You can use your favorite social network to register or link an existing account:
Or use your email address to register without a social network:
Sign in with these social networks:
Or enter your username and password
Forgot your password?
Yes, please link my existing account with for quick, secure access.
No, I would like to create a new account with my profile information.
Office 365 sign-in
Office 365 Community
FastTrack: Office 365 deployment resources
Ignite: Office 365 admin training resources
Office 365 TechCenter
When you make a decision to place your trust in a cloud services provider for productivity services, security, compliance, and privacy are top of mind. With over a billion customers on Office and decades of experience running online services, we understand what it takes to earn and continue to maintain your trust and confidence in Office 365.
Our construct for security, compliance, and privacy in Office 365 has two equally important dimensions: Built-in capabilities that include service-wide technical capabilities, operational procedures, and policies that are enabled by default for customers using the service; and Customer controls that include features that enable you to customize the Office 365 environment based on the specific needs of your organization.
We will look at Built-in capabilities and Customer controls for each of the key pillars of trust - Security, Compliance, and Privacy - in more detail below.
Security of our customers' information is a key trust principle. We implement policies and controls to safeguard customer data in the cloud and provide unique customer controls that you can use to customize your organizational environment in Office 365.
As an Office 365 customer, you will benefit directly from in-depth security features that we have built into the service as a result of experience gained from years of building enterprise-grade software, managing a number of online services and billions of dollars in security investments. We have implemented technologies and processes that are independently verified to ensure high security of customer data.
Some key aspects of our built-in security capabilities are:
As a result of Office 365 offering productivity services to a wide range of industries, we have built both features and choices that you can control to enhance the security of data based on the needs of your organization.
Some key aspects of our customer controls for security are:
Another key principle of Office 365 trust is Compliance. It is expected that commercial organizations have regulations and policies that they must comply with to operate businesses in various industries. These policies can be a mix of external regulatory requirements that vary depending on industry and geographical location of the organization and internal company-based policies. Office 365 provides built-in capabilities and customer controls to help customers meet both various industry regulations and internal compliance requirements.
Office 365 stays up-to-date with many of today's ever-evolving standards and regulations, giving customers greater confidence. To bolster this and to continue earning your confidence, we undergo third-party audits by internationally recognized auditors as an independent validation that we comply with our policies and procedures for security, compliance and privacy.
Some key aspects of built-in compliance capabilities are:
We provide Compliance controls within the service to help our customers comply based on the policy needs of their organization.
Some key customer controls for compliance are:
Privacy is our third trust principle. As more and more customers are relying on online service providers to keep their data safe from loss, theft, or misuse by third parties, other customers, or even the provider's employees, we recognize that cloud services raise unique privacy questions for businesses.
To meet your needs, we are continually developing technologies to enhance privacy in our services. We call this privacy by design - which is our commitment to use best practices to help protect and manage customer data.
Key built-in capabilities and principles of Privacy in Office 365 are:
In addition to built-in capabilities, Office 365 enables you to collaborate through the use of transparent policies and strong tools while providing the distinct ability to control information sharing.
Some examples of customer controls for privacy are:
At Microsoft, we have been building Enterprise software for over two decades and we run over 200 online services. We bring all of this experience to Office 365 to give you industry leading capabilities in security, compliance and privacy. In addition, we take the advantage of scale and continuous feedback from providing services to a diverse customer base across industry and geography to constantly learn and improve the Office 365 services. Security, Compliance and Privacy are the key pillars of the Office 365 Trust Center (the other two pillars being Transparency and Service Continuity). Customers can have confidence that Microsoft is a thought leader and will continue to make deep investments to protect customers in the cloud.
Learn more about security, compliance, and trust in this weeks Garage Series: Explaining data security and your control in Office 365.
Learn more about recent compliance agreements with the announcement for the state of California and Microsoft signing the CJIS security policy agreement.
-- Vijay Kumar
Read on to learn more about California and Microsoft signing CJIS Security Policy Agreement and what this means for local law enforcement. California becomes the fourth state after Texas, Illinois and New York where Microsoft has signed the CJIS Security
Is Two factor Authentication are applicable for both pure cloud and federated domain user or only for pure cloud users ?
Every couple weeks we round up industry news and articles you might have missed. Read on for our latest selections.
A second factor of authentication is only available for pure cloud users, otherweis you need to install a system to add a second factor of authentication to your federation sysem, like ADFS. But you might have some Global Administrators in Office 365 with your tenantdomain.onmicrosoft.com you can secure with builtin second factor of authentication.
When was the last time you read your company's handbook containing all the communication policies? Learn how you can achieve compliance without disrupting your routine or your colleagues'. Last weeks blog post laid out the two dimensions of Office 365
Today we're announcing Office 365 Message Encryption! This service will help customers who need to securely send email to people outside of their organization. Read on to learn how the service works and more!