Threat and Vulnerability Mitigation
Find prescriptive guidance on assessing security risk and implementing security technologies that offer defense-in-depth protection against attacks and provide IT professionals with central visibility and control of the security environment.
Identity and Access Management
Learn about Microsoft technologies that allow legitimate users to access resources, while raising the bar for unauthorized users such as external hackers or internal disgruntled employees. Find guides, webcasts, and virtual labs to help you verify user identity, control user access to resources, and protect access to data throughout its life cycle.
Combine Microsoft technology with tools and guidance to help build a secure foundation for your IT infrastructure. Learn about technologies intrinsic to the operating system that help make computers more resilient to attacks and provide the foundation upon which you can build your other technology investments.