Previous Arrow Next Arrow

I'm looking for...

Solution Area

Select

Identity

Threat Protection

Cloud Security

Compliance

Product

Select

Advanced Audit

Azure Active Directory

Azure AD Domain Services

Azure AD External Identities

Azure DDoS Protection Standard

Azure Defender

Azure Defender for IoT

Azure Firewall

Azure Firewall Manager

Azure Front Door

Azure Key Vault

Azure Private Link

Azure Purview

Azure Security Center

Azure Sentinel

Azure Virtual WAN

Azure Web Application Firewall

Bastion

Communication Compliance

Compliance Ecosystem

Compliance Manager

Customer Lockbox

Data Loss Prevention

Data Subject Requests

eDiscovery

Encryption

Endpoint Data Loss Prevention

Information Barriers

Information Governance

Information Protection

Insider Risk Management

Microsoft 365 Defender

Microsoft 365 Security Center

Microsoft Cloud App Security

Microsoft Defender

Microsoft Defender for Endpoint

Microsoft Defender for Identity

Microsoft Defender for Office 365

Microsoft Endpoint Manager

Network Watcher

Privileged Access Management

Records Management

Secure Score

Teams Data Loss Prevention

Topic

Select

Applications and Services

Compliance Management

Discover and Respond

Email Security

Endpoint Security

Governance and Strategy

Identity and Access Management

Identity Security

Information Protection and Governance

Insider Risk Management

Microsoft Cybersecurity Reference Architecture

MITRE ATT&CK

Network Security

Privileged Access

Security Operations

SIEM

Storage, Data, and Encryption

XDR

Zero Trust

Role

Select

Administrator

Application Security and DevSecOps

Business Owner

Business User

Cloud Solution Architects

Data Security and Information Protection Analyst

Developer

DevOps Engineer

Identity and Access Admin

Incident Preparation

Infrastructure and Endpoint Security

People Security

Policy and Standards

Posture Management

Risk Practitioner

Security Architecture

Security Compliance Management

Security Engineer

Security Leadership

Security Operations

Solution Architect

Student

Technology Manager

Threat Intelligence

Tab Section Image

Check Out Featured Content

Spinner
Azure Active Directory security operations guide

This online guide helps you to define baselines, find the appropriate logs and events, and use the monitoring tools that will help you identify potential security threats.

Content Type Image
Published: 2 months ago
Migrate from Azure MFA Server to Azure multi-factor authentication

Guiding customers to select the right migration path, and move their MFA, and potentially user authentication and app authentication, to Azure AD.

Content Type Image
Published: 3 months ago
10 Reasons to love Passwordless #1: FIDO Rocks - Microsoft Tech Community

In this blog Pamela introduces FIDO2 and how it makes passwordless easy and secure.

Content Type Image
Published: 7 months ago
10 Reasons to Love Passwordless #2: NIST Compliance - Microsoft Tech Community

Passwordless will help you meet NIST compliance. Sue explains authentication assurance levels and how it corresponds with passwordless options.

Content Type Image
Published: 7 months ago
Spinner
Reduce your cyber exposure to vulnerabilities and misconfigurations

In this interactive guide, you will learn how to reduce your organizational risk with threat and vulnerability management capabilities in Microsoft Defender for Endpoint

Content Type Image
Published: 53 days ago
Become a Microsoft 365 Defender Ninja

This Ninja training covers the features and functions of Microsoft 365 Defender – everything that goes across the workloads

Content Type Image
Published: 10/19/2020
Protect your organization with Microsoft 365 Defender

In this interactive guide you will learn how you can protect your organization from advanced attacks with Microsoft 365 Defender

Content Type Image
Published: 09/22/2020
Audit the security of Windows Server IaaS Virtual Machines

You'll learn about Azure Security Center and how to onboard Windows Server computers to Security Center. You'll also learn about Azure Sentinel, security information and event management (SIEM), and security orchestration, automation and response (SOAR).

Content Type Image
Published: 09/24/2020
Spinner
Detect threats and protect information in cloud apps using Microsoft Cloud App Security

This learning path investigates Microsoft Cloud App Security, discovery, information protection and threat detection at an intermediate level.

Content Type Image
Published: 7 months ago
Protect and control information with Microsoft Cloud App Security

In this interactive guide, you'll learn how to protect and control information with Microsoft Cloud App Security. You'll see how to configure file policies to match on sensitive data types and protect from data leakage.

Content Type Image
Published: 7 months ago
Introduction to Azure DDoS Protection service

This module describes how to guard your Azure services from a denial of service attack using Azure DDoS Protection Standard.

Content Type Image
Published: 7 months ago
Introduction to Azure Private Link

This module describes how Azure Private Link enables private connectivity to Azure services, including its features, how it works, and its use cases.

Content Type Image
Published: 7 months ago
Spinner
Interactive Guide: Insider Risk Management

In this exercise, you will see how to use the scan function to quickly get an understanding of the insider risks an organization is exposed to, show suggested policies, and, see how to customize built-in policies as part of setup and deployment.

Content Type Image
Published: 53 days ago
Protect sensitive data with Microsoft Information Protection

In this interactive guide, you'll learn how to protect your organization’s sensitive data with Microsoft Information Protection.

Content Type Image
Published: 53 days ago
Manage content with information governance and records management

In this interactive guide, you'll see how information governance and records management in Microsoft 365 can help you retain or delete sensitive information.

Content Type Image
Published: 53 days ago
Data Loss Prevention Policies for Microsoft Teams

In this exercise, you will use the Microsoft 365 Compliance admin center to edit an existing DLP policy, adding Microsoft Teams as a location to which the policy will apply.

Content Type Image
Published: 53 days ago

Check Out Updated Content

Mobile threat defense from Microsoft Defender for Endpoint

Datasheet outlining the need for mobile threat defense and Microsoft Defender for Endpoint capabilities for Android and iOS.

Content Type Image
Published: 6 days ago

New

Respond to data loss prevention alerts using Microsoft 365

As a Security Operations Analyst, you need to understand compliance related terminology and alerts. Learn how the data loss prevention alerts will help in your investigation to find the full scope of the incident.

Content Type Image
Updated: 10 days ago

Updated

Zero Trust Deployment Center

Today, organizations need a new security model that effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they are located.

Content Type Image
Updated: 10 days ago

Updated