ให้คำติชม
ความช่วยเหลือ + การสนับสนุน
รายการที่บันทึกไว้
แผนส่วนตัว
รอสักครู่ กําลังนําคุณเข้าสู่ระบบ...
ตัวกรองล้างทั้งหมด


ผลลัพธ์ บริการให้คำปรึกษา รายการ

กำลังแสดงผลลัพธ์ รายการใน บริการให้คำปรึกษา
Intune Security Reviewmnemonic
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Enhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
1 out of 60
Microsoft 365 CMMC: 4-Wk WorkshopKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Provides expert guidance to help organizations in the Defense Industrial Base achieve CMMC compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
2 out of 60
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, Lda
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Set Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
3 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
4 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
5 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data ProtectionITX360 (Pvt) Ltd.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
6 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
7 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
8 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
9 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
10 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
11 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
12 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
13 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
14 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
15 out of 60
Office 365 Teamwork Security - Managed ServiceCognizant
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
16 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
17 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
18 out of 60
Lightstream Data Security AssessmentLightstream
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
19 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Deploy Microsoft 365 to meet CMMC Requirements
20 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
21 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
22 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
23 out of 60
Microsoft Copilot Readiness AssessmentInviso Corporation
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Get ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
24 out of 60
Endpoint Management with Security WorkshopThe Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
25 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Patriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
26 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
27 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
28 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Strengthen the Security of Your Microsoft 365 Environment.
29 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
30 out of 60
1-Tages KI Praxis Update Workshop (inkl. Copilot): Ihr Kompass durch die Welt der Künstlichen IntelligenzAppSphere AG
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Mit dem KI Praxis Update Workshop statten wir Ihr Team mit dem neuesten Wissen über KI aus. Lernen Sie, wie Sie KI zielgerichtet und profitabel in Ihrer Organisation nutzen können.
31 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-WkENCAMINA S.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
32 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
33 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
34 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
35 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
36 out of 60
Zones SOCaaS - MXDR with Threat ProtectionZones, LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
37 out of 60
Mentoring ServiceMobile Mentor
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Our mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
38 out of 60
Microsoft 365 E5 Cyber Range 2 Week ImplementationKAMIND IT, Inc
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
KAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
39 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
40 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
41 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtiviti
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Effective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
42 out of 60
Managed Support for Microsoft Defender and Endpoint Detection and Response (EDR) ServiceOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A fully managed Microsoft Defender + EDR service designed to protect your organization from today’s most persistent cyber threats.
43 out of 60
Implementation of Microsoft Defender for Cloud AppsCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
44 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
45 out of 60
Managed Security for Compliance: 1 yr Mgd ServiceInsight
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
46 out of 60
Defender for Endpoint Managed Servicee2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
47 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
48 out of 60
Avanade Modern Sec OpsAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
49 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
50 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
51 out of 60
Management Services: 3-month AssessmentQuisitive
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Quisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
52 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Service used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
53 out of 60
Olive + Goose Data Security WorkshopOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance Your Organization’s Security with a Comprehensive Data Security Workshop
54 out of 60
MFA JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
55 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
56 out of 60
Identity as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
57 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
58 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
59 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
At AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
60 out of 60
  • ก่อนหน้า
  • 3
  • 4
  • 5
  • 6
  • 7
  • ถัดไป
มีอะไรใหม่
  • Surface Pro
  • Surface Laptop
  • Microsoft Copilot
  • Microsoft 365
  • สำรวจผลิตภัณฑ์ Microsoft
  • แอป Windows 11
Microsoft Store
  • โพรไฟล์บัญชีผู้ใช้
  • ศูนย์ดาวน์โหลด
  • คืนสินค้า
  • ติดตามการสั่งซื้อ
การศึกษา
  • Microsoft Education
  • อุปกรณ์สำหรับการศึกษา
  • Microsoft Teams สำหรับการศึกษา
  • Microsoft 365 Education
  • Office Education
  • การฝึกอบรมและการพัฒนานักการศึกษา
  • ข้อตกลงสำหรับนักศึกษาและผู้ปกครอง
  • Azure สำหรับนักศึกษา
ธุรกิจ
  • Microsoft Cloud
  • การรักษาความปลอดภัยของ Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
นักพัฒนาและไอที
  • นักพัฒนาของ Microsoft
  • Microsoft Learn
  • รองรับแอปตลาด AI
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
บริษัท
  • ตำแหน่งงาน
  • ข่าวบริษัท
  • สิทธิ์ส่วนบุคคลที่ Microsoft
  • นักลงทุน
  • ความยั่งยืน
ไทย (ไทย) ไอคอนการเลือกไม่รับตัวเลือกความเป็นส่วนตัวของคุณ ตัวเลือกความเป็นส่วนตัวของคุณ ความเป็นส่วนตัวด้านสุขภาพของผู้บริโภค
  • Sitemap
  • ติดต่อเรา
  • คำชี้แจงสิทธิ์ส่วนบุคคล
  • ข้อตกลงการใช้งาน
  • เครื่องหมายการค้า
  • เกี่ยวกับโฆษณาของเรา
  • Manage cookies
  • © Microsoft 2025