Check Out Featured Content
In this blog Pamela introduces FIDO2 and how it makes passwordless easy and secure.
Passwordless will help you meet NIST compliance. Sue explains authentication assurance levels and how it corresponds with passwordless options.
Alex explains why combining passwordless and biometrics, makes authentication more secure and easy to use.
Because time is money, passwordless will save you both.
This Ninja training covers the features and functions of Microsoft 365 Defender – everything that goes across the workloads
In this interactive guide you will learn how you can protect your organization from advanced attacks with Microsoft 365 Defender
You'll learn about Azure Security Center and how to onboard Windows Server computers to Security Center. You'll also learn about Azure Sentinel, security information and event management (SIEM), and security orchestration, automation and response (SOAR).
This learning path investigates Microsoft Cloud App Security, discovery, information protection and threat detection at an intermediate level.
In this interactive guide, you'll learn how to protect and control information with Microsoft Cloud App Security. You'll see how to configure file policies to match on sensitive data types and protect from data leakage.
This module describes how to guard your Azure services from a denial of service attack using Azure DDoS Protection Standard.
This module describes how Azure Private Link enables private connectivity to Azure services, including its features, how it works, and its use cases.
The amount of data being generated today is growing faster than ever, employees want to get work done everywhere, and the regulatory landscape is constantly changing. Microsoft's solutions for information protection and governance help organizations achieve the right balance between keeping their data protected and their people productive. This learning path can help you prepare for the Microsoft 365 Certified: Security Administrator Associate and Microsoft 365 Certified: Enterprise Administration Expert certifications.
Insider threats and risks from illegal, inappropriate, unauthorized, or unethical behavior and actions are a major issue for all companies and can easily go undetected until it is too late. From IP theft to data leaks to many other scenarios, protecting the data within an organization from inadvertent or malicious actions is paramount for any organization. Microsoft's solutions for minimizing threats help organizations achieve the right balance between keeping their data protected and their people productive. This learning path can help you prepare for the Microsoft 365 Certified: Security Administrator Associate and Microsoft 365 Certified: Enterprise Administration Expert certifications.
The explosion of data creates challenges of finding the data you need when you need it for a variety of scenarios. Whether it is litigation, internal investigation, responding to a regulatory request or policy obligation – you need to be able to find relevant content, then refine and prepare that content in an efficient and effective manner. Business data across custodial and shared workspaces, devices and apps creates a challenge of effectively responding to data requests. Microsoft 365 has designed the Investigate & Respond solution to help organizations to respond to requests with built-in suite-wide discovery & audit tools.
Learn how Microsoft Compliance Manager measures your progress in completing actions that help reduce risks around data protection and regulatory standards.
Check Out Updated Content
ASC feature support by cloud
Features of Azure Security Center that are available for Windows and Linux virtual machines and servers.
Why threat intelligence tailored to industrial and critical infrastructure organizations is more effective for proactively mitigating IoT/OT vulnerabilities and threats — and how continuous, cloud-delivered updates simplify security for busy SecOps teams.