Administration
Showing 1189–1200 of 1447 results
Prepare on-premises workloads for migration to Azure
Choose an agentless Hyper-V migration approach. Create an Azure Migrate project, enable Microsoft Entra permissions, prepare the on-premises environment, and deploy the Azure Migrate appliance. Your on-premises workloads are now ready for the actual migration.
Prepare to deploy updates for Windows client and Microsoft 365 apps
Learn how to prepare your organization for the latest updates to Windows clients and Microsoft 365 apps.
Prepare your organization for Copilot for Microsoft 365
This learning path examines the Microsoft Copilot for Microsoft 365 design, as well as its security and compliance features, and it provides instruction on how to implement Copilot for Microsoft 365.
Prevent data loss
Learn how information protection helps organizations protect data to prevent data loss or theft.
Prevent data loss in Microsoft Purview
Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization.
Prevent ransomware and extortion-based attacks
Prevention against ransomware is essential because such an attack can lead to major disruption for you or your business. In this module, you'll learn about best practices to protect yourself against ransomware and other extortion-based attacks.
Prioritize your issues and apply security controls
Threat modeling provides you with a list of threats and ways to reduce or eliminate risk, but it doesn't prioritize them for you. Also, there are no layered security control recommendations based on their type and function.
Protect against malicious attacks and unauthorized access with Microsoft Edge
Microsoft Edge helps protect your network and devices from malicious attacks and helps prevent unauthorized access to, and leaks of, corporate data with Microsoft Defender SmartScreen and Microsoft Defender Application Guard.
Protect against threats with Microsoft Defender for Endpoint
Learn how Microsoft Defender for Endpoint can help your organization stay secure.
Protect data with Zero Trust
Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.