Previous Arrow Next Arrow

I'm looking for...

Solution Area



Threat Protection

Cloud Security




Advanced Audit

Azure Active Directory

Azure AD Domain Services

Azure AD External Identities

Azure DDoS Protection Standard

Azure Defender

Azure Defender for IoT

Azure Firewall

Azure Firewall Manager

Azure Front Door

Azure Key Vault

Azure Private Link

Azure Purview

Azure Security Center

Azure Sentinel

Azure Virtual WAN

Azure Web Application Firewall


Communication Compliance

Compliance Ecosystem

Compliance Manager

Customer Lockbox

Data Loss Prevention

Data Subject Requests



Endpoint Data Loss Prevention

Information Barriers

Information Governance

Information Protection

Insider Risk Management

Microsoft 365 Defender

Microsoft 365 Security Center

Microsoft Cloud App Security

Microsoft Defender

Microsoft Defender for Endpoint

Microsoft Defender for Identity

Microsoft Defender for Office 365

Microsoft Endpoint Manager

Microsoft Information Protection

Network Watcher

Privileged Access Management

Records Management

Secure Score

Teams Data Loss Prevention



Applications and Services

Compliance Management

Discover and Respond

Email Security

Endpoint Security

Governance and Strategy

Identity and Access Management

Identity Security

Information Protection and Governance

Insider Risk Management

Microsoft Cybersecurity Reference Architecture


Network Security

Privileged Access

Security Operations


Storage, Data, and Encryption


Zero Trust




Application Security and DevSecOps

Business Owner

Business User

Data Security and Information Protection Analyst


DevOps Engineer

Identity and Access Admin

Incident Preparation

Infrastructure and Endpoint Security

People Security

Policy and Standards

Posture Management

Risk Practitioner

Security Architecture

Security Compliance Management

Security Engineer

Security Leadership

Security Operations

Solution Architect


Technology Manager

Threat Intelligence

Tab Section Image

Check Out Featured Content

10 Reasons to love Passwordless #1: FIDO Rocks - Microsoft Tech Community

In this blog Pamela introduces FIDO2 and how it makes passwordless easy and secure.

Content Type Image
Published: 6 months ago
10 Reasons to Love Passwordless #2: NIST Compliance - Microsoft Tech Community

Passwordless will help you meet NIST compliance. Sue explains authentication assurance levels and how it corresponds with passwordless options.

Content Type Image
Published: 5 months ago
10 Reasons to Love Passwordless #3: Why biometrics and passwordless are a dream combination - Microsoft Tech Community

Alex explains why combining passwordless and biometrics, makes authentication more secure and easy to use.

Content Type Image
Published: 5 months ago
Become a Microsoft 365 Defender Ninja

This Ninja training covers the features and functions of Microsoft 365 Defender – everything that goes across the workloads

Content Type Image
Published: 9 months ago
Protect your organization with Microsoft 365 Defender

In this interactive guide you will learn how you can protect your organization from advanced attacks with Microsoft 365 Defender

Content Type Image
Published: 10 months ago
Audit the security of Windows Server IaaS Virtual Machines

You'll learn about Azure Security Center and how to onboard Windows Server computers to Security Center. You'll also learn about Azure Sentinel, security information and event management (SIEM), and security orchestration, automation and response (SOAR).

Content Type Image
Published: 10 months ago
Detect threats and protect information in cloud apps using Microsoft Cloud App Security

This learning path investigates Microsoft Cloud App Security, discovery, information protection and threat detection at an intermediate level.

Content Type Image
Published: 5 months ago
Protect and control information with Microsoft Cloud App Security

In this interactive guide, you'll learn how to protect and control information with Microsoft Cloud App Security. You'll see how to configure file policies to match on sensitive data types and protect from data leakage.

Content Type Image
Published: 5 months ago
Introduction to Azure DDoS Protection service

This module describes how to guard your Azure services from a denial of service attack using Azure DDoS Protection Standard.

Content Type Image
Introduction to Azure Private Link

This module describes how Azure Private Link enables private connectivity to Azure services, including its features, how it works, and its use cases.

Content Type Image
Published: 5 months ago
Manage information protection and governance

The amount of data being generated today is growing faster than ever, employees want to get work done everywhere, and the regulatory landscape is constantly changing. Microsoft's solutions for information protection and governance help organizations achieve the right balance between keeping their data protected and their people productive. This learning path can help you prepare for the Microsoft 365 Certified: Security Administrator Associate and Microsoft 365 Certified: Enterprise Administration Expert certifications.

Content Type Image
Published: 06/07/2020
Manage Insider risk in Microsoft 365

Insider threats and risks from illegal, inappropriate, unauthorized, or unethical behavior and actions are a major issue for all companies and can easily go undetected until it is too late. From IP theft to data leaks to many other scenarios, protecting the data within an organization from inadvertent or malicious actions is paramount for any organization. Microsoft's solutions for minimizing threats help organizations achieve the right balance between keeping their data protected and their people productive. This learning path can help you prepare for the Microsoft 365 Certified: Security Administrator Associate and Microsoft 365 Certified: Enterprise Administration Expert certifications.

Content Type Image
Published: 06/07/2020
Quickly find relevant data to respond to legal and regulatory obligations using Advanced eDiscovery and Advanced Audit

The explosion of data creates challenges of finding the data you need when you need it for a variety of scenarios. Whether it is litigation, internal investigation, responding to a regulatory request or policy obligation – you need to be able to find relevant content, then refine and prepare that content in an efficient and effective manner. Business data across custodial and shared workspaces, devices and apps creates a challenge of effectively responding to data requests. Microsoft 365 has designed the Investigate & Respond solution to help organizations to respond to requests with built-in suite-wide discovery & audit tools.

Content Type Image
Published: 7 months ago
Reduce risk with Microsoft Compliance Manager

Learn how Microsoft Compliance Manager measures your progress in completing actions that help reduce risks around data protection and regulatory standards.

Content Type Image
Published: 9 months ago

Check Out Updated Content

ASC feature support in government and sovereign clouds

ASC feature support by cloud

Content Type Image
Published: 3 days ago


ASC feature coverage for machines

Features of Azure Security Center that are available for Windows and Linux virtual machines and servers.

Content Type Image
Published: 3 days ago


Cloud-delivered IoT/OT threat intelligence — now available for Defender for IoT

Why threat intelligence tailored to industrial and critical infrastructure organizations is more effective for proactively mitigating IoT/OT vulnerabilities and threats — and how continuous, cloud-delivered updates simplify security for busy SecOps teams.

Content Type Image
Updated: 1 day ago