πŸ“ž
Contrxl
search
⌘Ctrlk
External Linkschevron-down
πŸ“ž
Contrxl
  • 🏑Home
  • πŸ“°News & Information
  • serverSystems Administration
    • ⌨️Cisco
    • πŸŽ“Learning Links
    • πŸ’»Microsoft
      • AZ-900
        • 1. Cloud Concepts
        • 2. Architecture
        • 3. Management and Governance
          • 3.1 Cost Management
          • 3.2 Governance and Compliance
            • 3.2.1 Introduction - Compliance and Governance
            • 3.2.2 Describe the Purpose of Microsoft Purview
            • 3.2.3 Describe the Purpose of Azure Policy
            • 3.2.4 Describe the Purpose of Resource Locks
            • 3.2.5 Configure a Resource Lock
            • 3.2.6 Describe the Purpose of the Service Trust Portal
            • 3.2.7 Summary - Compliance and Governance
          • 3.3 Tools for Managing Azure Resources
          • 3.4 Monitoring Tools
    • πŸ“˜Microsoft Portal Links
  • lockCybersecurity
    • ❓Anonymity Tools
    • πŸ’‘OSINT
    • πŸ“šProjects
  • 🦈Hacking
    • ☁️Cloud Attack Vectors
    • person-diggingMaintaining Persistence
    • πŸ’»Network-Based Vulnerabilities
    • table-pivotPivoting
    • sparklesSpecialised System Vulnerabilities
    • βš’οΈTools
    • πŸ–₯️TryHackMe
    • spider-webWeb Application Vulnerabilities
    • wifiWireless Vulnerabilities
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. serverSystems Administrationchevron-right
  2. πŸ’»Microsoftchevron-right
  3. AZ-900chevron-right
  4. 3. Management and Governance

3.2 Governance and Compliance

Contents page.

  • Introduction

  • Describe the Purpose of Microsoft Purview

  • Describe the Purpose of Azure Policy

  • Describe the Purpose of Resource Locks

  • Configure a Resource Lock

  • Describe the Purpose of the Service Trust Portal

  • Summary

Last updated 1 year ago