ConfigMgr – O365 Deployment and Updating Video Tutorial
In January we presented a Software Update Video Tutorial series. This series hosted by Steven Rachui, was focused on the changes to software updates in Configuration Manager current branch. By popular demand we are adding another video tutorial for Office ... continue reading

Getting the most value out of your security deployment
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization ... continue reading
From the ground up to the cloud: Microsoft’s Intelligent Security supporting CISOs’ cloud transformation
Its no secret that Microsoft has embraced the cloud in a big wayfrom enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to ... continue reading
Cloud data and AI services training roundup May 2018
To help you stay up to date on online training opportunities, were releasing a monthly list of the latest free Data and Artificial Intelligence (AI) sessions in one convenient post. SQL Database Azure SQL Database is the intelligent, fully managed ... continue reading

Now that you have a plan, it’s time to start deploying
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption within your organization ... continue reading

Securing the modern workplace with Microsoft 365 threat protection – part 4
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Responding to ransomware in the Modern Workplace Over the last few weeks, we have shared the roots of Microsoft 365 threat protection and how Microsoft 365 ... continue reading
Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past
Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and ... continue reading

Securing the modern workplace with Microsoft 365 threat protection – part 3
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Detecting ransomware in the modern workplace Over the last two weeks, we have shared with you the roots of Microsoft 365 threat protection and how Microsoft ... continue reading

Securing the modern workplace with Microsoft 365 threat protection – part 2
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Protecting the modern workplace against Ransomware Last week, we shared the roots of Microsoft 365 threat protection. This week, we want to share how Microsoft 365 ... continue reading

First things first: Envisioning your security deployment
This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your ... continue reading