Search


Validate Settings

(Back)

Objective

Use built-in tools to validate the security configuration and settings for O365 and apply recommendations as appropriate to improve security posture. Ensure that there is a consistent level of protection across GC data, identities, and devices.

Key Considerations

Validation

References

  1. Directive on Security Management - Appendix B: Mandatory Procedures for Information Technology Security Control
  2. SPIN 2017-01

Page details

Date modified: