Оставить отзыв
Help & support
Сохраненные элементы
Частные планы
Подождите, выполняется вход в систему…
ФильтрыОчистить все

  • Ваше местоположение
  • Продукты (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Управление внедрением и изменениями
      • Звонки в Microsoft Teams
      • Защита облака
      • Консультационные услуги по соответствию требованиям
      • Развертывание устройств и управление ими
      • Сотрудники первой линии
      • Управление идентификацией и доступом
      • Контроль и защита информации
      • Внутренний риск
      • Знания и аналитика
      • Конференц-залы в Microsoft Teams
      • Собрания в Microsoft Teams
      • Microsoft 365 Live Events
      • Управление мобильным устройством
      • Power Platform for Teams
      • Пользовательские решения в Teams
      • Развертывание для совместной работы
      • Защита от угроз
      • Рабочая аналитика
    • Power Platform
  • Отрасли
  • Тип службы

Результаты: Консультационные услуги

Отображение результатов в консультационные услуги.
Просмотреть связанных результата в отраслевые облака.
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
1 out of 60
Data Security and Compliance Services - 4 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
End-to-End Data Security to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
2 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
3 out of 60
Comprehensive Exchange Online Security ConfigurationTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unmatched Security and Compliance for Your Exchange Online Environment
4 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
5 out of 60
Digital Transformation Calls: 1-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Qualified assistance in resolving any issues after migration to the Microsoft 365 cloud services.
6 out of 60
Healthcare & Education Cybersecurity AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
7 out of 60
Implementation of Microsoft Defender for Cloud AppsCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
8 out of 60
Endpoint Management: 3-Day WorkshopApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
9 out of 60
CMMC Compliance: 4 week WorkshopSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The U.S. Department of Defense (DoD) is implementing the Cybersecurity Maturity Model Certification (CMMC) to verify the cybersecurity of its supply chain, our Workshop will help you ensure compliance
10 out of 60
Document Airlift-OneDrive ImplementationSynergy Technical, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
11 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
12 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
13 out of 60
Implementation of Microsoft Defender for Office 365CDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
14 out of 60
Security Assessment: 2 Week AssessmentTallan
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
15 out of 60
Power Apps - 4 Week EngagementSynergy Technical, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
The one thing that can make or break the process is how well the IT integration project goes. M&A transactions have a defined transition services agreement that says how long the new company can use t
16 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
17 out of 60
Managed Services ProviderSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
SkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
18 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
19 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
20 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
21 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
22 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Professional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
23 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
24 out of 60
Company Document Migration to SharePoint Online or Teams: 7-Days Consulting ServiceIT Partner LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Migration of file shares, folders and documents from your file server or a third-party service like Box, Dropbox, or Google Drive to SharePoint Online or Teams.
25 out of 60
Microsoft 365: 2-Week AssessmentApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Establish a clear roadmap and change management plan for your journey to a modern workplace.
26 out of 60
Threat Protection EngagementFIS Managed IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
27 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
28 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
29 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
30 out of 60
Assessment and Roadmap: Microsoft Security (Azure, Microsoft 365, Active Directory, Entra ID) 6-Week EngagementKudelski Security
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
This assessment defines and recommends steps to achieve your desired security state using your existing security solutions and capabilities.
31 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
The goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
32 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
33 out of 60
Threat Protection: 3-Wk POCFPT/Intellinet
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify security threats and begin to respond and mitigate.
34 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
35 out of 60
Copilot Preparedness and Planning WorkshopCDI LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Copilot workshop will prepare your organization to utilize copilot by identifying key scenarios and gaps in current configuration to improve ROI of using Copilot.
36 out of 60
Windows 365 PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
37 out of 60
Modern SecOps Envisioning WorkshopPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This engagement is for security teams and IT leaders seeking to boost threat detection with experience in Microsoft Sentinel and Defender XDR, automating operations and mitigating cyber risks.
38 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Improve your Security Posture with Grant Thornton's Threat Protection Engagement
39 out of 60
Office 365 Security: 1-Day AssessmentNetrix Global
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Security assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
40 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
41 out of 60
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
42 out of 60
Security Foundations Email: Assessment and ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
43 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
44 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
45 out of 60
Exchange Online MigrationDataVox
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Migrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
46 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
47 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
48 out of 60
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
The Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
49 out of 60
Managed Security for Compliance: 1 yr Mgd ServiceInsight
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
50 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Configure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
51 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
52 out of 60
Google Workspace to Microsoft 365 MigrationDataVox
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
DataVox offers migration services for your company from Google Workspace to Microsoft 365
53 out of 60
Microsoft 365 Security: 1-Day BriefingNetrix Global
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
A tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
54 out of 60
Modern IT: 2 Hour AssessmentModern IT
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Identify areas for business process optimization through Modern IT
55 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
56 out of 60
Threat Protection EngagementTierPoint
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
57 out of 60
Foundational Identity AnalysisJourneyTEAM
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Ensure a Secure Foundation for Microsoft Cloud Services using our Foundational Identity Analysis.
58 out of 60
Security Best Practices AssessmentTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
59 out of 60
THInc.Ops Managed ServiceTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Premium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
60 out of 60
  • Назад
  • 8
  • 9
  • 10
  • 11
  • 12
  • Далее
Что нового?
  • Microsoft Copilot
  • Microsoft 365
Microsoft Store
  • Профиль учетной записи
  • Возврат товаров
  • Отслеживание заказа
Для образования
  • Microsoft для образования
  • Устройства для образования
  • Microsoft Teams для образования
  • Microsoft 365 для образования
  • Office для образования
  • Подготовка и профессиональное развитие преподавателей
  • Специальные предложения для учащихся и родителей
  • Azure для учащихся
Для бизнеса
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Разработчики и ИТ
  • Программа Майкрософт для разработчиков
  • Документация
  • Microsoft Learn
  • Сообщество Microsoft Tech
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Компания
  • Вакансии
  • О корпорации Майкрософт
  • Инвесторы
  • Экологическая устойчивость
Русский (Беларусь) Значок отказа для ваших вариантов выбора параметров конфиденциальности Ваши варианты выбора параметров конфиденциальности Конфиденциальность медицинских сведений потребителей
  • Sitemap
  • Контактная информация
  • Конфиденциальность
  • Условия использования
  • Товарные знаки
  • Сведения о рекламе
  • Manage cookies
  • © Microsoft 2025