Productivity Tools
Showing 1405–1416 of 1730 results
Protect against malicious attacks and unauthorized access with Microsoft Edge
Microsoft Edge helps protect your network and devices from malicious attacks and helps prevent unauthorized access to, and leaks of, corporate data with Microsoft Defender SmartScreen and Microsoft Defender Application Guard.
Protect against threats with Microsoft Defender for Endpoint
Learn how Microsoft Defender for Endpoint can help your organization stay secure.
Protect data with Zero Trust
Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect infrastructure with Zero Trust
Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.
Protect your Azure Virtual Desktop deployment by using Azure Firewall
In this module, you'll learn to deploy Azure Firewall, route all network traffic through Azure Firewall, and configure rules. You'll also route the outbound network traffic from the Azure Virtual Desktop host pool to the service through Azure Firewall.
Protect your endpoint environment with Microsoft Intune
In this module, you'll learn about protecting devices, apps, and data. Additionally, you'll understand the endpoint environment and the supported platforms available with Microsoft Intune.
Protect your virtual machine settings with Azure Automation State Configuration
Create a desired state configuration script that checks that IIS is installed. Onboard virtual machines (VMs) for management by Azure Automation. Automatically install IIS on the VMs where that feature is missing.
Provide apps to users
In this module, you'll learn about traditional app-deployment methods, as well as methods that you can use to help to automate app deployment.
Provide context with the right depth layer
Threat models can get complex if all parties involved can't agree on a data-flow diagram depth layer that provides enough context to satisfy requirements
Provide disaster recovery by replicating storage data across regions and failing over to a secondary location
In this module, you'll learn to evaluate and choose a redundancy option for Azure Storage. You'll create a storage account and blob container to demonstrate replication. You'll also initiate storage account failover to the secondary region.