Check Out Featured Content
This online guide helps you to define baselines, find the appropriate logs and events, and use the monitoring tools that will help you identify potential security threats.
Guiding customers to select the right migration path, and move their MFA, and potentially user authentication and app authentication, to Azure AD.
In this blog Pamela introduces FIDO2 and how it makes passwordless easy and secure.
Passwordless will help you meet NIST compliance. Sue explains authentication assurance levels and how it corresponds with passwordless options.
In this interactive guide, you will learn how to reduce your organizational risk with threat and vulnerability management capabilities in Microsoft Defender for Endpoint
This Ninja training covers the features and functions of Microsoft 365 Defender – everything that goes across the workloads
In this interactive guide you will learn how you can protect your organization from advanced attacks with Microsoft 365 Defender
You'll learn about Azure Security Center and how to onboard Windows Server computers to Security Center. You'll also learn about Azure Sentinel, security information and event management (SIEM), and security orchestration, automation and response (SOAR).
This learning path investigates Microsoft Cloud App Security, discovery, information protection and threat detection at an intermediate level.
In this interactive guide, you'll learn how to protect and control information with Microsoft Cloud App Security. You'll see how to configure file policies to match on sensitive data types and protect from data leakage.
This module describes how to guard your Azure services from a denial of service attack using Azure DDoS Protection Standard.
This module describes how Azure Private Link enables private connectivity to Azure services, including its features, how it works, and its use cases.
In this exercise, you will see how to use the scan function to quickly get an understanding of the insider risks an organization is exposed to, show suggested policies, and, see how to customize built-in policies as part of setup and deployment.
In this interactive guide, you'll learn how to protect your organization’s sensitive data with Microsoft Information Protection.
In this interactive guide, you'll see how information governance and records management in Microsoft 365 can help you retain or delete sensitive information.
In this exercise, you will use the Microsoft 365 Compliance admin center to edit an existing DLP policy, adding Microsoft Teams as a location to which the policy will apply.
Check Out Updated Content
Datasheet outlining the need for mobile threat defense and Microsoft Defender for Endpoint capabilities for Android and iOS.
As a Security Operations Analyst, you need to understand compliance related terminology and alerts. Learn how the data loss prevention alerts will help in your investigation to find the full scope of the incident.
Today, organizations need a new security model that effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they are located.