Skip to content
Microsoft Secure
Image that reads "Step 5."

Step 5. Set up mobile device management: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 5. Set up mobile device management,” you’ll learn how to plan your Microsoft Intune deployment and set up Mobile Device Management (MDM) as part of your Unified Endpoint Management (UEM)...

Read more

Step 4. Set conditional access policies: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 4. Set conditional access policies,” you’ll learn how to control access to your apps and corporate resources using conditional access policies, and how these policies can block legacy authentication methods...

Read more

Step 3. Protect your identities: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In today’s installment, “Step 3. Protect your identities,” you’ll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts....

Read more

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we explain how to enable single sign-on (SSO) in Azure Active Directory (Azure AD) to...

Read more

Image of a cloud with an arrow through it, beneath it the words "Step 1."

Step 1. Identify users: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We’ll provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we explain how to create a single common identity across on-premises and cloud with hybrid authentication....

Read more

Image taken at the Microsoft Ignite Conference.

How to help maintain security compliance

This is the last post in our eight-blog series on deploying Intelligent Security scenarios. In this post, we explain how Microsoft 365 security solutions enable you to manage security compliance processes....

Read more

Image taken at the Microsoft Ignite Conference.

How to share content easily and securely

This post is part of our blog series on deploying Intelligent Security scenarios. Learn how Microsoft 365 security solutions enable your users to securely share documents outside your organization and how to work on documents across devices more securely....

Read more

Image taken at the Microsoft Ignite Conference.

Secure file storage

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to securely store and...

Read more

Image taken at the Microsoft Ignite Conference.

Collaborate securely

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to collaborate securely....

Read more

Image taken at the Microsoft Ignite Conference.

Protecting user identities

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions help you protect your users and their...

Read more