Productivity Tools
Showing 157–168 of 1557 results
Configure and manage threat protection by using Microsoft Defender for Cloud
This module focuses on the essential techniques for configuring and managing threat protection exclusively with Microsoft Defender for Cloud, empowering cybersecurity specialists to strengthen the security posture of their cloud environments.
Configure and manage voice users
Ongoing management is required as new employees start, or if their needs change. Learn how to manage voice user configuration, including enabling voice services and adjusting voice configuration.
Configure and use secret scanning in your GitHub repository
Understand how secret scanning works to configure and use it efficiently.
Configure and validate permissions
This module covers fundamental concepts and best practices for configuring and validating user permissions, pipeline permissions, approval and branch checks, and auditing and managing permissions.
Configure auto attendants and call queues
Understand how auto attendants and call queues in Microsoft Teams can interact with callers to ensure they're connected your agents as quickly as possible. You'll also learn how to set up auto attendants and call queues.
Configure Azure App Service
Learn how to configure and monitor Azure App Service instances, including deployment slots.
Configure Azure App Service plans
Learn how to configure an Azure App Service plan, including pricing and scaling.
Configure Azure Application Gateway
Learn how to configure Azure Application Gateway.
Configure Azure Blob Storage
Learn how to configure Configure Azure Blob Storage, including tiers and object replication.
Configure Azure Container Instances
Learn how to configure Azure Container Instances including container groups.
Configure Azure Files and Azure File Sync
Learn how to configure Azure Files and Azure File Sync.
Configure Azure Key Vault networking settings
In this module, you'll learn to configure Azure Key Vault networking settings via the Azure portal, ensuring secure and controlled access to your stored secrets.