
Expert Briefing


Implement and Manage Authentication Methods

Plan and Implement Identities for Applications and Azure Workloads

Review and Respond to Issues Identified in Security and Compliance Reports in Microsoft 365 Defender

Review and Respond to Threats Identified in Threat Analytics

Retention and Records Management
