Showing 8353–8364 of 10356 results
Protect against malicious attacks and unauthorized access with Microsoft Edge
Microsoft Edge helps protect your network and devices from malicious attacks and helps prevent unauthorized access to, and leaks of, corporate data with Microsoft Defender SmartScreen and Microsoft Defender Application Guard.
Protect against threats with Microsoft Defender for Endpoint
Learn how Microsoft Defender for Endpoint can help your organization stay secure.
Protect data in-transit and at rest
Explore encryption options available within Azure SQL, including firewall rules, Always Encrypted, and Transport Layer Security. Understand how SQL Injection works.
Protect data with Zero Trust
Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect infrastructure with Zero Trust
Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.
Protect your APIs on Azure API Management
Protect your backend APIs from information exposure and implement throttling (rate limiting) to prevent resource exhaustion with policies in Azure API Management.
Protect your Azure Virtual Desktop deployment by using Azure Firewall
In this module, you'll learn to deploy Azure Firewall, route all network traffic through Azure Firewall, and configure rules. You'll also route the outbound network traffic from the Azure Virtual Desktop host pool to the service through Azure Firewall.
Protect your endpoint environment with Microsoft Intune
In this module, you'll learn about protecting devices, apps, and data. Additionally, you'll understand the endpoint environment and the supported platforms available with Microsoft Intune.
Protect Your Stock Positions Made Easy
Learn an Easy Option Strategy to Hedge Your risk
Protect your virtual machine settings with Azure Automation State Configuration
Create a desired state configuration script that checks that IIS is installed. Onboard virtual machines (VMs) for management by Azure Automation. Automatically install IIS on the VMs where that feature is missing.