SOLVED
Home

Top 10 Actions to Secure Your Environment

%3CLINGO-SUB%20id%3D%22lingo-sub-400797%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-400797%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20your%20feedback%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F72542%22%20target%3D%22_blank%22%3E%40adam%20deltinger%3C%2FA%3E.%26nbsp%3B%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20just%20posted%20a%20companion%20%3CA%20title%3D%22Top%2010%20Security%20Deployment%20Actions%20with%20Microsoft%20365%20(Infographic)%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-365%2FTop-10-Security-Deployment-Actions-with-Microsoft-365%2Fm-p%2F400790%23M2510%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Einfographic%3C%2FA%3E%20for%20this%20topic.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%2C%3C%2FP%3E%3CP%3EJack%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-395128%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-395128%22%20slang%3D%22en-US%22%3EThank%20you!%3CBR%20%2F%3E%2FAdam%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848005%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848005%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F268983%22%20target%3D%22_blank%22%3E%40jack_lee%3C%2FA%3E%26nbsp%3BHi%20I%20was%20working%20my%20way%20through%20this%20aweseome%20content%20however%20links%20are%20no%20longer%20available.%20Can%20you%20please%20look%20into%20and%20restore%20if%20possible.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-395116%22%20slang%3D%22en-US%22%3ETop%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-395116%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20doing%20some%20research%20for%20a%20client%20project%20and%20came%20across%20this%20great%20blog%20series.%20Just%20wanted%20to%20share%20with%20all%20of%20you.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%22%3CSTRONG%3ETop%2010%20actions%20to%20secure%20your%20environment%3C%2FSTRONG%3E%22%20series%20outlines%20fundamental%20steps%20you%20can%20take%20with%20your%20investment%20in%20Microsoft%20365%20security%20solutions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%201.%20Identify%20users%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%202.%20Manage%20authentication%20and%20safeguard%20access%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%203.%20Protect%20your%20identities%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%204.%20Set%20conditional%20access%20policies%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%205.%20Set%20up%20mobile%20device%20management%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%206.%20Manage%20mobile%20apps%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F12%2Fstep-6-manage-mobile-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F12%2Fstep-6-manage-mobile-apps-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%208.%26nbsp%3BProtect%20your%20documents%20and%20email%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F04%2F09%2Fstep-8-protect-documents-email-top-10-actions-secure-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F04%2F09%2Fstep-8-protect-documents-email-top-10-actions-secure-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%209.%20Protect%20your%20OS%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F05%2F21%2Fstep-9-protect-your-os-top-10-actions-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F05%2F21%2Fstep-9-protect-your-os-top-10-actions-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%2010.%26nbsp%3BDetect%20and%20investigate%20security%20incidents%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F04%2Fstep-10-detect-investigate-security-incidents-top-10-actions-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F04%2Fstep-10-detect-investigate-security-incidents-top-10-actions-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-395116%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848045%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848045%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20your%20feedback%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F221741%22%20target%3D%22_blank%22%3E%40Ewan%20Monro%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20just%20re-tested%20all%20the%20links%20and%20they%20seem%20to%20be%20working%20fine%20for%20me.%26nbsp%3B%20Perhaps%20clear%20your%20browser%20cache%20and%20try%20again.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848046%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848046%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20everyone%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI've%20taken%20this%20opportunity%20to%20add%20Steps%209%20and%2010%20to%20this%20article%2C%20thus%20completing%20this%20article.%26nbsp%3B%20%3A)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECheers%2C%3C%2FP%3E%0A%3CP%3EJack%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
jack_lee
MVP

I'm doing some research for a client project and came across this great blog series. Just wanted to share with all of you.

 

The "Top 10 actions to secure your environment" series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions.

 

Step 1. Identify users
https://www.microsoft.com/security/blog/2018/12/05/step-1-identify-users-top-10-actions-to-secure-yo...

 

Step 2. Manage authentication and safeguard access
https://www.microsoft.com/security/blog/2018/12/17/step-2-manage-authentication-and-safeguard-access...

 

Step 3. Protect your identities
https://www.microsoft.com/security/blog/2019/01/16/step-3-protect-your-identities-top-10-actions-to-...

 

Step 4. Set conditional access policies
https://www.microsoft.com/security/blog/2019/01/30/step-4-set-conditional-access-policies-top-10-act...

 

Step 5. Set up mobile device management
https://www.microsoft.com/security/blog/2019/02/14/step-5-set-up-mobile-device-management-top-10-act...

 

Step 6. Manage mobile apps
https://www.microsoft.com/security/blog/2019/03/12/step-6-manage-mobile-apps-top-10-actions-to-secur...

 

Step 7. Discover shadow IT and take control of your cloud apps
https://www.microsoft.com/security/blog/2019/03/26/step-7-discover-shadow-it-and-take-control-of-you...

 

Step 8. Protect your documents and email

https://www.microsoft.com/security/blog/2019/04/09/step-8-protect-documents-email-top-10-actions-sec...

 

Step 9. Protect your OS

https://www.microsoft.com/security/blog/2019/05/21/step-9-protect-your-os-top-10-actions-secure-your...

 

Step 10. Detect and investigate security incidents

https://www.microsoft.com/security/blog/2019/06/04/step-10-detect-investigate-security-incidents-top...

 

5 Replies
Thank you!
/Adam
Solution

Thanks for your feedback, @adam deltinger.  :)

 

I just posted a companion infographic for this topic.

 

Cheers,

Jack

@jack_lee Hi I was working my way through this aweseome content however links are no longer available. Can you please look into and restore if possible. 

Thanks for your feedback, @Ewan Monro.

 

I just re-tested all the links and they seem to be working fine for me.  Perhaps clear your browser cache and try again.

Hi everyone,

 

I've taken this opportunity to add Steps 9 and 10 to this article, thus completing this article.  :)

 

Cheers,

Jack

Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
46 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies
How to Prevent Teams from Auto-Launch
chenrylee in Microsoft Teams on
30 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Security Community Webinars
Valon_Kolica in Security, Privacy & Compliance on
13 Replies