SOLVED

Top 10 Actions to Secure Your Environment

%3CLINGO-SUB%20id%3D%22lingo-sub-400797%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-400797%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20your%20feedback%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F72542%22%20target%3D%22_blank%22%3E%40adam%20deltinger%3C%2FA%3E.%26nbsp%3B%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20just%20posted%20a%20companion%20%3CA%20title%3D%22Top%2010%20Security%20Deployment%20Actions%20with%20Microsoft%20365%20(Infographic)%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-365%2FTop-10-Security-Deployment-Actions-with-Microsoft-365%2Fm-p%2F400790%23M2510%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Einfographic%3C%2FA%3E%20for%20this%20topic.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%2C%3C%2FP%3E%3CP%3EJack%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-395128%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-395128%22%20slang%3D%22en-US%22%3EThank%20you!%3CBR%20%2F%3E%2FAdam%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848005%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848005%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F268983%22%20target%3D%22_blank%22%3E%40jack_lee%3C%2FA%3E%26nbsp%3BHi%20I%20was%20working%20my%20way%20through%20this%20aweseome%20content%20however%20links%20are%20no%20longer%20available.%20Can%20you%20please%20look%20into%20and%20restore%20if%20possible.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-395116%22%20slang%3D%22en-US%22%3ETop%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-395116%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20doing%20some%20research%20for%20a%20client%20project%20and%20came%20across%20this%20great%20blog%20series.%20Just%20wanted%20to%20share%20with%20all%20of%20you.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%22%3CSTRONG%3ETop%2010%20actions%20to%20secure%20your%20environment%3C%2FSTRONG%3E%22%20series%20outlines%20fundamental%20steps%20you%20can%20take%20with%20your%20investment%20in%20Microsoft%20365%20security%20solutions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%201.%20Identify%20users%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%202.%20Manage%20authentication%20and%20safeguard%20access%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%203.%20Protect%20your%20identities%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%204.%20Set%20conditional%20access%20policies%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%205.%20Set%20up%20mobile%20device%20management%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%206.%20Manage%20mobile%20apps%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F12%2Fstep-6-manage-mobile-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F12%2Fstep-6-manage-mobile-apps-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%208.%26nbsp%3BProtect%20your%20documents%20and%20email%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F04%2F09%2Fstep-8-protect-documents-email-top-10-actions-secure-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F04%2F09%2Fstep-8-protect-documents-email-top-10-actions-secure-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%209.%20Protect%20your%20OS%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F05%2F21%2Fstep-9-protect-your-os-top-10-actions-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F05%2F21%2Fstep-9-protect-your-os-top-10-actions-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EStep%2010.%26nbsp%3BDetect%20and%20investigate%20security%20incidents%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F04%2Fstep-10-detect-investigate-security-incidents-top-10-actions-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F04%2Fstep-10-detect-investigate-security-incidents-top-10-actions-secure-your-environment%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-395116%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848045%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848045%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20your%20feedback%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F221741%22%20target%3D%22_blank%22%3E%40Ewan%20Monro%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20just%20re-tested%20all%20the%20links%20and%20they%20seem%20to%20be%20working%20fine%20for%20me.%26nbsp%3B%20Perhaps%20clear%20your%20browser%20cache%20and%20try%20again.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-848046%22%20slang%3D%22en-US%22%3ERe%3A%20Top%2010%20Actions%20to%20Secure%20Your%20Environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-848046%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20everyone%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI've%20taken%20this%20opportunity%20to%20add%20Steps%209%20and%2010%20to%20this%20article%2C%20thus%20completing%20this%20article.%26nbsp%3B%20%3A)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECheers%2C%3C%2FP%3E%0A%3CP%3EJack%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
MVP

I'm doing some research for a client project and came across this great blog series. Just wanted to share with all of you.

 

The "Top 10 actions to secure your environment" series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions.

 

Step 1. Identify users
https://www.microsoft.com/security/blog/2018/12/05/step-1-identify-users-top-10-actions-to-secure-yo...

 

Step 2. Manage authentication and safeguard access
https://www.microsoft.com/security/blog/2018/12/17/step-2-manage-authentication-and-safeguard-access...

 

Step 3. Protect your identities
https://www.microsoft.com/security/blog/2019/01/16/step-3-protect-your-identities-top-10-actions-to-...

 

Step 4. Set conditional access policies
https://www.microsoft.com/security/blog/2019/01/30/step-4-set-conditional-access-policies-top-10-act...

 

Step 5. Set up mobile device management
https://www.microsoft.com/security/blog/2019/02/14/step-5-set-up-mobile-device-management-top-10-act...

 

Step 6. Manage mobile apps
https://www.microsoft.com/security/blog/2019/03/12/step-6-manage-mobile-apps-top-10-actions-to-secur...

 

Step 7. Discover shadow IT and take control of your cloud apps
https://www.microsoft.com/security/blog/2019/03/26/step-7-discover-shadow-it-and-take-control-of-you...

 

Step 8. Protect your documents and email

https://www.microsoft.com/security/blog/2019/04/09/step-8-protect-documents-email-top-10-actions-sec...

 

Step 9. Protect your OS

https://www.microsoft.com/security/blog/2019/05/21/step-9-protect-your-os-top-10-actions-secure-your...

 

Step 10. Detect and investigate security incidents

https://www.microsoft.com/security/blog/2019/06/04/step-10-detect-investigate-security-incidents-top...

 

5 Replies
Highlighted
Thank you!
/Adam
Highlighted
Best Response confirmed by jack_lee (MVP)
Solution

Thanks for your feedback, @adam deltinger.  :)

 

I just posted a companion infographic for this topic.

 

Cheers,

Jack

Highlighted

@jack_lee Hi I was working my way through this aweseome content however links are no longer available. Can you please look into and restore if possible. 

Highlighted

Thanks for your feedback, @Ewan Monro.

 

I just re-tested all the links and they seem to be working fine for me.  Perhaps clear your browser cache and try again.

Highlighted

Hi everyone,

 

I've taken this opportunity to add Steps 9 and 10 to this article, thus completing this article.  :)

 

Cheers,

Jack