Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions microsoft-365/enterprise/setup-guides-for-microsoft-365.md
Original file line number Diff line number Diff line change
Expand Up @@ -114,6 +114,7 @@ Advanced deployment guides in the admin center require authentication to a Micro
||[Exchange Online Protection setup guide](https://go.microsoft.com/fwlink/?linkid=2224191)|Microsoft Exchange Online Protection (EOP) is a cloud-based email filtering service for protection against spam and malware, with features to safeguard your organization from messaging policy violations.<br>Use the **Exchange Online Protection setup guide** to set up EOP by selecting which of the three deployment scenarios&mdash;on-premises mailboxes, hybrid (mix of on-premises and cloud) mailboxes, or all cloud mailboxes&mdash;fits your organization. The guide provides information and resources to set up and review your user's licensing, assign permissions in the Microsoft 365 admin center, and configure your organization's anti-malware and spam policies in the Security & Compliance Center.|
|[Microsoft Defender for Office 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2222971)|[Microsoft Defender for Office 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2224784)|The **Microsoft Defender for Office 365 setup guide** safeguards your organization against malicious threats that your environment might come across through email messages, links, and third party collaboration tools. This guide provides you with the resources and information to help you prepare and identify the Defender for Office 365 plan to fit your organization's needs.|
|[Microsoft Defender for Identity setup guide](https://go.microsoft.com/fwlink/?linkid=2222970)|[Microsoft Defender for Identity setup guide](https://go.microsoft.com/fwlink/?linkid=2224783)|The **Microsoft Defender for Identity setup guide** provides security solution set-up guidance to identify, detect, and investigate advanced threats that might compromise user identities. These include detecting suspicious user activities and malicious insider actions directed at your organization. You'll create a Defender for Identity instance, connect to your organization's Active Directory, and then set up sensors, alerts, notifications, and configure your unique portal preferences.|
|[Manage data exfiltration with Purview](https://go.microsoft.com/fwlink/?linkid=2326849)|[‎Manage data exfiltration with Purview](https://go.microsoft.com/fwlink/?linkid=2326756)|Microsoft Purview helps you classify, protect, and monitor sensitive data across hybrid environments. The **Manage data exfiltration with Purview guide** offers strategies to prevent accidental and intentional data loss using information protection, DLP policies, insider risk management, and activity monitoring. Use this guide to strengthen your data security posture and support compliance.|
|[‎Communication Compliance‎ setup guide](https://go.microsoft.com/fwlink/?linkid=2317927)|[Communication Compliance‎ setup guide](https://go.microsoft.com/fwlink/?linkid=2317072)|Communication Compliance is an insider risk solution that helps organizations detect, capture, and act on inappropriate messages that can lead to potential data security or compliance incidents within the organization. The **Communication Compliance setup guide** assists you in implementing this solution effectively, ensuring that your organization is protected against various insider risks. These risks can be challenging to identify and difficult to mitigate, occurring in areas such as intellectual property loss, workplace harassment, and more.|
|[‎Insider Risk Management‎ setup guide](https://go.microsoft.com/fwlink/?linkid=2317541)|[‎Insider Risk Management‎ setup guide](https://go.microsoft.com/fwlink/?linkid=2317540)|Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage, and security violations. Insider risk management enables customers to create policies to manage security and compliance. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy. The **Insider Risk Management setup guide** helps you protect your organization against insider risks that can be challenging to identify and difficult to mitigate.|
|[Microsoft Purview Information Protection setup guide](https://go.microsoft.com/fwlink/?linkid=2222967)|[Microsoft Purview Information Protection setup guide](https://go.microsoft.com/fwlink/?linkid=2224687)|Get an overview of the capabilities you can apply to your information protection strategy so you can be confident your sensitive information is protected. Use a four-stage lifecycle approach in which you discover, classify, protect, and monitor sensitive information. The **Microsoft Purview Information Protection setup guide** provides guidance for completing each of these stages.|
Expand Down