Security, Compliance and Identity Partner Enablement Resource Guide
Security, Compliance and Identity Partner Enablement Resource Guide
David Branscome
Microsoft Cybersecurity Reference Architectures
Choose from our portfolio of Microsoft-funded targeted Build a plan with actionable steps to accelerate
your security journey
workshops to advance the end-to-end security strategy of your
organization
Security Up to $5,000 per workshop Threat protection & Hybrid cloud security
Up to $2,500 per workshop for Microsoft Sentinel Identity Up to $5,000 per workshop
Threat protection workshop • Understand customers’ security goals and objectives. Securing identities • Use Secure Score and application discovery tools to
Creates customer intent for • Identify security threats using a Microsoft 365 E5 trial. workshop help customers gain visibility into their current identity
purchasing and/or deploying • Provide an overview of the Microsoft Security end-to- Helps customers assess the estates.
advanced Microsoft Security end story. maturity of their identity estates. • Work together with your customers to define clear next
products. • Showcase product capabilities through newly designed, steps and the best ways to mitigate risks.
rich demos.
Compliance Up to $5,000 per workshop
Duration
Event Title Date Registration Link
(Hours)
Virtual Modernize Security and Defend Against Threats Register Now – Multiple Dates & Time Zones
Training Days
Protect Data and Manage Risk Varies based on languages Register Now – Multiple Dates & Time Zones
on Security
Security, Compliance, and Identity Fundamentals and time zone. Register Now – Multiple Dates & Time Zones
Zero Trust Register Now – Multiple Dates & Time Zones
Partner Events
Duration
Event Title Date Registration Link
Partner (Hours)
Webinars Unboxing Defender for Business – a Deeper Look at Capabilities,
1 5 May Register now, 9:00AM PT
with Demo and Q&A
Duration
Sales Play and Event Title Date Registration Link
(Hours)
Product Deep
Dives Coming soon
http://aka.ms/enablevts https://aka.ms/trainingcenter
Partner Events
Attend the following security events created for partners
Duration
Event Title Date Registration Link
(Hours)
Cloud Week
Security Cloud Week for Partners Varies May 2022 Registration link available soon!
Duration
Event Title Date Registration Link
(Hours)
Microsoft Security, Compliance, and Identity Fundamentals (SC-
8 - Watch On-Demand
900)
Virtual
Microsoft Security Operations Analyst (SC-200) 10 - Watch On-Demand
Training Series
on Exams Microsoft Identity & Access Administrator (SC-300) 8 - Watch On-Demand
http://aka.ms/enablevts https://aka.ms/trainingcenter
Certifications and
exams
Showcase your achievements and
skills
Security, Compliance, Identity Certifications and Exams This page lists the certifications
and exams that are
recommended for partners
looking to build and extend
their Microsoft security,
compliance, and identity
Fundamental Certifications Associate Certifications practices.
Cloud
Compliance
Security
Every security professional aspires to be an expert when it comes to creating the
best end-to-end security environment—from identity and access management, to
threat protection, to cloud security, to compliance. But getting there takes education
and experience.
Overview Azure Active Directory (AD) Microsoft Endpoint Manager Azure Active Directory (AD)
Fundamentals of Microsoft 365 Identity and Access Management Deep Dive < Managing Microsoft 365 Mobility and Security < App Proxy—Integrated Windows
Security + Compliance < Protection Identity and Access < Manage Devices by Using Microsoft Intune < Authentication ◉
Intro to Security in Microsoft 365 < Azure AD Secure Hybrid Access with F5 ◉
Manage Identities and Governance < Manage Apps by Using Microsoft Intune <
Manage Security with Microsoft 365 < Enable B2B Collaboration in Azure AD ◉
Enable a Combined MFA and SSPR Registration
Microsoft 365 Identity and Services < Zero Trust
Experience in Azure AD ◉ Migrate to Cloud Authentication Using
Configuration and Management4 Resource Center Staged Rollout in Azure AD ◉
Zero Trust
Manage and Integrate Apps Securely4 Enable Header-Based Authentication to
Principals and Overview On-Premises Applications with Azure
Secure Remote Work4 AD Application Proxy ◉
Azure Active Directory (AD) Enable Integrated Windows Authentication
Manage Identity and Access in Azure AD < to On-Premises Applications with Azure Microsoft Endpoint Manager
AD Application Proxy ◉ Manage Devices with Microsoft
Azure AD Authentication Fundamentals4
Configure Conditional Access in Azure AD ◉ Endpoint Manager ◉
Finding the Right Identity Strategy for Your
Manage Guest User Access in Azure AD Manage Apps with Microsoft
Organization with Azure AD4
for B2B Collaboration ◉ Endpoint Manager ◉
Microsoft Endpoint Manager Integrate SaaS Applications with Azure AD ◉
Microsoft Endpoint Manager Fundamentals <
• Coming soon
Security Community Technical Webinars,
Stay updated
• Advises on improvements
Security Community Technical Webinars, to threat protection
SC-200 part 6: Connect logs to Microsoft
Stay updated practices.
Sentinel
MS Learn
• Refers violations of
organizational policies to
appropriate stakeholders.
SC-200 part 7: Create detections and
perform investigations using Microsoft
Relevant partner roles:
Sentinel
MS Learn
• SOC analyst
Overview Microsoft 365 Defender Microsoft Defender for Identity Microsoft Sentinel
Fundamental Knowledge of Microsoft 365 Microsoft Defender: Extended Detection Identify Attacks ◉ Microsoft Sentinel Ninja Training
Security and Compliance Capabilities < and Response (XDR)4 Investigate Attacks ◉ Detect Unknown Threats with User
Intro to Security in Microsoft 365 < Threat Protection Technical Deep-Dive < and Entity Behavior Analytics
Manage Security with Microsoft 365 < Defend Against Threats with Microsoft Threat Protection < Microsoft Defender For Endpoint
Investigate and Remediate Threats ◉ Microsoft Defender
Azure Security Fundamentals < Protect Your Organization with Microsoft 365 Defender ◉
Threat Vulnerability Management ◉ Improve SecOps with Microsoft Sentinel,
Stop Attacks & Reduce Operations Workloads by 50%
SIEM + XDR Cloud-Native SIEM
Microsoft Defender for Endpoint Ninja Training
SIEM + XDR Announcement Azure Security Center Web Shell Attack Deep Dive
Azure Security Center < Microsoft Defender for Office 365
Microsoft Defender Microsoft 365 Defender
How to Effectively Perform an Azure Security Center PoC < Microsoft Defender for Office 365 <
Intro to Threat Protection with Microsoft 365 < Microsoft 365 Defender Ninja Training
Protect Your Hybrid Cloud with Azure Security Center ◉ Safeguard Your Organization with
Azure Defender Overview Microsoft Defender for Office 365 ◉ Best Practices for Hunting Across Domains
Resolve Threats with Azure Security Center <
Microsoft Sentinel Design a Holistic Monitoring Strategy on Azure Microsoft Sentinel Azure Security Center
Deploy Microsoft Sentinel and Connect Data Sources < Implement Virtual Machine Host Security in Azure < Modernize Your SOC with Microsoft Sentinel ◉ Azure Security Center Ninja Training
Introduction to Microsoft Sentinel < Improve Your Cloud Security Posture with Deploy Microsoft Sentinel and Connect
Azure Security Center < Microsoft Defender for Endpoint
Microsoft Sentinel Overview Data Sources <
Microsoft Defender for Endpoint
Microsoft Sentinel Video Overview Implement Windows Server Hybrid Cloud Ninja Training
Management, Monitoring, and Security <
Deploy Microsoft Sentinel and Connect Data Sources <
Improve SecOps with Microsoft Sentinel, Microsoft Cloud App Security
Top 10 Best Practices for Azure Security 4 Your Cloud-Native SIEM Microsoft Cloud App Security Ninja
Microsoft Defender for Cloud Training
Microsoft Cloud App Security
Azure Security Center Overview Configure Microsoft Cloud App Security for
Detect Threats and Protect Information in Advanced Scenarios <
Identify Security Threats with Azure Security Center < Cloud Apps Using Microsoft Cloud App
Protect Against Security Threats on Azure < Security <
Detect Threats & Manage Alerts ◉
Microsoft Defender for Cloud Apps
Discover, Protect, and Control Apps ◉
Secure Cloud Apps Using Microsoft Cloud App Security <
Safeguard Multi-cloud Apps and Resources
Discover and Manage Cloud App Usage with Microsoft Cloud App Security ◉ with Cloud Security Solutions <
Protect and Control Information with Microsoft Cloud App Security ◉
Automate Alerts Management with Microsoft Power Automate and Cloud App Security ◉
Security certifications: SC-900, SC-200
Information Protection & Governance Learning Journey Targeted for those who plan
and implement controls
that meet organizational
compliance needs.
• Compliance teams
• Data security teams
• Cloud architects
• Implementation
Complete exam study & Complete exam study & consultants
get certified! get certified!
Microsoft 365 Compliance Information Protection and Governance Discover & Respond Compliance Ecosystem
Be a Risk Management Hero4 Information Protection and Governance4 Advanced eDiscovery and Advanced Audit < Security and Compliance4
Supercharge Information Protection Protect Sensitive Data with Microsoft Discover & Respond4
and Governance4 Information Protection ◉ Conduct Forensic Investigations with eDiscovery
Don’t Lose Sleep Over Insider Risks4 Information Protection & Governance < Advanced Audit in Microsoft 365 ◉ Become a Microsoft 365 Advanced
eDiscovery Ninja
Simplify and Extend Compliance
Beyond Microsoft 3654 Insider Risk Management Compliance Management
Manage Internal Risk in Microsoft 365 < Reduce Risk with Microsoft Purview Compliance Microsoft Purview Information Protection
Safeguard Customer Data Manager < Ninja
Minimize Internal Risks ◉
Simplify Compliance and Reduce Risks4 MIP Ninja
Learn How Microsoft Safeguards Insider Risk Management4
Customer Data <
Minimize Communication Risks ◉ Microsoft Defender for Cloud Apps Ninja
Priva API and Integration
Implement Privileged Access Management ◉ Course
Microsoft Priva (Privacy Privacy Integration Blog Cloud Apps Ninja
Management) Graph API Integration with Subject Rights request
General Availability Announcement Compliance Manager Ninja course
Introducing Privacy Management for Compliance Manager Ninja
Microsoft 365
Microsoft Mechanics Video M365 Compliance One-Stop-Shop (OSS)
Self-guided site
Priva Management for Microsoft 365
Product Page
Priva Trial Playbook Insider risk
Insider Risk Management Ninja
Communications
Communication Compliance Ninja
Methodology Introduce the value of Microsoft 365, Assess customers IT estate by using Assess customers identity security posture
highlighting scenarios to enable work from Microsoft Endpoint Manager, Intune, using Secure Score and application
anywhere securely, including Microsoft Azure AD, Autopilot, and Endpoint discovery assessments. Provide
Teams, securing mobile access, analytics. Provide recommendations on recommendations to mitigate risk.
foundational identity, and security. the best way to manage endpoints.
Outcome Create intent for purchasing and deploying Create intent for moving from Office 365 to Create intent to migrate from AD FS* to
Microsoft 365 E3. Microsoft 365. managed identities, from third-party
Identity provider to Azure AD* and
migrating application identity to Azure AD*
Customer Customers without Office 365 or Microsoft 1000+ Exchange Online PAU* 800+ AADP PAU*
eligibility 365 AND >300 PCIB* 20%+ Teams usage 5%+ AADP usage
Customers on Office 365 with: 20%+ Exchange Online usage
1000+ Exchange Online paid available <40% Intune usage
units (PAU)*
<20% Teams usage
Funding Up to $5,000 per workshop Up to $5,000 per workshop Up to $5,000 per workshop
Methodology Discover threats in a customer’s M365 Discover threats in a customer’s M365 Discover threats and vulnerabilities in a
cloud environment by using the Threat cloud environment by using Microsoft customer’s Azure, hybrid, and multi-cloud
Check license, and provide Sentinel and Threat Check license, and environment. Provide recommendations to
recommendations to mitigate threat. provide recommendations to mitigate mitigate.
threat.
Outcome Create intent for purchasing and deploying Create intent for purchasing and deploying Create intent for purchasing and deploying
M365 E5 Security. Microsoft Sentinel. Azure Defender and Network Security
products.
Customer 800+ AADP PAUs* 800+ AADP* paid available units (PAU*) Annual Azure consumption for servers,
eligibility 250+ monthly active units (MAU) for EXO, 250+ MAU* for EXO*, SPO*, or Teams SQL, and storage must be >$150,000 USD.
SPO, or Teams Azure Defender consumption is <4% of
total Azure consumption.
Funding Up to $5,000 per workshop Up to $2,500 per workshop Up to $5,000 per workshop
Objective Discover sensitive data in the customers environment using Discover insider risk in a customer’s data by using the Data Risk
the Data Risk Check License, and provide recommendations Check license, and provide recommendations to mitigate risk.
to mitigate risk.
Outcome Create intent for purchasing and deploying E5 Compliance. Create intent for purchasing and deploying E5 Compliance.
Customer 800+ AADP* paid available units (PAU*) 800+ AADP paid available units (PAU*)
eligibility 250+ monthly active units (MAU*) for EXO*, SPO*, or Teams 250+ monthly active units (MAU*) for EXO*, SPO*, or Teams
Microsoft 365 Security, Compliance & Identity SC-900: Microsoft Security, Compliance, Microsoft Security Technical Content Library Microsoft Security on Twitter
Partners Yammer Community and Identity Fundamentals Microsoft Security website Microsoft Azure Active Directory on Twitter
Security, Compliance, and Identity – SC-100: Microsoft Cybersecurity Architect (beta)
Azure website Microsoft Security on LinkedIn
Microsoft Tech Community
SC-200: Microsoft Security Operations Analyst Microsoft Security blog Microsoft Security YouTube channel
SC-300: Microsoft Identity and Access
Security documentation
Administrator
Microsoft Sentinel documentation
SC-400: Microsoft Purview Information
Protection Administrator Microsoft Learn for Security, Compliance,
and Identity
MS-900: Microsoft 365 Fundamentals
MS-500: Microsoft 365 Security Administration
AZ-900: Azure Fundamentals
AZ-500: Microsoft Azure Security Technologies
AZ-700: Designing and Implementing Microsoft
Azure Networking Solutions
Secure Remote Work Practice Development Playbook
https://aka.ms/cloudsecurityplaybook
Change log
Stay updated on changes to this
resource
Change log
Month of May
• Added the Days of the Defenders page
• Added the Microsoft Canada Security page
Week of Mar 18
• Added the Securing the channel: journey to zero trust page.
• Added the Secure All the Things page.
• Added the Security Days page.
Week of Feb 18
• Added the Microsoft Priva page.
• Added the May Security Cloud Week page.
Week of Jan 18:
• Partner Events: added multiple webinars
• Added David Branscome biography page
Week of Dec 16:
• Top News: added Security Cloud Week slide & registration
• Partner Events: added Security Cloud Week registration
Week of Nov 11:
• Partner Events: added Elevate your Customers’ Security with Microsoft Defender for Business
Week of Nov 1:
• Information Protection & Governance Learning Journey: added Microsoft Purview Information Protection Ninja course
Thank you!