Fornecer comentarios
Help & support
Elementos gardados
Plans privados
Agarde un momento, estamos iniciando a sesión...
FiltrosBorrar todo

  • A súa localización
  • Produtos (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Xestión de modificacións e adopcións
      • Chamada a Microsoft Teams
      • Seguranza na nube
      • Servizos de consultoría de cumprimento
      • Xestión e despregamento de dispositivos
      • Traballadores de primeira liña
      • Xestión de acceso e identidades
      • Protección da información e regulación
      • Risco interno
      • Información e conclusións
      • Salas de reunións para Microsoft Teams
      • Reunións para Microsoft Teams
      • Microsoft 365 Live Events
      • Xestión de dispositivos móbiles
      • Power Platform for Teams
      • Solucións personalizadas para equipos
      • Despregamento do traballo en equipo
      • Protección contra ameazas
      • Workplace Analytics
    • Power Platform
  • Sectores
  • Tipo de servizo

Servizos de consultoría resultados

Mostrando resultados de servizos de consultoría.
Ver resultados relacionados en nubes sectoriais.
Threat Protection EngagementISA Cybersecurity Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
1 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
2 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
3 out of 60
Secure Productive Workplace: Implement 4-WkNetsurit
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
4 out of 60
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
5 out of 60
Identity WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
6 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Strengthen the Security of Your Microsoft 365 Environment.
7 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
8 out of 60
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
9 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
10 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
11 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
12 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
13 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - Dev
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
14 out of 60
Microsoft 365 Security WorkshopCollective Insights
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Equip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
15 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
16 out of 60
discover-sensitive-data-workshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
17 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
18 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
19 out of 60
Implementation of Microsoft Defender for EndpointCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
20 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
21 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
22 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
23 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
24 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
25 out of 60
MXDR ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
26 out of 60
Microsoft Defender XDR AcceleratorAkins IT
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
We empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation.
27 out of 60
1-Day Security & Identity WorkshopConvergeOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
28 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
29 out of 60
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
30 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
31 out of 60
Copilot Security & Governance Assessment for Microsoft 365Blue Cycle LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Assess and secure your Microsoft 365 tenant for safe, scalable Copilot deployment
32 out of 60
Microsoft Defender XDR AcceleratorThe Partner Masters
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
We empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
33 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Multi-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
34 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
35 out of 60
Security Foundations IdentityProServeIT
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
36 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Service used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
37 out of 60
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud Consultants
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
38 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
39 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
40 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Learn how to put next generation Microsoft security tools to work for you.
41 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
42 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
43 out of 60
Modern SecOps Envisioning WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
As IT becomes more strategic, the importance of security grows daily. Security information and event management (SIEM) solutions built for yesterday’s environments struggle to keep pace.
44 out of 60
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Audit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
45 out of 60
Implementation of Microsoft Defender for Cloud AppsCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
46 out of 60
Security Assessment: 2 Week AssessmentTallan
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
47 out of 60
Security Foundations Data: Assessment and ImplementationProServeIT
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Data security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
48 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Additional protection for organizations experiencing problems with emails.
49 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
50 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
51 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
52 out of 60
Implementation of Microsoft Defender for Office 365CDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
53 out of 60
C1st Implementation of Microsoft Defender for EndpointC1st Technologies LLC
+2
Applicable to:
m365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The C1st Microsoft Defender for Endpoint Implementation enhances security by deploying advanced threat protection across all endpoints, configuring licenses, setting up connections, and assigning role
54 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
55 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
56 out of 60
Workshop for Microsoft 365 Threat ProtectionCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
57 out of 60
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Learn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
58 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical Start
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapidly identify, contain, and remediate a breach.
59 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
60 out of 60
  • Anterior
  • 5
  • 6
  • 7
  • 8
  • 9
  • Seguinte
Novidades
  • Microsoft Copilot
  • Microsoft 365
  • Windows 11 apps
Almacenamento e asistencia técnica
  • Centro de descargas
Education
  • Microsoft en educación
  • Dispositivos para educación
  • Microsoft Teams for Education
  • Microsoft 365 Education
  • Office Education
  • Formación e desenvolvemento de educadores
  • Ofertas para estudantes e pais
  • Azure para estudantes
Negocio
  • Microsoft Cloud
  • Seguranza de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Programador e TI
  • Programador de Microsoft
  • Documentación
  • Microsoft Learn
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Empresa
  • Profesións
  • Acerca de Microsoft
  • Noticias da empresa
  • Privacidade en Microsoft
  • Investidores
  • Accesibilidade
  • Sostibilidade
Galego (galego) Icona de rexeitamento das opcións de privacidade A súas opcións de privacidade Privacidade da saúde do consumidor
  • Sitemap
  • Contact Us
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • About our ads
  • Manage cookies
  • © Microsoft 2025