Microsoft Cybersecurity Self-Assessment – The purpose of this self-assessment is to help you pinpoint your Cybersecurity strengths and weaknesses, and to provide you with a complete Cybersecurity Healthcheck Report containing useful tips and recommendations. Your total possible Cybersecurity Health Check score is 100. Your score will be carefully calculated based off the answers you provide. Please allow 20 minutes to complete this assessment.

Videos and Recordings

Cyber Security Reference Strategies – Are you building cybersecurity strategies to protect an enterprise that includes cloud and mobile devices outside your network? Join us for a deep dive into Microsoft cybersecurity reference strategies, and get help from the experts, as you plan ways to manage the continuous flow of new threats and capabilities that modern enterprises face. Get an in-depth look at four main areas: Security Management Learnings and Principles, Identity and Access Management, Threat Protection, and Information Protection.
     Download Slide Deck

Microsoft Cyber Security Reference Architecture – Do you need help protecting an enterprise that spans cloud and mobile devices outside your network controls? Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today. Microsoft has built a set of strategies and integrated capabilities to help you solve these challenges and is continuing to invest in making this easier.
     Download Cyber Security Reference Architecture Powerpoint


Cyber Security Reference Architecture – The Microsoft Cybersecurity Reference Architecture describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it.
    Download Architecture

Building Zero Trust networks with Microsoft 365 – Zero Trust networks eliminate the concept of trust based on network location within a perimeter. Instead, Zero Trust architectures leverage device and user trust claims to gate access to organizational data and resources.
The End of Corporate Network is coming – General Electric recently announced it may “disconnect” as many as 5,000 sites from its corporate network. Is the idea of a secure, corporate network for employees past its prime?
A decision tree for Azure Networking – Use the following diagram to get some guidance around networking with Azure.

Tips for getting started on your security deployment (3 part Series) by Debbie Sere
     Part 1 – Accelerate your security deployment with FastTrack for Microsoft 365
     Part 2 – Envisioning your security deployment
     Part 3 – Build a success plan
     Part 4 – Now that you have your plan, its time to start deploying

How Microsoft 365 Security integrates with the broader security ecosystem – Part 1 – discussed Microsoft’s overall security strategy for connecting with the broader security community
How Microsoft 365 Security integrates with the broader security ecosystem – Part 2 – looked at how Microsoft services help secure non-Microsoft services of an organization’s IT environment.
How Microsoft 365 Security integrates with the broader security ecosystem – Part 3 – we highlight how Microsoft 365 Security solutions work together to help customers secure their IT environments. The benefits of Microsoft 365 Security services are universal, as demonstrated by the fact that our customers are large and small, and focused on different industry verticals across the globe.

Best Practices to consider before deploying a network virtual applianceBest Practices to consider before deploying a network virtual applianceBest Practices to consider before deploying a network virtual appliance – A network virtual appliance (NVA) is a virtual appliance primarily focused on network functions virtualization. A typical network virtual appliance involves various layers four to seven functions like firewall, WAN optimizer, application delivery controllers, routers, load balancers, IDS/IPS, proxies, SD-WAN edge, and more.

Documentation & Whitepapers

Guide to Developing a national Cyber Security Strategy – comprehensive document for policymakers working to either establish, or update and evolve upon, their respective national cybersecurity strategies. It was developed in partnership with leading voices from government, civil society, academia, and industry

Deploy M365 Enterprise Securely – This documentation set guides you through that deployment and the correct and required configuration of these products and their features.

Enterprise Mobility + Security: Survival Guide – This article will introduce how Enterprise Mobility + Security fit into today’s landscape with an increasingly mix and match the environment of devices, applications and platforms and being able to manage this cohesively and securely. This will provide a detailed explanation of what EMS includes, the different versions along with additional resources.

6 steps to a holistic security strategy with Microsoft 365 – This free e-book details how to create a holistic, comprehensive strategy proved out by real companies that have made security a cornerstone of their business


Windows Security baselines – We recommend that you implement an industry-standard configuration that is broadly known and well-tested, such as Microsoft security baselines, as opposed to creating a baseline yourself. This helps increase flexibility and reduce costs

Security Compliance Toolkit (SCT) – includes tools to help admins manage their security baselines.

CIS Microsoft Azure Foundations Benchmark V1.0.0 – Provides prescriptive guidance for establishing a secure baseline configuration for Microsoft Azure. The scope of this benchmark is to establish the foundation level of security for anyone adopting Microsoft Azure Cloud

STIGs – Security Technical Implementation Guide – The Security Technical Implementation Guides (STIGs) are the configuration standards for DOD IA and IA-enabled devices/systems. Since 1998, DISA has played a critical role enhancing the security posture of DoD’s security systems by providing the Security Technical Implementation Guides (STIGs). The STIGs contain technical guidance to “lock down” information systems/software that might otherwise be vulnerable to a malicious computer attack.