Productivity Tools
Showing 1357–1368 of 1557 results
Secure Windows Server user accounts
Protect your Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. Learn how to limit authentication scope and remediate potentially insecure accounts.
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Learn how to use Azure RBAC to manage access to resources in Azure.
Secure your Azure SQL Database
Secure your Azure SQL Database to keep your data secure and diagnose potential security concerns as they happen.
Secure your Azure Storage account
Learn how Azure Storage provides multilayered security to protect your data. Find out how to use access keys, to secure networks, and to use Advanced Threat Protection to proactively monitor your system.
Secure your cloud apps and services with Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps is a cloud access security broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. Learn how to use Defender for Cloud Apps in your organization.
Secure your infrastructure with threat modeling
Learn how to use the foundation of threat modeling to identify enterprise risks and find ways to reduce or eliminate them.
Securely connect to SAP on Azure
Learn to describe Azure Networking services and components for connecting and securing SAP S/4 HANA in Azure, and learn how different requirements might adjust networking services requirements.
Security Monitoring and Governance
This module describes security monitoring and governance with Microsoft Defender for Cloud and its usage scenarios, Azure Policies, Microsoft Defender for Identity, and security practices related to the tools.
Select Windows Server editions, servicing options, and activation
Select a suitable edition of Windows Server 2019, and then learn to choose the appropriate servicing option and activation method.
Select, sort, and measure objects using the pipeline
This module explains how to manipulate objects in the pipeline by using commands that sort, select, and measure objects.
Send and pass data as output from the pipeline
This module explains how to send pipeline data to files and in various output formats.
Server Management: Security and Disaster Recovery
As an IT professional dealing with server security you will need to manage access controls as well as server resiliency. This course will teach you how to successfully implement server management focusing on security and disaster recovery.