

Device management
Device management allows organizations to secure, and maintain devices like virtual machines, earn the latest in device management and how solutions like Microsoft Intune and Microsoft Entra help keep devices secure, up to date, and compliant.
Refine results
Topic
Products and services
Publish date
-
To get updates for Windows and other Microsoft programs at the same time, including updates for Microsoft Office (Word, Outlook, Excel, PowerPoint, and more), go to the Microsoft Update website.
-
Beginner’s Guide to BYOD (Bring Your Own Device)
The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding. -
How to sign into devices that don’t accept security codes
Two-step verification makes it more difficult for hackers to access your account, even when they have your password. -
What is a trusted device?
When you try to view or edit your credit card details or other sensitive information in your Microsoft account, you might need to enter a security code first, to make sure that only you can get in to your account. -
The four necessities of modern IT security
As companies embrace the cloud and mobile computing to connect with their customers and optimize their operations, they take on new risks. -
Enable your users to work securely from anywhere, anytime, across all of their devices
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. -
What’s new in Windows Defender ATP
We added new capabilities to each of the pillars of Windows Defender ATP’s unified endpoint protection platform: improved attack surface reduction, better-than-ever next-gen protection, more powerful post-breach detection and response, enhanced automation capabilities, more security insights, and expanded threat hunting. -
Windows Defender ATP has protections for USB and removable devices
We recommend a layered approach for device control security, which incorporates multiple avenues of protection, including each of the above. -
Step 5. Set up mobile device management: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Introducing the security configuration framework: A prioritized guide to hardening Windows 10
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. -
Announcing the all new Attack Surface Analyzer 2.0
Attack Surface Analyzer 2.0 can help you identify security risks introduced when installing software on Windows, Linux, or macOS by analyzing changes to the file system, registry, network ports, system certificates, and more. -
Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update
With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control.