Understanding Office365 Security Capabilities

So you want to learn more about the security capabilities and the Secure Productive Enterprise offering in Office 365? You’ve come to the right place! Below is a list of resources that will provide you with a good foundational knowledge of the various advanced security workloads in Office365. Stay tuned as I will update this list periodically.

Start Here -> Office365 Trust Center

Offerings:

Office 365 Secure Productive Enterprise

Getting Started:

Address your CXO’s top five cloud security concerns

Take control of your security and compliance with Office 365

Learn how Office 365 security and compliance leverages intelligence in a cloud first world

Secure Office 365 like a cybersecurity pro—assessing risk and implementing controls

Own your data with next generation access control technology in Office 365

General Data Protection Regulation (GDPR)

How Does Microsoft IT Secure Office 365?

Keep calm and automate: How we secure the Office 365 service

Office 365 Secure Score:

Introducing the Office 365 Secure Score

Learn about Office 365 Secure Score: actionable security analytics

Advanced Threat Analytics:

Learn how Microsoft Advanced Threat Analytics combats persistent threats

Plan and deploy Microsoft Advanced Threat Analytics the right way

Advanced Security Management:

Overview of Advanced Security Management in Office 365

Get started with Advanced Security Management

Gain visibility and control with Office 365 Advanced Security Management

Advanced Threat Protection:

Introducing Office 365 Advanced Threat Protection

Advanced threat protection for safe attachments and safe links

Learn about advancements in Office 365 Advanced Threat Protection

Data Loss Prevention:

Protect your sensitive information with Office 365 Data Loss Prevention

Customize and tune Microsoft Office 365 Data Loss Prevention

Customer Lockbox:

Announcing Customer Lockbox for Office 365

Office 365 Customer Lockbox Requests

Developer:

Building security and compliance solutions with the O365 Activity API – a Microsoft IT case study

Identity:

Deliver management and security at scale to Office 365 with Azure Active Directory

Secure your Active Directory to mitigate risk in the cloud

Exchange:

Implement Microsoft Exchange Online Protection

Get an edge over attackers – what you need to know about email threats

Understand how Microsoft protects you against Spoof, Phish, Malware, and Spam emails

Learn about advancements in Office 365 Advanced Threat Protection

Advanced eDiscovery:

Office 365 Advanced eDiscovery

Video: Office 365 Advanced eDiscovery

Reduce costs and challenges with Office 365 eDiscovery and Analytics

Azure Information Protection:

What is Azure Rights Management?

Information Protection and Control (IPC) in Office 365 with Microsoft Rights Management service (RMS) whitepaper

Collaborate confidently using Rights Management

Adopt a comprehensive identity-driven solution for protecting and sharing data securely

Mobile Devices:

Secure access to Office 365, SaaS, and on-premises apps and files with Azure AD and Intune

Deliver a BYOD program that employees and security teams will love with Microsoft Intune

Manage BYOD and corporate-owned devices with MDM solutions

Secure Android devices and apps with Microsoft Intune

Encryption:

Introducing Office 365 Message Encryption: Send encrypted emails to anyone!

Encryption in Office 365

Challenge cloud encryption myths and learn about Office 365 BYOK plans

Windows Defender Advanced Threat Protection:

Detect and respond to advanced and targeted attacks with Windows Defender ATP

Advanced Data Governance:

Take control of your data with intelligent data governance in Office 365

Applying intelligence to security and compliance in Office 365

Threat Intelligence:

Applying intelligence to security and compliance in Office 365

Resource I will post soon: Enterprise Mobility Suite, AppLocker, Credential Guard, Device Guard, Windows Hello, Windows Information Protection, Cloud App Protection, Azure Active Directory Premium.

 See: https://blogs.technet.microsoft.com/skypehybridguy/2017/02/08/understanding-office365-security-capabilities/

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s