Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The sequence that you follow is Baseline -> Standard -> Advanced phases, depending on your tenant license configuration.
Each phase includes the appropriate or required sections; Tenant Setup, Identity, Applications, Security and Compliance, and Devices.
| Identity | ||
| Microsoft Entra ID and Entra ID Protection | ||
| Step 1 | Microsoft Entra ID Plan 2 | |
| Step 2 | Microsoft Entra ID Protection | |
| Microsoft Identity Governance | ||
| Step 3 | Microsoft Identity Governance | |
| Microsoft Identity Protection | ||
| Step 4 | Risk-based conditional access (sign-in risk, user risk) | |
| Step 5 | Authentication context (step-up authentication) | |
| Step 6 | Device and application filters for Microsoft Entra Conditional Access | |
| Step 7 | Token Protection | |
| Step 8 | Vulnerabilities and risky accounts | |
| Step 9 | Risk event investigation | |
| Microsoft Insider Risk Management | ||
| Step 10 | Microsoft Risk management | |
| Step 11 | Microsoft privileged access management (PAM) | |
| Applications | ||
| Analytics | ||
| Step 1 | Power BI Pro | |
| Teams (Meetings, calling, and chat) | ||
| Step 1 | Teams Audio Conferencing | |
| Step 2 | Teams Phone Standard | |
| Security | ||
| Step 1 | Microsoft Defender for Microsoft 365 Plan 2 | |
| Step 2 | Microsoft Defender for Cloud Apps | |
| Step 3 | Data Lifecycle Management | |
| Step 4 | eDiscovery and Audit | |
| Step 5 | Information Protection |