Check Out Featured Content
3 important resources to help your organization get to passwordless
In this tutorial, learn how to migrate your applications from Okta to Azure Active Directory (Azure AD)
Integrate your software with Microsoft's Zero Trust solutions to improve your security.
Learn how to easily integrate with your partners using entitlement management. With features like custom questions and built-in attributes, you can achieve levels of governance for partners, your organization desire.
In this interactive guide you will learn how to investigate and remediate incidents with Microsoft Defender for Endpoint
Dive into these Microsoft 365 Defender level 400 training resources to help you become an Microsoft 365 Defender ninja
This learning path provides an introduction to Microsoft 365 Defender, Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365
Azure Sentinel has so many new features coming out all the time, it can be hard to keep up!
"Azure Defender for servers includes an integrated license for Microsoft Defender for Endpoint. Together, they provide comprehensive endpoint detection and response (EDR) capabilities. When Defender for Endpoint detects a threat, it triggers an alert. The alert is shown in Security Center. From Security Center, you can also pivot to the Defender for Endpoint console, and perform a detailed investigation to uncover the scope of the attack."
"We've now added a workbook dedicated to tracking a subscription's compliance with the regulatory or industry standards applied to it. Learn about using these reports or building your own in Create rich, interactive reports of Security Center data."
In this interactive guide you'll see how Azure network security solution an help you manage network traffic, prevent attacks, directed at your resources, and get more secure connectivity to you virtual machines.
The cloud native Azure Firewall provides protection against network-based threats. Azure Sentinel is the cloud native SIEM and SOAR solution which provides threat detection, hunting, and automated response capabilities for Azure Firewall.
Interactive Guide: Insider Risk Management Exercise 1 – Analytics Objective In this exercise, you will see how to use the scan function to quickly get an understanding of the insider risks an organization is exposed to, show suggested policies, and, see how to customize built-in policies as part of setup and deployment.
In this interactive guide, you'll learn how to protect your organization’s sensitive data with Microsoft Information Protection.
Microsoft 365 can help you retain or delete sensitive information as needed.
In this exercise, you will use the Microsoft 365 Compliance admin center to edit an existing DLP policy, adding Microsoft Teams as a location to which the policy will apply.
In this guide, you will learn how to enable configuration management of workloads from the Microsoft Intune cloud console. Then you can direct your Windows 10 endpoints managed by Configuration Manager to start listening to Intune for certain workloads.
In this guide, you will learn how tenant attach connects you existing on-premises Microsoft Endpoint Configuration Manager infrastructure with your Microsoft Intune cloud tenant.
In this guide, you will learn how to configure Security Baselines in Windows 10.
This guide shows you how to set up an Application Protection policy (APP) with Microsoft Intune for an Android device.
Check Out Updated Content
Return on investment, business benefits detailed in study conducted by Forrester Consulting and commissioned by Microsoft.
Learn more about what workload identities are and how Azure AD can help secure workload identities better.
Overview of how security roles and responsibilities are evolving with the adoption of cloud and zero trust security