Azure AD Identity Protection can detect whether user credentials were leaked to the public. True or false?

Disable ads (and more) with a membership for a one time $4.99 payment

Study for the Microsoft SC-900 Exam. Master key concepts with targeted flashcards and multiple-choice questions, featuring hints and explanations. Get prepared and confident for success!

Azure AD Identity Protection indeed has the capability to detect whether user credentials have been leaked to the public. This feature plays a critical role in enhancing security by monitoring for signs of credential exposure on the dark web and other public repositories of compromised data. When a potential breach is detected, Azure AD Identity Protection can trigger risk alerts and initiate automated responses, such as requiring password resets or multi-factor authentication, to mitigate risks associated with compromised user accounts.

The ability to monitor for leaked credentials is part of a broader strategy to protect organizations from identity theft and unauthorized access, emphasizing proactive security measures and helping organizations to maintain the integrity of their identity management systems. This function is essential for safeguarding sensitive data and ensuring compliance with security policies and standards.