Hungry for some Windows security fundamentals? With so many resources on security, where should you start? Get up to speed and on your way in less than two hours. Learn about securing endpoints, identity, and data, including essential concepts and tools. And just like that, watch how the core half of your chip-to-cloud environment (3/6 layers of security) is approaching Zero Trust.
Time to learn: 92 minutes
READMicrosoft Security, Compliance, and Identity Fundamentals Learn about core concepts that are foundational to security, compliance, and identity solutions, including shared responsibility, Zero Trust, data residency, the role of identity providers, and more. Zero Trust + Identity + Access + Trust |
READZero Trust and Windows device health Windows is built with Zero Trust principles at the core to safeguard data and access anywhere. Explore device health attestation and conditional access capabilities. Shared Responsibility + Encryption + Compliance + Identity + Azure |
|
WATCHZero in on Zero Trust with unified endpoint security management from Microsoft Learn about using Intune! Pre-emptively deploy Endpoint Security policies. Efficiently detect threats within your organization across multiple platforms. Onboard devices with Defender to enable the security signals needed to do all of the above. Intune + Defender + Data + Endpoints + Azure AD + TVM |
READUsing security baselines in your organization Want an easy button? Check out Microsoft-recommended configuration settings and their security implications. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers. Windows + Compliance + MDM + Group Policy + ConfigMgr + Intune |
|
READWindows updates, channels, and tools Keeping your Windows devices up to date is essential to your Windows security strategy. Familiarize yourself with update types and servicing channels. Patch management + Windows Update + Servicing + Deployment + Intune + ConfigMgr + WSUS + GA+ Insider + LTSC |
WATCHWindows 365 security best practices Watch and learn from real-life examples on how to secure endpoints, identity, and data on cloud PCs. Windows 365 + Cloud PC + Endpoints + Identity + Data |
These are just some of the basics! Keep learning with us and improve your security posture. Take the Microsoft Zero Trust Maturity Assessment Quiz (online quiz) to check your organization's pulse and strategy at any moment—and find recommendations on what to do next.
And, if you're ready for a full meal, we have a comprehensive learning module to help you Advance your security posture with Microsoft Intune from chip to cloud (time to learn: 68 minutes).
That's something to chew on! Come back for more skilling snacks weekly. We'll keep your memory fresh with valuable existing content that you may have missed or forgotten. Leave a comment below with topic ideas or to share your experience with peers!
Continue the conversation. Find best practices. Bookmark the Windows Tech Community.
Looking for support? Visit Windows on Microsoft Q&A.
Stay informed. For the latest updates, stay tuned to this blog and follow us @MSWindowsITPro on Twitter.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.