Multi‑factor authentication
Password manager
M365 identity detection
Monitoring & patching
Endpoint protection
Vulnerability management