Which pillar of identity focuses on tracking resources accessed by users?

Disable ads (and more) with a membership for a one time $4.99 payment

Study for the Microsoft SC-900 Exam. Master key concepts with targeted flashcards and multiple-choice questions, featuring hints and explanations. Get prepared and confident for success!

The pillar of identity that focuses on tracking resources accessed by users is Auditing. This pillar involves the continuous monitoring and logging of user activities to ensure compliance and security within an organization. By implementing auditing practices, organizations can create a detailed record of who accessed what resources and when, allowing them to analyze patterns, detect anomalies, and respond to potential security threats.

Auditing is crucial for maintaining accountability and ensuring that users only access data and resources they are authorized to use. It also supports compliance with various regulatory requirements by providing evidence of proper usage and any potential breaches.

In contrast, while Authorization deals with granting or denying access rights based on a user's identity and role, and Administration refers to the management and configuration of identity and access policies, these aspects do not inherently involve tracking access activities like auditing does. Authentication, on the other hand, is the process of verifying a user's credentials before granting access to systems or resources, which is separate from the ongoing tracking of access behaviors.