Forum Discussion

jack_lee's avatar
Apr 04, 2019
Solved

Top 10 Actions to Secure Your Environment

I'm doing some research for a client project and came across this great blog series. Just wanted to share with all of you.

 

The "Top 10 actions to secure your environment" series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions.

 

Step 1. Identify users
https://www.microsoft.com/security/blog/2018/12/05/step-1-identify-users-top-10-actions-to-secure-your-environment/

 

Step 2. Manage authentication and safeguard access
https://www.microsoft.com/security/blog/2018/12/17/step-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment/

 

Step 3. Protect your identities
https://www.microsoft.com/security/blog/2019/01/16/step-3-protect-your-identities-top-10-actions-to-secure-your-environment/

 

Step 4. Set conditional access policies
https://www.microsoft.com/security/blog/2019/01/30/step-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment/

 

Step 5. Set up mobile device management
https://www.microsoft.com/security/blog/2019/02/14/step-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment/

 

Step 6. Manage mobile apps
https://www.microsoft.com/security/blog/2019/03/12/step-6-manage-mobile-apps-top-10-actions-to-secure-your-environment/

 

Step 7. Discover shadow IT and take control of your cloud apps
https://www.microsoft.com/security/blog/2019/03/26/step-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment/

 

Step 8. Protect your documents and email

https://www.microsoft.com/security/blog/2019/04/09/step-8-protect-documents-email-top-10-actions-secure-environment/

 

Step 9. Protect your OS

https://www.microsoft.com/security/blog/2019/05/21/step-9-protect-your-os-top-10-actions-secure-your-environment/

 

Step 10. Detect and investigate security incidents

https://www.microsoft.com/security/blog/2019/06/04/step-10-detect-investigate-security-incidents-top-10-actions-secure-your-environment/

 

  • Hi everyone,

     

    I've taken this opportunity to add Steps 9 and 10 to this article, thus completing this article.  🙂

     

    Cheers,

    Jack

  • Ewan Monro's avatar
    Ewan Monro
    Copper Contributor

    jack_lee Hi I was working my way through this aweseome content however links are no longer available. Can you please look into and restore if possible. 

    • jack_lee's avatar
      jack_lee
      MVP

      Thanks for your feedback, Ewan Monro.

       

      I just re-tested all the links and they seem to be working fine for me.  Perhaps clear your browser cache and try again.

Resources