Microsoft 365 Security and Compliance: Training and Resources

Slides:



Advertisements
Similar presentations
Mobile Device Management Intune-Configmanager CHANDAN BHARTI PREMIER FIELD ENGINEER-MICROSOFT.
Advertisements

Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
View the Microsoft external site for more information: www. Microsoft
Windows 10 in einem Bio Reservoire
The time to address enterprise mobility is now
Deployment Planning Services
Windows 10 Enterprise Subscriptions in CSP
Protect your organization against external threats (Security)
Cloud App Security vs. O365 Advanced Security Management
Deployment Planning Services
Microsoft Ignite /27/2018 9:00 AM THR2016
Proactive Attack Prevention and Detection
Enterprise-level Identity Protection
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
Identity & Access Management for a cloud-first, mobile-first world
Control and Protect Information
Deployment Planning Services
Accelerate GDPR compliance with Microsoft 365
Journey to Microsoft Secure Cloud
Microsoft /4/ :15 PM THR2219 How Microsoft IT enables modern mobility with Windows 10 security and productivity features Rekha Nair IT Program.
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
SaaS Application Deep Dive
6/22/ :39 PM BRK3137 Secure Office 365 like a cybersecurity pro: Top priorities for the first 30 days, 90 days and beyond Mark Simos, Matt Kemelhar.
The power of common identity across any cloud
Examine common architectures for hybrid identity
Protect sensitive information with Office 365 DLP
Cybersecurity Reference Architecture
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
9/5/2018 8:22 PM The Microsoft information protection strategy across EMS, Office 365, and Windows © 2014 Microsoft Corporation. All rights reserved.
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Using AAD B2C for WordPress & Secure Deployment Scenario
Solutioning and Review
Understand Business Opportunities and Gain Product Knowledge
Microsoft Virtual Academy
Protect your organization against external threats (Security)
11/11/2018 Azure Active Directory Privileged Identity Management Deployment Training - Module 5   November 2016 Ed Wu, Senior Program Manager Mark Wahl,
Microsoft Virtual Academy
Modern Windows 10 device 12/2/2018 E3 E3 P E3 P P P P E3 E3 P P P P P
Microsoft Virtual Academy
Everything Windows User Group Meeting, Aug 2016
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Five mistakes to avoid when deploying Enterprise Mobility + Security
Microsoft Virtual Academy
What’s new in the Fall Creators Update for Windows Defender ATP
Create a Modern Workplace with Microsoft 365
Windows 10 Enterprise Subscriptions in CSP
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/3/2019 3:20 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Microsoft Data Insights Summit
Microsoft 365 E5 February 2019 Update Licensing Overview
Protect your organization against external threats (Security)
Microsoft 365 Business Technical Fundamentals Series
Strengthening the GDPR business opportunity with Microsoft 365
Azure AD Simon May Technical Evangelist.
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Presentation transcript:

Microsoft 365 Security and Compliance: Training and Resources Partner Ready You may use these materials to conduct customer training or security architecture discussion. We updated this document as of September 14, 2017. Please do not share this document with customers directly. Thanks! Practice Building Blocks – Security and Compliance Hero Technologies Business Development presentation Technical Presentation TechNet or technical articles Demos/ Videos Enterprise Level Identity Protection Help customers improve their identity and access controls to prevent and contain breaches Azure Active Directory Premium Azure Active Directory - Identity and Access Management What is Azure Active Directory Azure Active Directory Connect your on-premises directories to Azure AD Cloud App Security Microsoft Cloud App Security Microsoft Partner University - Security Deploy Cloud App Security Learn how to deploy and manage Cloud App Security Office 365 Advanced Security Management Advanced Security Management Gain enhanced visibility and control with Office 365 ASM Dig into Advanced Security Management in Office 365 Windows Hello Win 10 security Implementing Windows Hello for Business Deploy and manage Windows Hello for Business Conditional Access Microsoft Intune Intune Conditional Access EMS Conditional Access Secure Access with Azure AD and Intune Multifactor Authentication Plan for MFA for Office 365 MFA Documentation Azure MFA Videos Single sign-on  What is SSO in Azure Providing SaaS SSO with Azure AD “Technical presentations” are good for in-depth conversation with customers about specific security and compliance technology or products. You may do additional research on “TechNet articles” when customers have questions on how to implement Microsoft technology. We also have demo and video resources for use with customers.

Microsoft 365 Security and Compliance: Training and Resources Microsoft 365 Security and Compliance: Training and Resources Partner Ready Practice Building Blocks – Security and Compliance Hero Technologies Business Development presentation Technical Presentation TechNet or technical articles Demos/ Videos Control and Protect Information Assess and classify customer data. Implement and manage information policies and procedures. Windows Information Protection WIP Overview Win 10 security Protect Ent Data using WIP Work and personal data separate with WIP Azure Information Protection Microsoft Partner University - Security AIP documentation Collab. securely using WIP Office 365 Advanced Compliance Office 365 Compliance (All up deck) Advanced eDiscovery Customer Lockbox Microsoft Partner University - Compliance Office 365 security and compliance Compliance certifications for Office 365 Office 365 compliance solutions Office 365 security white paper Office 365 Advanced Data Governance Introducing Office 365 auditing and investigation with eDiscovery Office 365 DLP DLP in Exchange 2016 Microsoft Intune Intune documentation Pilot Intune

Microsoft 365 Security and Compliance: Training and Resources Partner Ready Practice Building Blocks – Security and Compliance Hero Technologies Business Development presentation Technical Presentation TechNet or technical articles Demos/ Videos Proactive Attack Prevention, Detection, and Response Enable customers to remain aware of the current threat landscape and identify attacks – before they cause damage Windows Defender ATP Microsoft Partner University - Security Windows ATP documentation Detect and respond with Windows Defender ATP Office 365 ATP Office 365 ATP & EOP ATP Description ATP Click through guide ATP webcast ATP Deep Dive Session Office 365 Threat Intelligence Office 365 Thread Intelligence BDM Thread Intelligence Overview Threat Intelligence click through guide Threat Intelligence Deep Dive Advanced Threat Analytics Microsoft ATA ATA documentation Plan and Deploy ATA BitLocker BitLocker overview BitLocker Overview Deploy and Manage BitLocker Office 365 Secure Score Secure Score API Secure Score Click through guide Secure Score Deep Dive Credential Guard Win 10 security Credential Guard Documentation Device & credential guard demystified IT Showcase Deep Dive into Credential Guard Device Guard Device Guard Deployment Device guard Intro

Microsoft 365 Security and Compliance: Training and Resources Partner Ready Practice Building Blocks – Security and Compliance Hero Technologies Business Development presentation Technical Presentation TechNet or technical articles Demos/ Videos Regulatory Compliance Help organizations simplify their journey to comply with laws and regulations. Office 365 Advanced Compliance Office 365 Compliance (All up deck) Advanced eDiscovery Customer Lockbox Microsoft Partner University - Compliance Office 365 security and compliance Compliance certifications for Office 365 Office 365 compliance solutions Office 365 security white paper Office 365 Advanced Data Governance Introducing Office 365 auditing and investigation with eDiscovery Azure Information Protection Microsoft Partner University - Security AIP documentation Collab. securely using WIP Windows Server 2016 Security Windows Server 2016 L100 Presentation Better Security starts at the OS with Windows Server 2016 Security TechCentral Datacenter and Private Cloud Security Blog Credential Guard and Remote Guard Device Guard Just Enough and Just in Time Administration Shielded Virtual Machines