Home

Step 3. Protect your identities: top 10 actions to secure your environment

%3CLINGO-SUB%20id%3D%22lingo-sub-320558%22%20slang%3D%22en-US%22%3EStep%203.%20Protect%20your%20identities%3A%20top%2010%20actions%20to%20secure%20your%20environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-320558%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22%22%3E%3CEM%20class%3D%22%22%3EThe%20%E2%80%9CTop%2010%20actions%20to%20secure%20your%20environment%E2%80%9D%20series%20outlines%20fundamental%20steps%20you%20can%20take%20with%20your%20investment%20in%20Microsoft%20365%20security%20solutions.%20In%20%E2%80%9CStep%203.%20Protect%20your%20identities%2C%E2%80%9D%20you%E2%80%99ll%20learn%20how%20to%20define%20security%20policies%20to%20protect%20individual%20user%20identities%20against%20account%20compromise%20and%20protect%20your%20administrative%20accounts.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EWhether%20or%20not%20you%20have%20experienced%20a%20security%20incident%20in%20the%20past%2C%20you%20probably%20know%20that%20it%E2%80%99s%20not%20a%20matter%20of%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CEM%3Eif%3C%2FEM%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ean%20attacker%20will%20successfully%20compromise%20your%20corporate%20resources%2C%20but%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CEM%3Ewhen%3C%2FEM%3E.%20This%20is%20what%20is%20meant%20by%20an%20%E2%80%9Cassume%20breach%E2%80%9D%20mindset.%20Preventative%20measures%20are%20critical%2C%20but%20in%20an%20%E2%80%9Cassume%20breach%E2%80%9D%20world%2C%20so%20are%20detection%20and%20rapid%20response.%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Factive-directory-identityprotection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Active%20Directory%20(Azure%20AD)%20Identity%20Protection%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ecan%20help%20you%20rapidly%20uncover%20anomalies%20or%20suspicious%20incidents%20and%20configure%20policies%20that%20will%20automate%20a%20response.%20With%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Factive-directory-privileged-identity-management-configure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20AD%20Privileged%20Identity%20Management%20(PIM)%3C%2FA%3E%2C%20you%20can%20protect%20your%20administrative%20accounts.%20The%20faster%20you%20discover%20a%20hacker%20and%20take%20back%20control%2C%20the%20less%20damage%20that%20attacker%20can%20do%2C%20saving%20you%20time%2C%20money%2C%20and%20reputation.%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F68981i3EFD09868BE484B1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Step-3-Protect-your-identities-1.png%22%20title%3D%22Step-3-Protect-your-identities-1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3ELearn%20more%20about%20it%20here.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-320558%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20App%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Highlighted
Community Manager

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 3. Protect your identities,” you’ll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts.

 

Whether or not you have experienced a security incident in the past, you probably know that it’s not a matter of if an attacker will successfully compromise your corporate resources, but when. This is what is meant by an “assume breach” mindset. Preventative measures are critical, but in an “assume breach” world, so are detection and rapid response. Azure Active Directory (Azure AD) Identity Protection can help you rapidly uncover anomalies or suspicious incidents and configure policies that will automate a response. With Azure AD Privileged Identity Management (PIM), you can protect your administrative accounts. The faster you discover a hacker and take back control, the less damage that attacker can do, saving you time, money, and reputation.

 

Step-3-Protect-your-identities-1.png

 

Learn more about it here.

Related Conversations
Extentions Synchronization
ChirmyRam in Discussions on
3 Replies
Tabs and Dark Mode
cjc2112 in Discussions on
35 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies