Desbloqueie o poder do pensamento compartilhado: crie em conjunto, fique por dentro das novidades e mantenha a sincronia com os colegas de equipe. Faça mais onde você estiver com os componentes do ...
Meet multicloud compliance requirements across global, industrial, or regional regulations and standards with help from Compliance Manager. Choose from over 320 ready-to-use and customizable ...
Determine the scope of compromise, and access audit logs to support investigations. Create customized audit log retention policies to retain audit records based on the service where the audited ...
Get incident-level visibility across the cyberattack chain with Microsoft Defender XDR (formerly Microsoft 365 Defender). Take your SOC team to the next level with automatic disruption of advanced ...
Explore your options for Windows Server and SQL Server end of support and how to stay protected and compliant with Microsoft. Stay covered with three additional years of Extended Security Updates.
اربح مكافآت مع Microsoft. فقط من خلال القيام بما تحب القيام به. سجّل الدخول إلى حسابك على Microsoft أو أنشئ حسابًا على Microsoft واحصل على نقاط لبطاقات ...
لوحة التعاون المرئية في Microsoft 365 للعمل المرن والتعلم. اختر من بين أكثر من 60 نموذجاً مجانياً لمساعدتك في بدء الاستخدام بشكل أسرع، وإنشاء تدفق ...
Continuously improve employee engagement and business performance with next-generation AI and insights. Microsoft Viva brings together the tools and applications your business needs for communication, ...
Opprett et øyeblikkelig møte fra en Teams-chat eller planlegg et møte med Teams-kalenderen din. Kan jeg bli med i et Teams-møte uten et Teams-abonnement? Ja, med Teams kan du bli med i møter fra ...
イマーシブ リーダーはどこで利用できますか? Windows 10 または Windows 11 の Microsoft Edge でイマーシブ リーダーを体験してください。 イマーシブ リーダーでページの特定の選択を開くにはどう ...
The Controller Bar and XBOX Game Pass widget make it easier to play. Windows 11 is the most secure version of Windows yet. It's important for security to be invisible so you can focus on using your PC ...
EDR is a cybersecurity technology that continuously monitors endpoints for evidence of threats and performs automatic actions to help mitigate them. Endpoints—the many physical devices connected to a ...