Check Out Featured Content
3 important resources to help your organization get to passwordless
In this tutorial, learn how to migrate your applications from Okta to Azure Active Directory (Azure AD)
Integrate your software with Microsoft's Zero Trust solutions to improve your security.
Learn how to easily integrate with your partners using entitlement management. With features like custom questions and built-in attributes, you can achieve levels of governance for partners, your organization desire.
In this interactive guide you will learn how to investigate and remediate incidents with Microsoft Defender for Endpoint
Dive into these Microsoft 365 Defender level 400 training resources to help you become an Microsoft 365 Defender ninja
This learning path provides an introduction to Microsoft 365 Defender, Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365
Azure Sentinel has so many new features coming out all the time, it can be hard to keep up!
"Azure Defender for servers includes an integrated license for Microsoft Defender for Endpoint. Together, they provide comprehensive endpoint detection and response (EDR) capabilities. When Defender for Endpoint detects a threat, it triggers an alert. The alert is shown in Security Center. From Security Center, you can also pivot to the Defender for Endpoint console, and perform a detailed investigation to uncover the scope of the attack."
"We've now added a workbook dedicated to tracking a subscription's compliance with the regulatory or industry standards applied to it. Learn about using these reports or building your own in Create rich, interactive reports of Security Center data."
In this interactive guide you'll see how Azure network security solution an help you manage network traffic, prevent attacks, directed at your resources, and get more secure connectivity to you virtual machines.
The cloud native Azure Firewall provides protection against network-based threats. Azure Sentinel is the cloud native SIEM and SOAR solution which provides threat detection, hunting, and automated response capabilities for Azure Firewall.
Interactive Guide: Insider Risk Management Exercise 1 – Analytics Objective In this exercise, you will see how to use the scan function to quickly get an understanding of the insider risks an organization is exposed to, show suggested policies, and, see how to customize built-in policies as part of setup and deployment.
In this interactive guide, you'll learn how to protect your organization’s sensitive data with Microsoft Information Protection.
Microsoft 365 can help you retain or delete sensitive information as needed.
In this exercise, you will use the Microsoft 365 Compliance admin center to edit an existing DLP policy, adding Microsoft Teams as a location to which the policy will apply.
In this guide, you will learn how to enable configuration management of workloads from the Microsoft Intune cloud console. Then you can direct your Windows 10 endpoints managed by Configuration Manager to start listening to Intune for certain workloads.
In this guide, you will learn how tenant attach connects you existing on-premises Microsoft Endpoint Configuration Manager infrastructure with your Microsoft Intune cloud tenant.
In this guide, you will learn how to configure Security Baselines in Windows 10.
This guide shows you how to set up an Application Protection policy (APP) with Microsoft Intune for an Android device.
Check Out Updated Content
This whitepaper frames the challenges of effective threat intelligence and focuses on answering these questions. 1. Where are the weaknesses in my attack surface? 2. Where should I focus my resources to keep pace with digital growth? 3. Which threats are relevant to my organization? 4. Where is an active attack coming from? 5. How can my security programs be more resilient?
Attacker tools have flooded the web, and advanced adversaries target massive vulnerabilities in ubiquitous systems used across the world. With the entire Internet now the security perimeter, defending the extended enterprise is a global-scale challenge. Meeting this challenge has redefined the role of threat intelligence in cybersecurity. This intelligence must be actionable and give teams a view of the global attack surface, showing precisely how their organization’s unique Internet relationships fit inside it. This ebook will help you get to know the basics of this new breed of intelligence.
This data sheet gives an overview of RiskIQ Illuminate Internet Intelligence, which offers relevant, actionable security intelligence for elite security teams. The data sheet also lists key capabilities and benefits.