Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Detect a security breach in real-time and respond immediately to reduce damage. -
Introducing the security configuration framework: A prioritized guide to hardening Windows 10
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. -
4 tried-and-true prevention strategies for enterprise-level security
Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack. -
Building the security operations center of tomorrow—better insights with compound detection
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms. -
Step 8. Protect your documents and email: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Step 7. Discover shadow IT and take control of your cloud apps: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
5 steps financial institutions can take to reduce their cybercrime risk
Increasingly financial institutions are concerned about their cybersecurity risk. -
Step 6. Manage mobile apps: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization
In the first of our three part series, we provide tips on how to manage a security operations center (SOC) to be more responsive, effective, and collaborative. -
Why the Pipeline Cybersecurity Initiative is a critical step
Working together with government to push a more coordinated effort around infrastructure security—particularly pipelines and utilities—is critical. -
Step 5. Set up mobile device management: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Step 4. Set conditional access policies: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions.