Skip to content
Microsoft Secure
Image of a cloud with an arrow through it, beneath it the words "Step 1."

Step 1. Identify users: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We’ll provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we explain how to create a single common identity across on-premises and cloud with hybrid authentication....

Read more

Image taken at the Microsoft Ignite Conference.

How to help maintain security compliance

This is the last post in our eight-blog series on deploying Intelligent Security scenarios. In this post, we explain how Microsoft 365 security solutions enable you to manage security compliance processes....

Read more

Image taken at the Microsoft Ignite Conference.

How to share content easily and securely

This post is part of our blog series on deploying Intelligent Security scenarios. Learn how Microsoft 365 security solutions enable your users to securely share documents outside your organization and how to work on documents across devices more securely....

Read more

Ignite 2018 highlights: password-less sign-in, confidential computing, new threat protection, and more

What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. At this year’s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than 100 focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security....

Read more

Image taken at the Microsoft Ignite Conference.

Collaborate securely

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to collaborate securely....

Read more

How Microsoft 365 Security integrates with your broader IT ecosystem—part 2

In part 1 of our blog series, we shared the Microsoft 365 Security strategy for integrating with the broader security community. Today, we cover the services Microsoft 365 Security offers customers to protect assets beyond the Microsoft ecosystem....

Read more

Building Zero Trust networks with Microsoft 365

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, today’s increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own Device (BYOD) model make perimeter security controls irrelevant. Networks that fail to evolve from traditional...

Read more

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

The Microsoft Cybersecurity Reference Architecture describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it. How to use it We have seen this document used for...

Read more