application Vulnerabilities
    • Wireless Vulnerabilities
Powered by GitBook
On this page
  1. Systems Administration
  2. 💻Microsoft
  3. AZ-900
  4. 3. Management and Governance

3.2 Governance and Compliance

Contents page.

  • Introduction

  • Describe the Purpose of Microsoft Purview

  • Describe the Purpose of Azure Policy

  • Describe the Purpose of Resource Locks

  • Configure a Resource Lock

  • Describe the Purpose of the Service Trust Portal

  • Summary

Last updated 9 months ago