Skip to content

Commit 543df78

Browse files
authored
Merge pull request #28494 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/microsoft-365-docs (branch public)
2 parents 50e6983 + 44c1c30 commit 543df78

1 file changed

Lines changed: 1 addition & 0 deletions

File tree

microsoft-365/enterprise/setup-guides-for-microsoft-365.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,7 @@ Advanced deployment guides in the admin center require authentication to a Micro
106106
|[Secure by default with Purview](https://go.microsoft.com/fwlink/?linkid=2310737)|[Secure by default with Purview](https://go.microsoft.com/fwlink/?linkid=2310839)|Microsoft Purview's "secure by default" deployment model enhances data protection through encryption and configured sensitivity labels. This approach simplifies compliance and strengthens security across your organization's data estate with label publishing defaults, auto-labeling, and contextual defaults in SharePoint to achieve high labeling volumes with minimal user interaction.|
107107
|[Security analyzer](https://go.microsoft.com/fwlink/?linkid=2223325)|[Security analyzer](https://go.microsoft.com/fwlink/?linkid=2224900)|The **Security analyzer** will analyze your security approach and introduce you to Microsoft integrated security and compliance solutions that can improve your security posture. You'll learn about advanced features, such as managing identities and helping to protect against modern attacks. You can then sign up for a trial subscription and be pointed to the corresponding setup guidance for each solution.|
108108
|[Set up your Microsoft Zero Trust security model](https://go.microsoft.com/fwlink/?linkid=2222968)|[Set up your Microsoft Zero Trust security model](https://go.microsoft.com/fwlink/?linkid=2224820)|Use the **Set up your Zero Trust security model guide** to configure security that effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and helps protect people, devices, apps, and data wherever they're located. Key recommendations include: always authenticate, limit user access, minimize the blast radius, segment access, verify end-to-end encryption, and use analytics to get visibility, drive threat detection, and improve defenses.|
109+
|[Unify your security operations](https://go.microsoft.com/fwlink/?linkid=2320601)|[Unify your security operations](https://go.microsoft.com/fwlink/?linkid=2320519)|Microsoft is bringing Microsoft Sentinel, our SIEM solution, and Microsoft Defender XDR, our extended detection and response (XDR) solution, into a unified security operations platform for fully integrated features, automation, guided experiences, and curated threat intelligence. In our latest advanced deployment guide, **Unify your security operations**, you'll find comprehensive information and step-by-step instructions on configuring all the products necessary for a unified SecOps platform, including Microsoft Defender XDR and Microsoft Sentinel.|
109110
|[Deploy and set up Microsoft Intune and Intune Suite](https://go.microsoft.com/fwlink/?linkid=2223058)|[Deploy and set up Microsoft Intune and Intune Suite](https://go.microsoft.com/fwlink/?linkid=2224812)|Deploy and set up Microsoft Intune and Intune Suite to manage devices in your organization. For full control of corporate devices, use Intune's mobile device management (MDM) features. To manage your organization's data on shared and personal devices, use Intune's mobile application management (MAM) features. Deploy advanced security and management features, included in Microsoft Intune Suite. With the **Deploy and set up Microsoft Intune and Intune Suite guide**, set up device and app compliance policies, assign app protection policies, deploy Intune Suite features, and monitor the device and app protection status.|
110111
|[Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2223155)|[Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2224785)|The **Microsoft Defender for Endpoint setup guide** provides instructions that will help your enterprise network prevent, detect, investigate, and respond to advanced threats. Make an informed assessment of your organization's vulnerability and decide which deployment package and configuration methods are best.<br>**NOTE:** A Microsoft Volume License is required for Microsoft Defender for Endpoint.|
111112
||[Exchange Online Protection setup guide](https://go.microsoft.com/fwlink/?linkid=2224191)|Microsoft Exchange Online Protection (EOP) is a cloud-based email filtering service for protection against spam and malware, with features to safeguard your organization from messaging policy violations.<br>Use the **Exchange Online Protection setup guide** to set up EOP by selecting which of the three deployment scenarios&mdash;on-premises mailboxes, hybrid (mix of on-premises and cloud) mailboxes, or all cloud mailboxes&mdash;fits your organization. The guide provides information and resources to set up and review your user's licensing, assign permissions in the Microsoft 365 admin center, and configure your organization's anti-malware and spam policies in the Security & Compliance Center.|

0 commit comments

Comments
 (0)