Skip to content
Microsoft Secure

Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

This integration empowers Windows to natively understand Azure Information Protection sensitivity labels, to provide visibility into sensitive data on endpoints, to protect sensitive data based on its content, and to detect and respond to post-breach malicious activity that involves or affects sensitive data....

Read more

Image of a cloud with an arrow through it, beneath it the words "Step 1."

Step 1. Identify users: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We’ll provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we explain how to create a single common identity across on-premises and cloud with hybrid authentication....

Read more

Image taken at the Microsoft Ignite Conference.

How to help maintain security compliance

This is the last post in our eight-blog series on deploying Intelligent Security scenarios. In this post, we explain how Microsoft 365 security solutions enable you to manage security compliance processes....

Read more

Image taken at the Microsoft Ignite Conference.

How to share content easily and securely

This post is part of our blog series on deploying Intelligent Security scenarios. Learn how Microsoft 365 security solutions enable your users to securely share documents outside your organization and how to work on documents across devices more securely....

Read more

Ignite 2018 highlights: password-less sign-in, confidential computing, new threat protection, and more

What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. At this year’s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than 100 focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security....

Read more

Image taken at the Microsoft Ignite Conference.

Collaborate securely

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to collaborate securely....

Read more