Guide icon
Guide

Security Operations

Harden M365 Identities and Exchange Online

by Aaron Turner, IANS Faculty

Less than 10 percent of those enterprises assessed by IANS in the past two years have taken the required steps to harden their M365 environment properly. Learn how M365 tenants can prioritize activities to protect against some of the more sophisticated Azure AD and Exchange Online attacks observed over the past year.

This detailed guide explains how security teams can:

  • Configure and secure M365 Identities and Exchange Online properly
  • Harden Exchange Online beyond MFA
  • Identify features within Defender Identity worth moving up to E5 licenses

Complete the form and we'll send a copy of this actionable guide to your email.

Fill out the form to receive your content download.  
* Required Fields
 

Featured IANS Content

Guide icon
Guide

Metrics and Reporting

Create Incident Response Metrics Worth Reporting

by Adrian Sanabria, IANS Faculty

This downloadable guide explains how to create incident response (IR) metrics that focus on improvement and are likely to resonate with management.

See Details
Guide icon
Guide

Endpoint Detection & Response

Microsoft Defender vs. CrowdStrike Falcon for EDR

by Dave Shackleford, IANS Faculty

Find a detailed comparison guide of how Microsoft Advanced Threat Protection (ATP) and CrowdStrike Falcon stack up against each other in the EDR space across feature sets and ease of use.

See Details
Guide icon
Guide

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

Completely locking down all your cloud workloads is a daunting endeavor. This piece explains how focusing on six key control areas can help ensure security teams get a solid head start in the cloud by adhering to foundational security practices.

See Details