Step 10. Detect and investigate security incidents: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 04 Jun 2019 16:00:35 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 10. Detect and investigate security incidents,” you’ll learn how to set up Azure Advanced Threat Protection to uncover threats against your organization.

The post Step 10. Detect and investigate security incidents: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Step 9. Protect your OS: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 21 May 2019 16:00:43 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 9. Protect your OS,” you’ll learn how to configure Microsoft Defender Advanced Threat Protection to prevent, detect, investigate, and respond to advanced threats.

The post Step 9. Protect your OS: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Step 8. Protect your documents and email: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 09 Apr 2019 16:00:24 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and use Office 365 Advanced Threat Protection (ATP) and Exchange Online Protection to help secure your documents and emails.

The post Step 8. Protect your documents and email: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Step 7. Discover shadow IT and take control of your cloud apps: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 26 Mar 2019 16:00:08 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 7. Discover shadow IT and take control of cloud apps,” you’ll learn how to set up Microsoft Cloud App Security (MCAS) to identify, access, and manage the cloud applications used by your organization.

The post Step 7. Discover shadow IT and take control of your cloud apps: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more