Contoso Corporation wants to implement Microsoft Entra Password Protection to enhance their password security. The IT team wants to prevent users from using weak passwords that include the company name, product names, and office locations. Which of the following approaches should they take to most effectively implement this security measure?