Skip to content

Commit

Permalink
Merge pull request #27009 from MicrosoftDocs/repo_sync_working_branch
Browse files Browse the repository at this point in the history
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/microsoft-365-docs (branch public)
  • Loading branch information
Ruchika-mittal01 authored Nov 18, 2024
2 parents 5b19875 + 6d6c245 commit b1a22d4
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion microsoft-365/enterprise/setup-guides-for-microsoft-365.md
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ Advanced deployment guides in the admin center require authentication to a Micro
|---------|---------|---------|
|[Security analyzer](https://go.microsoft.com/fwlink/?linkid=2223325)|[Security analyzer](https://go.microsoft.com/fwlink/?linkid=2224900)|The **Security analyzer** will analyze your security approach and introduce you to Microsoft integrated security and compliance solutions that can improve your security posture. You'll learn about advanced features, such as managing identities and helping to protect against modern attacks. You can then sign up for a trial subscription and be pointed to the corresponding setup guidance for each solution.|
|[Set up your Microsoft Zero Trust security model](https://go.microsoft.com/fwlink/?linkid=2222968)|[Set up your Microsoft Zero Trust security model](https://go.microsoft.com/fwlink/?linkid=2224820)|Use the **Set up your Zero Trust security model guide** to configure security that effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and helps protect people, devices, apps, and data wherever they're located. Key recommendations include: always authenticate, limit user access, minimize the blast radius, segment access, verify end-to-end encryption, and use analytics to get visibility, drive threat detection, and improve defenses.|
|[Deploy and set up Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2223058)|[Deploy and set up Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2224812)|Set up Microsoft Intune to manage devices in your organization. For full control of corporate devices, you'll use Intune's mobile device management (MDM) features. To manage your organization's data on shared and personal devices, you can use Intune's mobile application management (MAM) features.<br>With the **Deploy and set up Microsoft Intune guide**, you'll set up device and app compliance policies, assign app protection policies, and monitor the device and app protection status.|
|[Deploy and set up Microsoft Intune and Intune Suite](https://go.microsoft.com/fwlink/?linkid=2223058)|[Deploy and set up Microsoft Intune and Intune Suite](https://go.microsoft.com/fwlink/?linkid=2224812)|Deploy and set up Microsoft Intune and Intune Suite to manage devices in your organization. For full control of corporate devices, use Intune's mobile device management (MDM) features. To manage your organization's data on shared and personal devices, use Intune's mobile application management (MAM) features. Deploy advanced security and management features, included in Microsoft Intune Suite. With the **Deploy and set up Microsoft Intune and Intune Suite guide**, set up device and app compliance policies, assign app protection policies, deploy Intune Suite features, and monitor the device and app protection status.|
|[Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2223155)|[Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2224785)|The **Microsoft Defender for Endpoint setup guide** provides instructions that will help your enterprise network prevent, detect, investigate, and respond to advanced threats. Make an informed assessment of your organization's vulnerability and decide which deployment package and configuration methods are best.<br>**NOTE:** A Microsoft Volume License is required for Microsoft Defender for Endpoint.|
||[Exchange Online Protection setup guide](https://go.microsoft.com/fwlink/?linkid=2224191)|Microsoft Exchange Online Protection (EOP) is a cloud-based email filtering service for protection against spam and malware, with features to safeguard your organization from messaging policy violations.<br>Use the **Exchange Online Protection setup guide** to set up EOP by selecting which of the three deployment scenarios&mdash;on-premises mailboxes, hybrid (mix of on-premises and cloud) mailboxes, or all cloud mailboxes&mdash;fits your organization. The guide provides information and resources to set up and review your user's licensing, assign permissions in the Microsoft 365 admin center, and configure your organization's anti-malware and spam policies in the Security & Compliance Center.|
|[Microsoft Defender for Office 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2222971)|[Microsoft Defender for Office 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2224784)|The **Microsoft Defender for Office 365 setup guide** safeguards your organization against malicious threats that your environment might come across through email messages, links, and third party collaboration tools. This guide provides you with the resources and information to help you prepare and identify the Defender for Office 365 plan to fit your organization's needs.|
Expand Down

0 comments on commit b1a22d4

Please sign in to comment.