Ultimate access to all questions.
You are tasked with designing a ransomware response plan in accordance with Microsoft Security Best Practices. To limit the scope of damage caused by ransomware attacks while ensuring that authorized users are not locked out of critical systems, what solution should you recommend incorporating into the response plan?