Previous Arrow Next Arrow

I'm looking for...

Solution Area

Select

Cloud Security

Compliance

Identity

Management

Threat Protection

Product

Select

Advanced Audit

Azure Active Directory

Azure AD Domain Services

Azure AD External Identities

Azure DDoS Protection Standard

Azure Firewall

Azure Firewall Manager

Azure Front Door

Azure Key Vault

Azure Private Link

Azure Purview

Azure Virtual WAN

Azure Web Application Firewall

Bastion

Communication Compliance

Compliance Ecosystem

Compliance Manager

Customer Lockbox

Data Loss Prevention

Data Subject Requests

eDiscovery

Encryption

Endpoint Data Loss Prevention

Information Barriers

Information Governance

Information Protection

Insider Risk Management

Microsoft 365 Defender

Microsoft 365 Security Center

Microsoft Defender

Microsoft Defender for Cloud

Microsoft Defender for Cloud Apps

Microsoft Defender for Endpoint

Microsoft Defender for Identity

Microsoft Defender for IoT

Microsoft Defender for Office 365

Microsoft Endpoint Manager

Microsoft Sentinel

Network Watcher

Privileged Access Management

Records Management

RiskIQ

Secure Score

Teams Data Loss Prevention

Topic

Select

Applications and Services

Compliance Management

Discover and Respond

Email Security

Endpoint Security

Governance and Strategy

Identity and Access Management

Identity Security

Information Protection and Governance

Insider Risk Management

Network Security

Privileged Access

Security Operations

SIEM

Storage, Data, and Encryption

XDR

Zero Trust

Role

Select

Administrator

Application Security and DevSecOps

Business Owner

Business User

Cloud Solution Architects

Data Security and Information Protection Analyst

Developer

DevOps Engineer

Endpoint Security

Identity and Access Admin

Incident Preparation

Infrastructure Security

People Security

Policy and Standards

Posture Management

Risk Practitioner

Security Architecture

Security Compliance Management

Security Engineer

Security Leadership

Security Operations

Solution Architect

Student

Technology Manager

Threat Intelligence

Tab Section Image

Check Out Featured Content

Spinner
3 key resources to accelerate your passwordless journey

3 important resources to help your organization get to passwordless

Content Type Image
Published: 58 days ago
Tutorial: Migrate your applications from Okta to Azure Active Directory

In this tutorial, learn how to migrate your applications from Okta to Azure Active Directory (Azure AD)

Content Type Image
Published: 2 months ago
Integrate with Microsoft's Zero Trust solutions

Integrate your software with Microsoft's Zero Trust solutions to improve your security.

Content Type Image
Published: 2 months ago
Onboard partners more easily with new Azure AD entitlement management features

Learn how to easily integrate with your partners using entitlement management. With features like custom questions and built-in attributes, you can achieve levels of governance for partners, your organization desire.

Content Type Image
Published: 2 months ago
Spinner
Investigate and remediate incidents with Microsoft Defender for Endpoint

In this interactive guide you will learn how to investigate and remediate incidents with Microsoft Defender for Endpoint

Content Type Image
Published: 58 days ago
Microsoft 365 Defender Ninja L400 Course

Dive into these Microsoft 365 Defender level 400 training resources to help you become an Microsoft 365 Defender ninja

Content Type Image
Published: 10/19/2020
Defend against threats with Microsoft 365

This learning path provides an introduction to Microsoft 365 Defender, Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365

Content Type Image
Published: 2 months ago
What's new in the last 6 months

Azure Sentinel has so many new features coming out all the time, it can be hard to keep up!

Content Type Image
Published: 43 days ago
Spinner
Microsoft Defender for Endpoint for Linux now supported by Azure Defender for servers (in preview)

"Azure Defender for servers includes an integrated license for Microsoft Defender for Endpoint. Together, they provide comprehensive endpoint detection and response (EDR) capabilities. When Defender for Endpoint detects a threat, it triggers an alert. The alert is shown in Security Center. From Security Center, you can also pivot to the Defender for Endpoint console, and perform a detailed investigation to uncover the scope of the attack."

Content Type Image
Published: 3 months ago
New 'Compliance Over Time' workbook

"We've now added a workbook dedicated to tracking a subscription's compliance with the regulatory or industry standards applied to it. Learn about using these reports or building your own in Create rich, interactive reports of Security Center data."

Content Type Image
Published: 4 months ago
Interactive Guide: Protect your cloud infrastructure with Azure network security

In this interactive guide you'll see how Azure network security solution an help you manage network traffic, prevent attacks, directed at your resources, and get more secure connectivity to you virtual machines.

Content Type Image
Published: 2 months ago
New Detections, Hunting Queries and Response Automation in Azure Firewall

The cloud native Azure Firewall provides protection against network-based threats. Azure Sentinel is the cloud native SIEM and SOAR solution which provides threat detection, hunting, and automated response capabilities for Azure Firewall.

Content Type Image
Published: 3 months ago
Spinner
Interactive Guide: Insider Risk Management

Interactive Guide: Insider Risk Management Exercise 1 – Analytics Objective In this exercise, you will see how to use the scan function to quickly get an understanding of the insider risks an organization is exposed to, show suggested policies, and, see how to customize built-in policies as part of setup and deployment.

Content Type Image
Published: 3 months ago
Protect sensitive data with Microsoft Information Protection

In this interactive guide, you'll learn how to protect your organization’s sensitive data with Microsoft Information Protection.

Content Type Image
Published: 3 months ago
Manage content with information governance and records management in Microsoft 365

Microsoft 365 can help you retain or delete sensitive information as needed.

Content Type Image
Published: 3 months ago
Data Loss Prevention Policies for Microsoft Teams

In this exercise, you will use the Microsoft 365 Compliance admin center to edit an existing DLP policy, adding Microsoft Teams as a location to which the policy will apply.

Content Type Image
Published: 3 months ago
Spinner
Enable Config Manager and Intune Co-management

In this guide, you will learn how to enable configuration management of workloads from the Microsoft Intune cloud console. Then you can direct your Windows 10 endpoints managed by Configuration Manager to start listening to Intune for certain workloads.

Content Type Image
Published: 3 months ago
Enable Tenant Attach

In this guide, you will learn how tenant attach connects you existing on-premises Microsoft Endpoint Configuration Manager infrastructure with your Microsoft Intune cloud tenant.

Content Type Image
Published: 2 months ago
Configure Security Baselines for Windows 10

In this guide, you will learn how to configure Security Baselines in Windows 10.

Content Type Image
Published: 2 months ago
Secure Teams on Android with App Protection Policy

This guide shows you how to set up an Application Protection policy (APP) with Microsoft Intune for an Android device.

Content Type Image
Published: 2 months ago

Check Out Updated Content

Video Image
Azure Security Basics
Content Type Image
Published: 4 days ago

New

Video Image
APIs Streaming API
Content Type Image
Updated: 4 days ago

Updated