Microsoft Security resources
From antimalware to Zero Trust, get all the relevant resources for your organization’s security needs.
Find security resources
Use the following filter selections to narrow your security resources search by Products
Use the following filter selections to narrow your security resources search by Topics
Use the following filter selections to narrow your security resources search by Content type
Blog
Microsoft cybersecurity solutions
Report
Microsoft positioned as a Leader in Gartner’s Magic Quadrant Access Management report
Video
Protect your time and empower your team
Video
Episode 7: The people behind the cloud
Video
Episode 6: Security Intelligence Report
Video
Episode 5: Moving to the Cloud with Better Security
Video
Episode 4: Closing the Cybersecurity Skills Gap
Video
Episode 3: The Steps to Enable Zero Trust Part 2
Video
Episode 3: How to Enable Zero Trust Part 1
Video
Episode 2: Security is Everyone’s Business Part 2
Video
RapidDeploy mitigates cybersecurity attacks for 911 calls.
Video
Protect your sensitive information
Whitepaper
The end of passwords, go passwordless
Whitepaper
Identity has reached a pivotal point
Video
Passwordless authentication using Azure AD
Video
Own your digital identity
Video
Innovative threat protection
Video
In-depth analysis from Microsoft security intelligence
Video
Identify and classify your sensitive data
Video
How Zscaler integrates for Zero Trust
Video
Getting to a world without passwords
Video
Get started with Azure Security Center
Video
Counting down to Zero Trust
Video
Bump up your cyber security with M365 for campaigns
Going beyond borders to help protect everyone
Series
Monthly member blog series
Resources
Want to be a Microsoft security partner?
Resources
We engage with the security research community to find and address vulnerabilities in our offering.
Resources
Microsoft Active Protections Program
Resources
In-depth threat information
Resources
Find a security solution partner
Resources
Cybersecurity policy
Resources
Azure MFA Adoption Kit
Paper
Reach the optimal state in your Zero Trust journey
Infographic
Safeguarding your data
E-book
Innovator’s guide to cloud-based security
E-book
10 Tips for Enabling Zero Trust
E-book
Microsoft Intelligent Security Graph
E-book
Advanced security with Intelligent Security Graph
Datasheet
Passwordless benefits
App download
Team up with the best
Video
Azure Security Center threat detection
Video
Automated incident response
Video
Alex Simons, VP, Identity Product Management
Video
Microsoft Red Team
Website
Microsoft Security Intelligence
Report
Microsoft positioned as a Leader in Gartner’s Magic Quadrant CASB report
Blog
Strategies and lessons from security experts
Video
CISO lessons and responses
Website
Microsoft Trust Center
Website
Security development lifecycle
Website
Microsoft Security Response Center
Website
Malware analysis submission portal
Website
Security update guide
Website
Microsoft Security bulletins
Video
Discover intelligent security tools
Video
Defend against identity compromise
Video
4 steps to proactive cybersecurity
Video
Stay resilient with the right strategy
Video
Protect against rapid cyberattacks
Whitepaper
Get ahead of threats
Blog
The latest in security from Microsoft
Blog
Inside the Microsoft Security Response Center
Blog
Advanced cybersecurity from Microsoft Azure
Blog
More on Microsoft Enterprise Mobility + Security
Training Video
Deploying app security in the cloud
Training Video
Enhance information protection in the cloud
Training Video
Improve app protection in the cloud
Training Video
Fight malware
Training Video
Securing your domains
Training Video
How to deploy a guarded fabric
Training Video
Learn about breach resistance
Training Video
Establish privileged access
Training Video
Understand cloud security
Training Video
Prepare for a security incident
Training Video
Protect against new threats
Whitepaper
Maintain compliance and control
Whitepaper
Store and share files securely
Whitepaper
Empower collaboration
Whitepaper
Share work securely in real time
Whitepaper
Protect people and their identities
Whitepaper
Stop cybersecurity threats
Whitepaper
Protect data wherever it lives
Whitepaper
Work securely anywhere, anytime
Whitepaper
How Microsoft 365 security measures up
Whitepaper
Accelerate your deployment
Whitepaper
10 actions for improving security
Whitepaper
Get value from your security
Whitepaper
Deploy your security
Whitepaper
Make a security deployment checklist
Whitepaper
FastTrack your security deployment
Report
The Microsoft commitment to security
Report
All about Azure Sentinel
Video
See how governments maintain high security
Video
Why Fortune 500 companies choose Microsoft
Video
Security strategy with Microsoft CISO Bret Arsenault
Video
Strengthening cybersecurity internally
Video
Increasing security by thinking like a hacker
Video
How an ex-soldier fights cyberthreats
Report
Magic Quadrant for Enterprise Information Archiving
Report
Identity as a Service (IDaaS) leader
Report
Microsoft positioned as a Leader in Gartner’s Magic Quadrant Endpoint Protection Platforms report
Report
Microsoft positioned as a Leader in Gartner’s Magic Quadrant Unified Endpoint Management Tools report
Showcase
Implementing Zero Trust at Microsoft
Article
Enable strong authentication
There are currently no additional resources.
Additional security resources
Microsoft Trust Center
Learn how we support security, compliance, and privacy in all our cloud products and services.
Microsoft security bulletins
Stay up to date with security vulnerabilities reported by the Microsoft Security Response Center (MSRC).
Security update guide
Read the authoritative source of information on Microsoft security updates.
Malware analysis submission portal
Report malware or files you believe have been incorrectly classified as malware.
Microsoft Security Response Center
Report security issues, bugs, and learn about the latest security fixes from our MSRC blog.
Security development lifecycle
Get guidance, best practices, tools, and processes for security and privacy considerations.