This is a dedicated watch page for a single video.
Your organization uses Microsoft 365 E5 and wants to enhance its security measures. You need to implement a solution that detects and responds to potential credential compromises. Which of the following configurations should you implement to meet these requirements?