You are the Office 365 administrator for a company. All employees use Office 365 authentication, email, and
Office applications.
You need to implement a process to review email, Facebook posts, and files saved to Dropbox.
Solution: You implement a device security policy.
Does the solution meet the goal?
A.
Yes
B.
No