SOLVED
Home

Top 10 Actions to Secure Your Environment

%3CLINGO-SUB%20id%3D%22lingo-sub-400797%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-400797%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20your%20feedback%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F72542%22%20target%3D%22_blank%22%3E%40adam%20deltinger%3C%2FA%3E.%26nbsp%3B%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20just%20posted%20a%20companion%20%3CA%20title%3D%22Top%2010%20Security%20Deployment%20Actions%20with%20Microsoft%20365%20(Infographic)%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-365%2FTop-10-Security-Deployment-Actions-with-Microsoft-365%2Fm-p%2F400790%23M2510%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Einfographic%3C%2FA%3E%20for%20this%20topic.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%2C%3C%2FP%3E%3CP%3EJack%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-395128%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-395128%22%20slang%3D%22en-US%22%3EThank%20you!%3CBR%20%2F%3E%2FAdam%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848005%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848005%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F268983%22%20target%3D%22_blank%22%3E%40jack_lee%3C%2FA%3E%26nbsp%3BHi%20I%20was%20working%20my%20way%20through%20this%20aweseome%20content%20however%20links%20are%20no%20longer%20available.%20Can%20you%20please%20look%20into%20and%20restore%20if%20possible.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-395116%22%20slang%3D%22en-US%22%3ETop%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-395116%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20doing%20some%20research%20for%20a%20client%20project%20and%20came%20across%20this%20great%20blog%20series.%20Just%20wanted%20to%20share%20with%20all%20of%20you.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%22%3CSTRONG%3ETop%2010%20actions%20to%20secure%20your%20environment%3C%2FSTRONG%3E%22%20series%20outlines%20fundamental%20steps%20you%20can%20take%20with%20your%20investment%20in%20Microsoft%20365%20security%20solutions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%201.%20Identify%20users%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%202.%20Manage%20authentication%20and%20safeguard%20access%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%203.%20Protect%20your%20identities%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%204.%20Set%20conditional%20access%20policies%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%205.%20Set%20up%20mobile%20device%20management%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%206.%20Manage%20mobile%20apps%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F12%2Fstep-6-manage-mobile-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F12%2Fstep-6-manage-mobile-apps-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%208.%26nbsp%3BProtect%20your%20documents%20and%20email%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F04%2F09%2Fstep-8-protect-documents-email-top-10-actions-secure-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F04%2F09%2Fstep-8-protect-documents-email-top-10-actions-secure-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%209.%20Protect%20your%20OS%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F05%2F21%2Fstep-9-protect-your-os-top-10-actions-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F05%2F21%2Fstep-9-protect-your-os-top-10-actions-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%2010.%26nbsp%3BDetect%20and%20investigate%20security%20incidents%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F04%2Fstep-10-detect-investigate-security-incidents-top-10-actions-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F04%2Fstep-10-detect-investigate-security-incidents-top-10-actions-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-395116%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848045%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848045%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20your%20feedback%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F221741%22%20target%3D%22_blank%22%3E%40Ewan%20Monro%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20just%20re-tested%20all%20the%20links%20and%20they%20seem%20to%20be%20working%20fine%20for%20me.%26nbsp%3B%20Perhaps%20clear%20your%20browser%20cache%20and%20try%20again.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848046%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848046%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20everyone%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI've%20taken%20this%20opportunity%20to%20add%20Steps%209%20and%2010%20to%20this%20article%2C%20thus%20completing%20this%20article.%26nbsp%3B%20%3A)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECheers%2C%3C%2FP%3E%0A%3CP%3EJack%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
jack_lee
MVP

I'm doing some research for a client project and came across this great blog series. Just wanted to share with all of you.

 

The "Top 10 actions to secure your environment" series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions.

 

Step 1. Identify users
https://www.microsoft.com/security/blog/2018/12/05/step-1-identify-users-top-10-actions-to-secure-yo...

 

Step 2. Manage authentication and safeguard access
https://www.microsoft.com/security/blog/2018/12/17/step-2-manage-authentication-and-safeguard-access...

 

Step 3. Protect your identities
https://www.microsoft.com/security/blog/2019/01/16/step-3-protect-your-identities-top-10-actions-to-...

 

Step 4. Set conditional access policies
https://www.microsoft.com/security/blog/2019/01/30/step-4-set-conditional-access-policies-top-10-act...

 

Step 5. Set up mobile device management
https://www.microsoft.com/security/blog/2019/02/14/step-5-set-up-mobile-device-management-top-10-act...

 

Step 6. Manage mobile apps
https://www.microsoft.com/security/blog/2019/03/12/step-6-manage-mobile-apps-top-10-actions-to-secur...

 

Step 7. Discover shadow IT and take control of your cloud apps
https://www.microsoft.com/security/blog/2019/03/26/step-7-discover-shadow-it-and-take-control-of-you...

 

Step 8. Protect your documents and email

https://www.microsoft.com/security/blog/2019/04/09/step-8-protect-documents-email-top-10-actions-sec...

 

Step 9. Protect your OS

https://www.microsoft.com/security/blog/2019/05/21/step-9-protect-your-os-top-10-actions-secure-your...

 

Step 10. Detect and investigate security incidents

https://www.microsoft.com/security/blog/2019/06/04/step-10-detect-investigate-security-incidents-top...

 

5 Replies
Thank you!
/Adam
Solution

Thanks for your feedback, @adam deltinger.  :)

 

I just posted a companion infographic for this topic.

 

Cheers,

Jack

@jack_lee Hi I was working my way through this aweseome content however links are no longer available. Can you please look into and restore if possible. 

Thanks for your feedback, @Ewan Monro.

 

I just re-tested all the links and they seem to be working fine for me.  Perhaps clear your browser cache and try again.

Hi everyone,

 

I've taken this opportunity to add Steps 9 and 10 to this article, thus completing this article.  :)

 

Cheers,

Jack

Related Conversations
Windows 10 1903 Group Policy Issues after OSD
techyluke in Windows 10 deployment on
13 Replies
A problem with the Zoom level of a Tab
Tavory in Discussions on
9 Replies
Most efficient way to deploy new 3 tier DevTest environment
Rod5061 in Azure on
1 Replies