0% found this document useful (0 votes)
52 views

Microsoft Security Solution Orientation Guide

Security Solution guide

Uploaded by

kumak8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Microsoft Security Solution Orientation Guide

Security Solution guide

Uploaded by

kumak8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Microsoft Security

solution orientation guide


Microsoft 365 E5

Get the most value from your subscription


With Microsoft 365 E5, you gain access to advanced products and features for stopping threats,
protecting data and identities, and ensuring compliance and privacy.

Microsoft Purview Microsoft Priva

Safeguard data with comprehensive Protect personal data, automate risk


solutions for information protection, mitigation, and manage subject rights
data governance, risk management, requests at scale.
and compliance.

Microsoft 365 Defender Microsoft Entra Microsoft Intune

Elevate your defenses with Enable smarter, real-time Get unified endpoint
unified visibility, investigation, access decisions for all management for powerful
and response across the identities across hybrid, data and device protection.
kill chain. multicloud, and beyond.

Orient yourself to the advanced security, compliance,


and identity capabilities you now own and take the first
steps toward putting them into action.

© 2023 Microsoft Corporation. All rights reserved. 1


Classified as Microsoft Confidential
Threat protection &
cloud security
Get unified visibility, investigation, and response
across the kill chain with an industry-leading
extended detection and response (XDR) solution

Microsoft 365 Defender


Defender for Office 365 helps secure your email Defender for Endpoint safeguards your
and Microsoft Teams with advanced protection organization against malicious threats posed by
against phishing, ransomware, and other threats. email, links (URLs), and collaboration tools.

• Native email security and XDR • Integrated workflows


• Unified detection and response to attacks • Security for Android and iOS mobile devices
• Industry-leading AI-enabled detection • Behavioral analytics and machine learning
capabilities

Defender for Identity detects and investigates Defender for Cloud Apps secures your apps,
advanced threats, compromised identities, and protects your data, and elevates your app posture
malicious insider actions. with software as a service (SaaS) security.

• Identity posture assessments including analysis • Shadow IT discovery and control


for identities most at risk • Protection for sensitive information in all apps
• Attack detection spanning the full lifecycle • Manages your SaaS app security posture and
• Immediate response to compromised identities provides insights on Microsoft 365 app behaviors

Get started

Explore Microsoft Learn for free skilling and Learn more about the compliance and privacy
instruction you can use at your own pace. solutions available as part of your Microsoft 365
E5 subscription.
Microsoft Defender
Learning paths and documentation Defender for Office 365 Defender for Identity
Defender for Endpoint Defender for Cloud Apps

© 2023 Microsoft Corporation. All rights reserved. 2


Classified as Microsoft Confidential
Compliance & privacy
Keep data safe with unified governance,
information protection, risk management,
and compliance. Automate risk mitigation
and manage subject rights requests at scale.

Microsoft Purview
Purview Insider Risk Management helps you Purview Information Protection shows you which
intelligently identify, investigate, and take quick data is sensitive and business critical and helps you
action on insider risks. manage and protect it across your environment.
• Built-in privacy • Built-in capabilities and extensible platform
• Rich insights with customizable machine • Intelligent classifiers
learning • Unified admin code
• Collaboration on investigations
Purview Data Lifecycle Management gives you Purview Data Loss Prevention provides intelligent
tools and capabilities to retain the content you detection and control of sensitive information.
need and delete the content that you don’t.
• Built-in information governance • Native protection
• Intelligent capabilities • Seamless deployment
• Defensible policies • Integrated capabilities

Microsoft Priva
Priva Privacy Risk Management identifies privacy Priva Subject Rights Requests manages subject
risks, automates risk mitigation, and helps rights requests in an automated, secure, and
employees make smart data-handling decisions. auditable way.
• Identify critical privacy risks and conflicts • Automate data discovery and conflict detection
• Automate risk mitigation and prevent incidents • Collaborate, review, and react securely and
• Foster proactive privacy with greater awareness efficiently
of and accountability for privacy incidents • Integrate with your privacy ecosystem
and risks

Get started

Explore Microsoft Learn for free skilling and Learn more about the compliance and privacy
instruction you can use at your own pace. solutions in your Microsoft 365 E5 subscription.

Microsoft Purview Purview Insider Risk Purview Information


Training modules and documentation Management Protection
Purview Data Lifecycle Purview Data Loss
Microsoft Priva Management Prevention
Learning paths and documentation Priva Privacy Risk Priva Subject Rights
Management Requests
© 2023 Microsoft Corporation. All rights reserved. 3
Classified as Microsoft Confidential
Identity & management
Secure your environment with multicloud
identity and access management. Enjoy easier
endpoint management and powerful data and
device protection.

Azure Active Directory, part of Microsoft Entra

Azure Active Directory provides single sign-on, multifactor authentication, and conditional access to
guard against 99.9 percent of cybersecurity attacks.

• Strong authentication and risk-based adaptive access policies


• Quick and easy user sign-in experience
• Automated identity governance and unified identity management across cloud and on-premises apps

Microsoft Intune

Microsoft Intune helps you do more with less by consolidating your endpoint and security management
tools and optimizing performance across devices. Mitigate threats to devices, protect corporate data, and
improve compliance with advanced security features.

• Cross-platform endpoint management and built-in endpoint security


• Mobile application management and Microsoft Configuration Manager to
manage on-premises endpoints
• Endpoint analytics

Get started

Explore Microsoft Learn for free skilling and Learn more about the identity and management
instruction you can use at your own pace. solutions available as part of your Microsoft 365 E5
subscription.
Azure Active Directory
Learning paths and documentation Azure Active Directory, part of Microsoft Entra

Microsoft Intune Microsoft Intune


Learning paths and documentation

© 2023 Microsoft Corporation. All rights reserved. 4


Classified as Microsoft Confidential
Looking for more?
Additional support and solutions

Work with Microsoft FastTrack Add Microsoft Sentinel for


FastTrack provides remote expert guidance to integrated threat protection
help you to deploy your Microsoft 365 with SIEM and XDR
security capabilities.
Visit FastTrack for Microsoft 365 Security Empower your defenders to effectively secure
your digital estate by combining security
information and event management (SIEM)
Get support from a certified and XDR.
Microsoft partner Learn about Microsoft Sentinel
Our partners play a vital role in protecting
Microsoft customers and have expertise
across many disciplines.
Find a security partner

© 2023 Microsoft Corporation. All rights reserved. 5


Classified as Microsoft Confidential

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy