How we help

What we do

Explore

Written by Robin Dadswell, Principal Consultant 

When I’m talking to customers one subject is coming up repeatedly. Microsoft Sentinel – and there’s a lot of confusion. Is it being retired? Is it being absorbed into Defender? Do we need new licenses? I want to explain what’s happening, when, and what it means for you.  

But before we get into the detail let’s start with some clarity. Microsoft Sentinel is not being retired. Its Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities remain fully supported. What is changing is where and how it is managed: Sentinel is moving from the Azure portal into the Microsoft Defender portal as part of Microsoft’s broader ‘unified security operations’ strategy. 

For IT teams, SOC analysts, architects and governance leads, here’s what that means both operationally and technically. 

Microsoft Sentinel and Defender: in a nutshell

First a quick explanation – please skip ahead to What is and isn’t changing if you’re already familiar with Sentinel and Defender.  

Microsoft Defender is Microsoft’s broad threat protection platform. It’s a family of products with each focusing on different aspects of your environment. Such as Defender for Endpoint (laptops, servers), Identity (Active Directory), Cloud (cloud workloads), Office 365 (email and collaboration), and Cloud Apps (SaaS).  

Defender sits close to the asset and actively flags or blocks threats. It’s protective and preventative.  

Whereas Microsoft Sentinel is a Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platform. It works across your environment taking data from Microsoft Defender, firewalls, identity providers, third-party security tools, and cloud platforms (e.g. Azure, and AWS). It collects security logs, correlates signals, detects suspicious patterns, generates incidents for investigation, and automates response workflows.  

What is and isn’t changing in the Sentinel move 

The major change is the management experience. Sentinel will be exclusively managed through the Microsoft Defender portal – with the Azure Portal being retired.  

The aim is to provide a unified security operations experience with a single pane of glass for both SIEM and Extended Detection and Response (XDR). It ensures a consistent user interface for SIEM and XDR with native, cross domain, correlation of incident timeline and evidence.    

What is NOT changing:    

  • Sentinel’s core SIEM functionality remains 
  • Azure Log Analytics will remain the underlying data platform 
  • KQL (Kusto Query Language) analytics rules continue to operate 
  • Sentinel and Defender Access Controls 
  • Automation playbooks continue to function 
  • Sentinel licensing remains separate from Defender (see later). 

Timelines 

  • New Sentinel workspaces are already, automatically onboarded to the Defender portal 
  • July 2026 (a date you may have heard) was the target date for retiring the Azure portal  
  • 31 March 2027 is the extended deadline for when Sentinel will cease to be supported in the Azure portal. 

What IS changing  

Underneath the surface there are some noteworthy changes affecting correlation, alert logic, and data schemas. Let’s look at each of these in a bit more detail.  

Correlation is more cohesive 
Historically, Sentinel has relied on KQL-driven analytics rules, scheduled queries and Fusion detection. Whereas Defender performed its own correlation within Microsoft 365 security.   

In the unified Defender portal alerts from Sentinel and Defender XDR both feed into a shared incident model. Sentinel’s legacy Fusion engine is disabled as part of the move to the Defender Portal at which point correlation is processed via the Defender XDR logic, this unifies incident creation in the same manner as other Defender Alerts enabling a single logic flow for all alert generations.  

What does not change: 

  • Custom KQL detections will still run 
  • Log-based analytics will remain intact 
  • Workspace-level data architecture remains. 

What does change: 

  • Incident grouping logic is expected to evolve 
  • Alerts may appear more consolidated 
  • Multi-signal correlation becomes more tightly integrated. 

For most, this will be an enhancement. But you should check alert tuning and correlation during transition.  

Unified dynamic alerts and incidents

Previously Defender products generated alerts, which Sentinel grouped into incidents. Now, Defender XDR generates the incidents with Sentinel analytics alerts feeding into the same incident – and correlation can occur before an analyst sees the case. 

In practice, this could mean that incidents are differently grouped, that alert-to-incident mapping shifts, and that there’s less noise with better cross-product stitching. 

While these aren’t disruptive changes, it’s worth making some checks after transition:   

  • Validate incident population behaviour 
  • Confirm escalation workflows still align 
  • Review automation triggers. 

Table and data schema: evolution, not revolution

For table and data schema it’s more a case of incremental alignment, than structural change.  

Rest assured that Sentinel’s data backbone remains Azure Log Analytics. Neither are tables, custom logs, and KQL queries disappearing. But Microsoft is gradually harmonising schemas between Sentinel log tables, Defender Advanced Hunting, and unified incident entities. This may produce greater normalisation of entity mapping, reduced duplication across alert tables, and closer alignment between hunting queries and SIEM queries.  

So, things may not be exactly as you expect. Pay close attention to what is happening and validate schema references during the transition. 

Why is Microsoft doing this? 

The move reflects what’s happening across the industry, with security vendors consolidating SIEM and XDR into unified SecOps platforms. 

Effective threat detection is increasingly reliant on visibility of identity signals, endpoint telemetry, cloud workloads, email, network logs, and behavioural analytics. 

Microsoft is aligning its security offerings to provide:  

  • One portal  
  • One incident queue 
  • Integrated correlation and  
  • Shared investigation workflows.  

Strategically, it strengthens Microsoft’s position as a full-spectrum security provider, enabling organisations to utilise a single pane of glass for SecOps activities. 

Licensing is still separate 

One of the biggest misconceptions is that Sentinel is being folded into a new Defender licence. This is not the case: 

  • Sentinel’s (ingestion-based) licensing remains separate  
  • Defender licensing remains separate  
  • Portal consolidation does NOT mean licence consolidation. 

However, some threat intelligence features are being folded into Defender so it’s worth reviewing licensing, especially for those with Microsoft E5/A5 subscriptions.   

What you need to do to migrate Sentinel 

While this isn’t an emergency migration, it would be foolish to do nothing – these are changes that need managing properly.  

Recommended actions: 

  1. Plan to transition in good time 
  1. Check your licensing (especially if on a E5/A5 subscription) 
  1. Review RBAC alignment between Azure and Defender 
  1. Test incident grouping behaviour in the unified portal 
  1. Validate custom KQL queries and workbooks 
  1. Update documentation and runbooks. 

Handled correctly, you can have a smooth transition.   

Consider also, whether this is an opportunity to formally review your configuration and settings against best practice. 

In short 

Sentinel isn’t disappearing and Defender isn’t ‘taking over’ – Microsoft is unifying its security stack.  

If you’re already invested in Microsoft security this is an evolution that will improve future operations. For others, it reflects both the SIEM market’s consolidation around broader security platforms and Microsoft’s commitment to remaining relevant to your SecOps needs.  

Find out how Cloud Direct can help you optimise Defender and Sentinel with a security assessment. Request a call with me through the form below. 

Every year, Microsoft retires a new wave of products as it accelerates its cloud-first and AI-powered roadmap. For IT leaders, these changes can directly impact security, budget planning, operational continuity, and the ability to adopt the latest Microsoft innovations. 

2026, in particular, is a year of major inflection points. Several widely deployed Microsoft platforms move into final support phases or are superseded by modern cloud equivalents. At the same time, Microsoft is combining parts of its security ecosystem. Most notably unifying Sentinel (SIEM) and Defender XDR–led operations under a single operational model. 

This guide highlights the key product changes coming in 2026, so that you can prepare for how these may affect your organisation.  

Why Microsoft End of Life in 2026 Matters for IT Leaders

End of Support isn’t just a date in a spreadsheet. It has real-world implications:

1. An increase in security risk 

Unsupported systems become immediate targets for attackers. No patches, no fixes mean just vulnerabilities waiting to be exploited. In today’s landscape, this is no longer acceptable risk; it is a board level issue. 

2. Blockers to modernisation and AI adoption 

Legacy operating systems and server platforms cannot support Microsoft’s modern technologies such as AI services like Copilot. Staying on outdated systems means you cannot use the capabilities Microsoft is investing in the most. Therefore, limiting the innovation of your organisation. 

3. Rising operational cost and technical debt 

Legacy infrastructure becomes increasingly expensive to maintain, whether due to bolt on security solutions, extended support costs, or complex workarounds needed to keep ageing apps running. 

2026’s Most Impactful End of Support Milestones 

Mark your calendars. These are the product changes you need to know. 

Windows 10 

Deadline: 2026 marks the end of Year 1 ESU 

While the primary Windows 10 end of support (EOS) date landed in 2025, many organisations will rely on Extended Security Updates (ESUs) through 2026. Crucially, 2026 is Year 1 of ESU, which is the lowest cost year before fees escalate significantly. 

Remaining on Windows 10 means organisations shoulder increasing risk and cost. It also limits access to new capabilities delivered only on Windows 11, including Copilot and Intune management features. 

For IT leaders, 2026 is the final window to: 

  • Complete fleet migration to Windows 11 
  • Retire non-compliant hardware 
  • Evaluate Windows 365 for legacy application continuity 
  • Refresh endpoint standards and Zero Trust policy enforcement 

Windows Server 2016 

Deadline: EOS 12 January 2027. 2026 is the final full year to migrate 

Windows Server 2016 moves into its last full year of support in 2026, ahead of its hard EOS on January 12, 2027. Despite its age, it remains heavily deployed across midmarket and enterprise environments, often underpinning identity, file services, and key business applications. 

Outdated servers introduce material risk into the environment. Particularly when used for Domain Controllers or critical application workloads. As a result, 2026 becomes the decisive year for planning and executing migrations. 

Recommended priorities include: 

  • Assessing which workloads can be rehosted or modernised in Azure 
  • Upgrading or redesigning domain controller architecture 
  • Planning dependency remediation for older line of business apps  

SQL Server 2016 

Deadline: EOL on July 14, 2026 

SQL Server 2016 remains common across operational reporting systems, ERP backends, and custom applications. Its hard deadline of 14 July 2026 means organisations must accelerate planning now, particularly where refactoring or cloud migration is required. 

Migrating from SQL 2016 opens the door to: 

  • Azure SQL Managed Instance 
  • Azure SQL Database PaaS 
  • SQL Server 2022 (for on-prem regulatory or isolation requirements) 
  • A more modern data platform aligned to Azure, Fabric, and AI initiatives 

SharePoint Server 2016 

Deadline: EOL on July 14, 2026 

On premises SharePoint is still widely used in organisations with complex intranet structures, document retention requirements, or customised workflows. These organisations face rising operational risk if they are not quick to react. 

Migrating to Microsoft 365 brings significant benefits. Including more secure collaboration, modern intranet capabilities via Viva Connections, Power Platform based workflow automation, and reduced infrastructure overhead. 

Office LTSC 2021 

Deadline: EOL on October 13, 2026 

This is important for organisations that deliberately avoided cloud subscriptions. Office LTSC 2021 was often purchased as the “safe”, perpetual alternative to Microsoft 365. But its end of support on 13 October 2026 forces a strategic decision: 

  • Move to Microsoft 365 Apps for Enterprise 
  • Or accept major compatibility, security, and integration limitations 

More importantly, Office LTSC will not benefit from the rapid innovation cycle. Meaning your organisation will miss out on the latest AI and collaboration offerings that are central to Microsoft’s ecosystem. 

Security Modernisation: Sentinel to Defender Portal Consolidation 

This isn’t a product retirement, but it is a major operational shift. 

New sunset date: 31 March 2027 

Microsoft has extended the retirement date of the classic Log Analytics based Sentinel portal in favour of the unified Defender security portal, from 1 July 2026 to 31 March 2027. This allows customers to additional time to seamlessly migrate.  

This change means: 

  • Investigation, hunting, and response become Defender centric 
  • Sentinel continues as a SIEM, but its UI moves into Defender 
  • SOC teams must retrain on new workflows 
  • Tooling consolidation may reduce duplicated platforms 

This aligns with Microsoft’s broader strategy: unified SIEM and XDR experiences under Defender, reducing complexity and improving correlation across identity, endpoint, network, and cloud workloads. 

Conclusion: 2026 Is the Year to Reduce Risk and Remove Roadblocks 

The Microsoft products hitting end of support, or undergoing major strategic repositioning in 2026 represent some of the most widely deployed technologies in corporate IT. 

Addressing them means reducing security risk, unlocking AI capabilities, and freeing your organisation from legacy technical debt. 

Acting on these changes in 2026 will set the foundation for a more innovative future for your organisation.  

Not sure where to begin? Reach out to one of our experts using the form below. Tell us the technology you are concerned about and we will be in touch to discuss a solution right for you.

Introduction 

End users are now the last line of defence for protecting your IT infrastructure.  

Are you confident they have the tools and knowledge to successfully keep attackers out?

Identity attacks have continued to rise using tactics such as password spray to gain unauthorised access. With over 99% of unauthorised access attempts being blocked by Multi-Factor Authentication. It is crucial employees are equipped with the right tools to protect your organisation.

Increasing hybrid and remote employees makes the need for robust, intuitive security solutions more critical than ever. Microsoft Defender, supports organisations by offering layered protection, integrated intelligence, and a user-focused approach to security. Defender empowers organisations to protect against major attack vectors and enables employees to work flexibly and securely. 

End-User Protection Against Attacks Vectors

From phishing emails to fileless malware, users encounter a wide spectrum of attack vectors daily. Microsoft Defender shields users from malicious links and attachments by scanning emails, documents, and tools in real-time. Taking away much of the burden, and equipping employees with knowledge of potential threats. Defender’s robust endpoint protection leverages AI-powered threat detection to block suspicious activities before they can cause harm. This can reduce the risk of breaches from drive-by downloads, rogue applications, or credential theft. 

End-users gain peace of mind as automated protections work seamlessly in the background, so they can focus on their work without worrying about clicking a link and accidentally setting off a cyber breach. Defender’s user-friendly guidance and actionable steps also help demystify security, encouraging a culture of shared responsibility.   

Beyond Defender: The Power of Integrated Security Ecosystem 

While Microsoft Defender is a powerful foundation, its effectiveness multiplies when integrated with complementary tools within the Microsoft security ecosystem. Conditional Access, for example, extends user protection by enforcing policies that evaluate both the context and risk level of access requests. If a user attempts to log in from an unfamiliar device or location, Conditional Access can prompt for additional authentication or block access altogether. This mitigates the risk of compromised credentials. 

Furthermore, Microsoft’s Extended Detection and Response (XDR) capabilities, consolidates security telemetry from across your environment. These tools ensure your security teams gain a centralised view of the entire digital estate. For end users, this consolidation means faster detection and remediation of threats. Further good news, even if a phishing attempt slips through email defences, XDR can correlate signals to quarantine the threat and guide users through recovery steps. 

Cost Benefits within M365 Licensing 

For many organisations, cost is a significant consideration in security strategy. Microsoft Defender’s inclusion within Microsoft 365 licensing delivers exceptional value:  

  • Advanced protection features are available without the need for costly third-party solutions or complex integrations.  
  • Users benefit from consistent experiences across devices and platforms. 
  • IT teams can deploy, manage, and monitor security policies from a unified console. 

This consolidation not only reduces operational overhead but ensures that security is not sacrificed for the sake of budget constraints. 

Facilitating Secure Flexible Work 

An increasing number of the workforce are looking for flexible working options, including hybrid and remote models, however, with this security perimeters need to be considered. 

Microsoft Defender’s cloud-native architecture and integration with Azure Active Directory enable employees to work securely from anywhere. Real-time threat intelligence ensures that whether in the office or on the move, users remain protected against emerging threats. 

Conditional Access policies further empower organisations. An ability to dynamically assess risk and adapting controls based on user behaviour and context. For employees, this translates into frictionless access to resources with confidence that their security is not impacted. 

AI-Driven Security: Respecting Configurations and Amplifying Protection 

AI is at the heart of Microsoft’s security stack, enabling smarter defences and more adaptive protections. Solutions like Microsoft 365 Copilot and Security Copilot, ensure that user data remains governed by the existing security configurations.  

Microsoft 365 Copilot operates within the boundaries of user permissions, never exposing information to which a user does not have access. This means that the efficiency of AI-powered assistance never come at the expense of data security or privacy. This trust is vital for users to leverage AI tools confidently in their day-to-day work. 

Security Copilot, meanwhile, is poised to transform the incident response lifecycle. Security Copilot can automate Endpoint Detection and Response (EDR) workflows, rapidly triaging alerts, correlating events, and even suggesting or executing remediation actions. This means that incidents are resolved faster, with minimal disruption and less risk of human error. 

Conclusion 

In an era where cyber threats are ever-present and working patterns are more dynamic than ever, an integrated security suite offers organisations a compelling advantage. From defending against major attack vectors to enabling secure, flexible work, Defender empowers users to navigate the digital world with confidence. When complemented by tools like Conditional Access, XDR, and AI-powered solutions, the benefits extend far beyond basic protection.  

Ultimately, the best security is the kind users barely notice: always present, always vigilant, and always enabling them to do their best work. 

Ready to discuss how you can make better use of Microsoft Defender and improve your security posture? Speak to one of our experts by filling in the form below.

Key takeaways from the Microsoft Digital Defence Report, written by Leon Godwin

We drew inspiration from the Churchill War Rooms to host our latest Security Briefing – a venue where strategic defence decisions once shaped our history, and now where security professionals learned from Cloud Direct and Microsoft about the new cyber landscape being shaped by AI-driven threats. 

To paraphrase Winston Churchill: “Never before in the field of digital defence has the security of so many relied so heavily on the vigilance of so few.” The battleground consists of intelligence, speed, and resilience, and adversaries are using AI-powered attacks to rapidly infiltrate and compromise organisations, faster than human-based defences can respond. 

From a day in the life of a modern CISO through attack simulations, to insights from Microsoft’s Aileen Finlay and concrete steps that you can take to adjust to the new threats, I’ll reflect on the event and share my take on the newly released Microsoft Digital Defence Report 2025. 

The reality on the ground

On 13 October, the UK government took the unprecedented step of sending a letter out to all UK businesses to highlight the significance of new cyber threats. The letter’s goal was to fundamentally reclassify cyber security from a technical operational task to a critical board-level imperative. By issuing a direct mandate, the government signaled that the intense and sophisticated nature of modern threats now constitutes a primary risk to national economic stability.  

The Microsoft Digital Defence Report 

The recent release of the Microsoft Digital Defence Report makes it clear why the UK government is so concerned, and why you should be too. 

The threat landscape isn’t just evolving – it’s accelerating. Attacks are more aggressive, more organised, and frankly, more relentless than ever. The UK is now ranked number two in the global index of countries most impacted by cyber threats. 

Defence Report takeaways for the Modern CISO 

One theme that kept coming up during the event was the “prevention versus response” paradigm, or what the military calls “Left of Bang” and “Right of Bang.” The Microsoft Digital Defence Report 2025 makes it clear; you can’t choose one over the other. You need both. 

Here’s a breakdown of the key findings of the report, and actions to take off the back of it.  

1. Identity is the Battleground 

Problem: Attackers aren’t only breaking in, they’re logging in. Identity compromise is still the number one entry point for ransomware and data theft, and it’s getting smarter. When you login to a computer you gate a token that is your permission to use that session for a period of time before you need to reauthenticate. Token theft and Adversary-in-the-Middle (AiTM) attacks are on the rise, bypassing traditional protections. Your traditional Multi-Factor Authentication (MFA) that secured you for many years is now simply not enough. 

Solution: Phishing-resistant MFA is the gold standard. 

Action: 

  • Audit your Entra ID environment today. 
  • Enforce phishing-resistant MFA for everyone, especially admins. 
  • Update legacy authentication protocols.

Impact: Phishing-resistant MFA blocks over 99% of unauthorised access attempts, according to the Microsoft report. If you do one thing this quarter, make it updating your systems from traditional MFA to phishing-resistant MFA. 

2. The Double-Edged Sword of AI 

Problem: AI isn’t just our friend, it’s the attacker’s too. They’re using it to craft convincing phishing lures, scale attacks, and even create deepfakes for fraud. 

Solution: We fight fire with fire. AI-driven defence can now contain breaches in seconds, suspending compromised accounts before a human is aware of an issue. This is helped further now that Microsoft Copilot has been bundled into the M365 E5 licenses, rather than an expensive bolt-on. 

Action: 

  • Put an AI governance framework in place. ISO 42001 is a great starting point.  
  • Deploy AI-powered tools like Copilot for Security, Microsoft Sentinel, and Defender XDR to automate detection and response. 
  • You already have access to the phishing simulations within your M365 subscriptions, you should increase the schedule to be at least weekly. 

Impact: Moving from reactive to proactive defence shrinks dwell time, improves awareness, and limits the blast radius of an attack. 

3. Cyber Risk is Business Risk 

Problem: Too often, security is treated as an IT issue. But as we see in the examination of real-world breaches, it doesn’t just impact systems. It’s effecting revenue, supply chains and reputation. In one case this resulted in liquidation of the business and termination of it’s 700 employees.  

Solution: Security needs a seat at the boardroom table. 

Action: 

  • Build reports with metrics that matter including, MFA coverage, patch latency, incident response times.  
  • Run tabletop roleplaying exercises so your executive team knows what to do when, not if, the breach happens. 

Impact: A resilient culture means the business keeps moving, even when attackers try to stop it. 

What you can do next 

The MDDR 2025 isn’t just a collection of scary stats, it’s a wake-up call. 

If you’re planning your 2026 roadmap and wondering how to prioritise (or fund) these improvements, let’s talk. We can help secure funding for assessments to pinpoint your weakest links and help provide guidance on your security journey.  

Don’t wait for the breach to happen. Build resilience now.

Sign up to one of our Security Innovation consultancy sessions. These sessions are designed to help you with your specific business challenges  

In 2025, the UK’s cyber resilience has been tested like never before. Major brands have made headlines after suffering disruptive cyberattacks, forcing them to halt operations and exposing sensitive customer data.

These incidents are not isolated. The UK government’s latest Cyber Security Breaches Survey reveals that 43 per cent of UK businesses experienced a cyber breach or attack in the past year, rising to 74 per cent among large organisations. Phishing remains the most prevalent and disruptive threat, and the financial and reputational costs are mounting. 

For IT decision makers, the message is clear: robust device management is no longer optional, it’s a strategic imperative. 

The evolving threat landscape

  • Identity is the new perimeter: With traditional network boundaries dissolving, user identities have become the frontline of defence. Almost all (97 per cent) identity hacks are password spray or brute force attacks. Despite headlines proclaiming more sophisticated attacks, the majority of identity-based attacks still target weak or reused passwords.

Why Traditional Approaches Fall Short 

Legacy Mobile Device Management (MDM) is no longer sufficient. The modern enterprise requires Unified Endpoint Management (UEM) and Unified Endpoint Security (UES) – these integrate antivirus, encryption, detection, and response into a single platform, ensuring consistent security across all devices and operating systems. 

How enhanced device management protects your organisation 

1. Limit identity breaches by adopting… 

  • Mandatory Multi-Factor Authentication (MFA): Enforce phishing resistant MFA across all devices to drastically reduce the risk of unauthorised access, even if passwords are compromised. 
  • Adaptive Access Policies: Integrate with Identity and Access Management (IAM) systems to trigger additional authentication or restrict access based on risk factors like device health, location, or user behaviour. 
  • Continuous Monitoring & Zero Trust: Leverage AI and machine learning to monitor for anomalies, enforce “never trust, always verify” principles, and detect compromised credentials before they’re exploited. 

2. Prevent data breaches with… 

  • Robust Encryption: Ensure data is encrypted both in transit and at rest, including full-disk encryption and protection for removable media. 
  • Data Loss Prevention (DLP): Flag, track, and control sensitive data to prevent unauthorised sharing or exposure. 
  • Remote Device Control: Instantly lock or wipe lost or stolen devices to prevent data leaks. 

Turning theory into practice 

Addressing Unmanaged Devices 

  • Device Discovery: Use tools like Microsoft Defender for Endpoint to identify all devices (managed and unmanaged) on your network. 
  • Onboarding: Bring unmanaged endpoints under management to close visibility gaps and reduce vulnerabilities. 

Leveraging Microsoft’s Ecosystem 

  • Microsoft 365 & Defender Suite: Deploy built-in MDM, DLP, and Conditional Access Policies for consistent, integrated security. 
  • Intune Security Baselines: Rapidly deploy recommended security configurations to all managed devices, addressing the root cause of most breaches – poor configuration. 

Navigating the Age of AI 

  • BYOAI Risks: With four in five AI users bringing their own tools to work, device management is essential for controlling application use and preventing data leakage using tools like Microsoft Defender for Cloud Apps.  
  • AI-Driven Security: Modern device management platforms use AI to predict threats, automate policy updates, and shift security from reactive to proactive. 

What next?

  1. Assess your current device management posture: Identify unmanaged devices, poor configurations, and BYOAI risks. 
  2. Adopt a unified, AI-powered device management strategy: Leverage Microsoft’s ecosystem and you’re existing M365 investment for comprehensive protection. 
  3. Don’t wait for a breach: Proactive action today is the best defence for tomorrow’s threats.