Knowing how to start is the key to sucess. The secret in building a cyber security defense is building a framework or a plan that we can follow to deliver us to our desired results. In this case, this is a secure Office 365 and Azure tenant. In the previous chapter, I provided you an overview of the different services available in Office 365 and Azure. The Microsoft Threat Dection strategy laid out the differnt security services and how they interact with each other. In this chapter, you will build your new Azure and Office 365 security services and by the end of this chapter, you will have a baseline security configuration in place for Azure with monitoring and appropriate security services for Office 365.