Skip to content

Latest commit

 

History

History
60 lines (47 loc) · 4.39 KB

m365bp-overview.md

File metadata and controls

60 lines (47 loc) · 4.39 KB
title f1.keywords ms.author author manager ms.reviewer ms.audience ms.topic ms.service ms.date ms.localizationpriority ms.collection ms.custom search.appverid description
Microsoft 365 Business Premium overview
NOCSH
chrisda
chrisda
deniseb
nehabha
Admin
overview
microsoft-365-business-security
05/31/2024
medium
M365-Campaigns
m365solution-overview
m365solution-smb
highpri
m365-security
tier2
essentials-overview
essentials-get-started
MiniMaven
intro-overview
BCS160
MET150
Learn how to implement cybersecurity for small or medium sized businesses with Microsoft 365 Business Premium. The cybersecurity capabilities and features are optimized to prevent cyberattacks and security breaches, and help safeguard data, devices and information with high-grade cyber defenses.

Microsoft 365 Business Premium – productivity and cybersecurity for small business

Microsoft 365 Business Premium—with its world class productivity and cybersecurity capabilities—is a wise choice for small and medium-sized businesses. Designed for small and medium-sized businesses (up to 300 users), Microsoft 365 Business Premium helps safeguard your data, devices, and information.

You are your organization's first and best defense against hackers and cyberattackers, including random individuals, organized crime, or highly sophisticated nation states. The task before you is this: let Microsoft 365 Business Premium help secure your organization's future! Approach this task by taking on the following six goals:

:::image type="content" source="media/sixmissions.png" alt-text="Diagram listing your six goals." lightbox="media/sixmissions.png":::

What to do How to do it
Fortify your environment
(Tasks your admin completes.)
1. Sign in and set up your environment. Complete the basic setup process for Microsoft 365 Business Premium (or Microsoft 365 for Campaigns). Add users, assign licenses, and configure your domain to work with Microsoft 365. Get a quick setup guide to share with employees.

2. Configure your security protection. Set up critical front-line security measures to prevent cyberattacks. Set up multi-factor authentication (MFA), protect your admin accounts, and protect against malware and other threats. Get an overview of how to secure unmanaged and managed devices, and set up your information protection capabilities.
Train your team.
(Tasks everyone does.)
3. Set up unmanaged (BYOD) devices. Set up all the unmanaged ("bring your own device," also referred to as BYOD) devices so they're used more safely as part of your ecosystem.

4. Use email securely. Know what to watch for in your email, and train everyone on the necessary steps to protect yourself and others from attacks.

5. Collaborate and share securely. Share files with others and collaborate more securely by using Microsoft Teams, SharePoint, and OneDrive.
Safeguard managed devices.
(Tasks your admin or security team does.)
6. Set up and secure managed devices. Enroll and secure computers, tablets, and phones so they can be protected from threats.

Completing all six goals is the most effective way to thwart hackers, protect against ransomware, and help ensure your organization's future is safeguarded with the best cybersecurity defenses.

Let's get started!

Cybersecurity playbook

The guidance in these goals is based upon the Zero Trust security model, and is summarized in a downloadable Cybersecurity playbook.

:::image type="content" source="media/m365bp-cyber-security-playbook.png" alt-text="Cybersecurity playbook. Download this guide.":::

Next steps

Proceed to Sign in and set up Microsoft 365 Business Premium.

See What's new in Microsoft 365 Business Premium and Microsoft Defender for Business