{"id":141,"date":"2021-01-11T18:15:40","date_gmt":"2021-01-11T18:15:40","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=141"},"modified":"2023-01-30T16:43:20","modified_gmt":"2023-01-30T16:43:20","slug":"como-abordar-la-seguridad-de-microsoft-365","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/","title":{"rendered":"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365?"},"content":{"rendered":"<p>Que Microsoft 365 domina el mercado es una realidad. Y es que la gran mayor\u00eda de las organizaciones han implantado este servicio basado en la nube. Un servicio que introduce riesgos considerables, ya que el paquete de Microsoft 365 tiene acceso a diferentes datos corporativos como el correo electr\u00f3nico, el almacenamiento de archivos individuales o documentos financieros. Por ello se torna imprescindible la protecci\u00f3n de esta soluci\u00f3n de productividad empresarial.<\/p>\n<p>La suplantaci\u00f3n de usuarios privilegiados, con su correspondiente robo de datos, el uso compartido, tanto interno como externo, de informaci\u00f3n corporativa o la entrega de malware por correo electr\u00f3nico en Outlook Online son algunos de los peligros que implica el uso de Microsoft 365. Es cierto que esta soluci\u00f3n empresarial incorpora importantes controles de seguridad incluidos en la licencia E3. Incluso Microsoft ofrece una protecci\u00f3n adicional en la licencia E5. Pero, \u00bfson estos mecanismos de defensa suficientes?<\/p>\n<p>A esta pregunta se suman otros tres interrogantes, relacionados con la seguridad, que deber\u00edan plantearse todas las organizaciones antes de adoptar Microsoft 365. Cuestiones b\u00e1sicas como, por ejemplo, si la soluci\u00f3n es capaz de bloquear el malware, el correo no deseado y los mensajes de suplantaci\u00f3n de identidad o si los trabajadores y los dispositivos cumplen con las pol\u00edticas de seguridad de la empresa.<\/p>\n<p>Para reforzar la seguridad de Microsoft 365, Fortinet Security Fabric ofrece la protecci\u00f3n adicional que necesitan los usuarios de Microsoft 365. Algunos de estos elementos de seguridad son: seguridad del correo electr\u00f3nico con FortiMail, monitorizaci\u00f3n del uso y las configuraciones de Microsoft con FortiCASB y herramientas para la autenticaci\u00f3n y el acceso a la red con FortiAuthenticator, FortiToken y FortiNAC<\/p>\n<p>Asimismo, la compa\u00f1\u00eda proporciona protecci\u00f3n contra amenazas de nivel superior para entornos locales y de nube m\u00faltiple, una experiencia administrativa y de usuario com\u00fan, as\u00ed como una evaluaci\u00f3n de riesgos de correo electr\u00f3nico de manera gratuita.<\/p>\n<div  class=\"jeg_postblock_5 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_3o3 jnews_module__0_69def55e5c4cd   \" data-unique=\"jnews_module__0_69def55e5c4cd\">\n\t\t\t\t\t<div class=\"jeg_block_heading jeg_block_heading_6 jeg_subcat_right\">\n                     <h3 class=\"jeg_block_title\"><span>DOCUMENTO RELACIONADO<\/span><\/h3>\n                     \n                 <\/div>\n\t\t\t\t\t<div class=\"jeg_block_container\">\n                    \n                    <div class=\"jeg_posts jeg_load_more_flag\"><article class=\"jeg_post jeg_pl_lg_2 format-standard\">\n                    <div class=\"jeg_thumb\">\n                        \n                        <a href=\"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/seguridad-para-microsoft-365\/\" aria-label=\"Read article: Seguridad para Microsoft 365\"><div class=\"thumbnail-container animate-lazy  size-715 \"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"250\" src=\"https:\/\/directortic.es\/fortinet\/wp-content\/themes\/jnews\/assets\/img\/jeg-empty.png\" class=\"attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image\" alt=\"Seguridad para Microsoft 365\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" data-src=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/seguridad-microsoft-365-banner-fortinet-1-350x250.jpg\" data-srcset=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/seguridad-microsoft-365-banner-fortinet-1-350x250.jpg 350w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/seguridad-microsoft-365-banner-fortinet-1-800x570.jpg 800w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/seguridad-microsoft-365-banner-fortinet-1-120x86.jpg 120w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/seguridad-microsoft-365-banner-fortinet-1-750x536.jpg 750w\" data-sizes=\"auto\" data-expand=\"700\" \/><\/div><\/a>\n                        <div class=\"jeg_post_category\">\n                            <span><a href=\"https:\/\/directortic.es\/fortinet\/category\/destacado\/\" class=\"category-destacado\">Destacado<\/a><\/span>\n                        <\/div>\n                    <\/div>\n                    <div class=\"jeg_postblock_content\">\n                        <h3 class=\"jeg_post_title\">\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/seguridad-para-microsoft-365\/\">Seguridad para Microsoft 365<\/a>\n                        <\/h3>\n                        \n                        <div class=\"jeg_post_excerpt\">\n                            <p>Con este documento queremos responder a tres preguntas b\u00e1sicas que debemos tener en cuenta para la seguridad de Microsoft 365....<\/p>\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/seguridad-para-microsoft-365\/\" class=\"jeg_readmore\">Leer m\u00e1s<span class=\"screen-reader-text\">Details<\/span><\/a>\n                        <\/div>\n                    <\/div>\n                <\/article><\/div>\n                    <div class='module-overlay'>\n\t\t\t\t    <div class='preloader_type preloader_dot'>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader dot\">\n\t\t\t\t            <span><\/span><span><\/span><span><\/span>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader circle\">\n\t\t\t\t            <div class=\"jnews_preloader_circle_outer\">\n\t\t\t\t                <div class=\"jnews_preloader_circle_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader square\">\n\t\t\t\t            <div class=\"jeg_square\">\n\t\t\t\t                <div class=\"jeg_square_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t    <\/div>\n\t\t\t\t<\/div>\n                <\/div>\n                <div class=\"jeg_block_navigation\">\n                    <div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span><\/span><span><\/span><span><\/span><\/div><\/div>\n                    \n                    \n                <\/div>\n\t\t\t\t\t\n\t\t\t\t\t<script>var jnews_module__0_69def55e5c4cd = {\"header_icon\":\"\",\"first_title\":\"DOCUMENTO RELACIONADO\",\"second_title\":\"\",\"url\":\"\",\"header_type\":\"heading_6\",\"header_background\":\"\",\"header_secondary_background\":\"\",\"header_text_color\":\"\",\"header_line_color\":\"\",\"header_accent_color\":\"\",\"header_filter_category\":\"\",\"header_filter_author\":\"\",\"header_filter_tag\":\"\",\"header_filter_text\":\"All\",\"sticky_post\":false,\"sticky_post_filter\":false,\"post_type\":\"post\",\"content_type\":\"all\",\"sponsor\":false,\"number_post\":\"1\",\"post_offset\":0,\"unique_content\":\"disable\",\"include_post\":\"139\",\"included_only\":false,\"exclude_post\":\"\",\"include_category\":\"\",\"exclude_category\":\"\",\"include_author\":\"\",\"include_tag\":\"\",\"exclude_tag\":\"\",\"exclude_visited_post\":false,\"sort_by\":\"latest\",\"date_format\":\"default\",\"date_format_custom\":\"Y\\\/m\\\/d\",\"excerpt_length\":20,\"excerpt_ellipsis\":\"...\",\"force_normal_image_load\":\"\",\"main_custom_image_size\":\"default\",\"pagination_mode\":\"disable\",\"pagination_nextprev_showtext\":\"\",\"pagination_number_post\":4,\"pagination_scroll_limit\":0,\"ads_type\":\"disable\",\"ads_position\":1,\"ads_random\":\"\",\"ads_image\":\"\",\"ads_image_tablet\":\"\",\"ads_image_phone\":\"\",\"ads_image_link\":\"\",\"ads_image_alt\":\"\",\"ads_image_new_tab\":\"\",\"google_publisher_id\":\"\",\"google_slot_id\":\"\",\"google_desktop\":\"auto\",\"google_tab\":\"auto\",\"google_phone\":\"auto\",\"content\":\"\",\"ads_bottom_text\":\"\",\"boxed\":\"\",\"boxed_shadow\":\"\",\"el_id\":\"\",\"el_class\":\"\",\"scheme\":\"\",\"column_width\":\"auto\",\"title_color\":\"\",\"accent_color\":\"\",\"alt_color\":\"\",\"excerpt_color\":\"\",\"css\":\"\",\"paged\":1,\"column_class\":\"jeg_col_3o3\",\"class\":\"jnews_block_5\"};<\/script>\n\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Que Microsoft 365 domina el mercado es una realidad. Y es que la gran mayor\u00eda de las organizaciones han implantado este servicio basado en la nube. Un servicio que introduce riesgos considerables, ya que el paquete de Microsoft 365 tiene acceso a diferentes datos corporativos como el correo electr\u00f3nico, el almacenamiento de archivos individuales o [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":142,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfC\u00f3mo abordar la seguridad de Microsoft 365? - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365? - Fortinet\" \/>\n<meta property=\"og:description\" content=\"Que Microsoft 365 domina el mercado es una realidad. Y es que la gran mayor\u00eda de las organizaciones han implantado este servicio basado en la nube. Un servicio que introduce riesgos considerables, ya que el paquete de Microsoft 365 tiene acceso a diferentes datos corporativos como el correo electr\u00f3nico, el almacenamiento de archivos individuales o [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-11T18:15:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/Post-Seguridad-Microsoft-365.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365?\",\"datePublished\":\"2021-01-11T18:15:40+00:00\",\"dateModified\":\"2023-01-30T16:43:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/\"},\"wordCount\":342,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/01\\\/Post-Seguridad-Microsoft-365.jpg\",\"articleSection\":[\"Art\u00edculos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/\",\"name\":\"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365? - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/01\\\/Post-Seguridad-Microsoft-365.jpg\",\"datePublished\":\"2021-01-11T18:15:40+00:00\",\"dateModified\":\"2023-01-30T16:43:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/01\\\/Post-Seguridad-Microsoft-365.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/01\\\/Post-Seguridad-Microsoft-365.jpg\",\"width\":800,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/01\\\/11\\\/como-abordar-la-seguridad-de-microsoft-365\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365? - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365? - Fortinet","og_description":"Que Microsoft 365 domina el mercado es una realidad. Y es que la gran mayor\u00eda de las organizaciones han implantado este servicio basado en la nube. Un servicio que introduce riesgos considerables, ya que el paquete de Microsoft 365 tiene acceso a diferentes datos corporativos como el correo electr\u00f3nico, el almacenamiento de archivos individuales o [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/","og_site_name":"Fortinet","article_published_time":"2021-01-11T18:15:40+00:00","article_modified_time":"2023-01-30T16:43:20+00:00","og_image":[{"width":800,"height":532,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/Post-Seguridad-Microsoft-365.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365?","datePublished":"2021-01-11T18:15:40+00:00","dateModified":"2023-01-30T16:43:20+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/"},"wordCount":342,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/Post-Seguridad-Microsoft-365.jpg","articleSection":["Art\u00edculos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/","url":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/","name":"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365? - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/Post-Seguridad-Microsoft-365.jpg","datePublished":"2021-01-11T18:15:40+00:00","dateModified":"2023-01-30T16:43:20+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/Post-Seguridad-Microsoft-365.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/Post-Seguridad-Microsoft-365.jpg","width":800,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/como-abordar-la-seguridad-de-microsoft-365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo abordar la seguridad de Microsoft 365?"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":1,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":143,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/141\/revisions\/143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/142"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}