Sniegt atsauksmes
Palīdzība un atbalsts
Saglabātie vienumi
Privātie plāni
Brīdi uzgaidiet, notiek pieteikšanās...
FiltriNotīrīt visu
  • Jūsu atrašanās vieta
  • Produkti (1)
    • Azure
    • Dynamics 365
    • Microsoft 365
      • Apgūšana un izmaiņu pārvaldība
      • Microsoft Teams zvani
      • Mākoņa drošība
      • Atbilstības konsultatīvie pakalpojumi
      • Ierīču izvietošana un pārvaldība
      • Priekšlīnijas darbinieki
      • Identitāšu un piekļuves pārvaldība
      • Informācijas aizsardzība un pārvaldība
      • Iekšējais risks
      • Zināšanas un ieskati
      • Sapulču telpas darbvietai Microsoft Teams
      • Sapulces darbvietai Microsoft Teams
      • Microsoft 365 Live Events
      • Mobilo ierīču pārvaldība
      • Power Platform for Teams
      • Teams pielāgotie risinājumi
      • Grupas darba izvietošana
      • Pretdraudu aizsardzība
      • Workplace Analytics
    • Power Platform
  • Nozares
  • Pakalpojuma tips
  • Izcenojuma modelis

Office app

Centrmezgls visam jūsu saturam — piekļūstiet failiem un dokumentiem, izprotiet, kam jāpievērš uzmanība, un ērti sāciet darbu.
Darba sākšana tīmekļa vietnē Office.com >

Konsultāciju pakalpojumi rezultāti šim: Microsoft 365

Tiek rādīti rezultāti šeit: konsultāciju pakalpojumi.
Skats saistītie rezultāti šeit: programmas vai saistītie rezultāti šeit: nozares mākoņi.
CloudWay Frontier Firm PoCCloudWay AS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
The Future‑Ready Organization PoC gives leaders a fast, structured path to realize value from Microsoft 365 and Copilot.
1 out of 60
GuidePoint Security Microsoft 365 Security Consulting ServicesGuidePoint Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Management
Microsoft 365 security consulting services delivers secure design, deployment, and optimization of Microsoft 365 platform controls and services.
2 out of 60
Workspace booking solutionSolutions Victrix Inc, les
+1
Applicable to:
m365-sa-teams-custom-solutions product iconTeams Custom Solutions
Simplify the management of workplace attendance and enhance team collaboration with the workspace reservation solution built with Power Apps for Teams.
3 out of 60
Adopt & Extend Microsoft Copilot: Custom Agents Delivered by WitivioWitivio
+1
Applicable to:
m365-sa-teams-custom-solutions product iconTeams Custom Solutions
Create, deploy and adopt custom Copilot agents in Microsoft 365 to automate processes, improve information access and boost employee productivity.
4 out of 60
Modern SharePoint Intranet with Agentic Copilot AgentAFRIBIT
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-teamwork-deployment product iconTeamwork Deployment
A modern SharePoint intranet for Microsoft 365, with optional custom SPFx web parts and a Copilot Studio AI agent to help employees find information, complete requests, and reduce support queries.
5 out of 60
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS to ensure assistance when you need it most during a significant security event.
6 out of 60
SharePoint Modernization: Your AI-Ready WorkplaceRightpoint Consulting, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-firstline-workers product iconFrontline Workersm365-sa-workplace-analytics product iconWorkplace Analytics
Transform legacy SharePoint into a modern, intelligent digital hub
7 out of 60
Victrix_Intranet_IASolutions Victrix Inc, les
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Transformez votre intranet avec l’IA et offrez une véritable expérience employé moderne !
8 out of 60
Microsoft 365 Copilot Rediness Assesment by C-venC-ven Technologies
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Assess your organization’s readiness for Microsoft 365 Copilot and identify high-impact Modern Workplace productivity use cases with a clear, actionable roadmap.
9 out of 60
Data Security Envisioning WorkshopPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Identify hidden data risks, assess insider threats, and gain clear, actionable guidance to strengthen security, compliance, and governance with a Microsoft Purview–driven workshop.
10 out of 60
HubSpot and OneDrive for Business IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Automatically sync HubSpot with OneDrive for Business to embed secure, always-up-to-date marketing assets and eliminate manual file uploads.
11 out of 60
AI Transformation with CopilotMindWorks
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Transform your organization into an AI‑powered, high‑performing "Frontier Firm"
12 out of 60
Victrix_agent intelligent sur mesureSolutions Victrix Inc, les
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Transformez et optimisez la façon dont vos employés accèdent à l’information et interagissent avec les processus en entreprise grâce à un agent intelligent personnalisé.
13 out of 60
Victrix_a custom intelligent agentSolutions Victrix Inc, les
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
A Custom Intelligent Agent, the Microsoft Copilot Studio and Azure OpenAI Experience
14 out of 60
Copilot Data Exposure & Oversharing Risk Assessment - 2 WeeksPenthara Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-workplace-analytics product iconWorkplace Analytics
Identify and reduce the risk of sensitive data being unintentionally exposed by Microsoft 365 Copilot due to oversharing, weak permissions, and poor data governance.
15 out of 60
Phishing & Impersonation Protection Setup (2 Weeks)Penthara Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-workplace-analytics product iconWorkplace Analytics
Protect your organization from phishing, spoofing, and impersonation attacks by strengthening Microsoft 365 email security with advanced, targeted protection controls.
16 out of 60
Victrix_modernisation outils Excel et AccessSolutions Victrix Inc, les
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Modernisez vos outils Excel & Access grâce à Power Platform !
17 out of 60
Data Security WorkshopEmergent Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Security workshop leveraging Microsoft's security products such as Purview to uncover data risks across Microsoft 365, assess exposure, and deliver actionable recommendations for IT leaders.
18 out of 60
Threat Protection Envisioning WorkshopCitrin Cooperman Advisors, LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Uncover real security threats in your environment and build a roadmap for stronger protection leveraging Microsoft Defender’s unified security incident platform powered by AI.
19 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
20 out of 60
Microsoft 365 Security Assessment and License RationalizationRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Provide assessment and strategic guidance to strengthen security across Microsoft 365 environment and optimize Microsoft 365 licensing.
21 out of 60
HubSpot and Microsoft Exchange Online IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-teamwork-deployment product iconTeamwork Deployment
Automatically sync HubSpot with Microsoft Exchange to log emails, track communications, and sync calendars—eliminating manual data entry between platforms.
22 out of 60
Victrix_Modernization of Excel and Access toolsSolutions Victrix Inc, les
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Secure Migration from Microsoft Excel and Access to Power Platform, Modernize Your In House Tools
23 out of 60
S4B Email Attack Simulation TrainingS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Attack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
24 out of 60
Victrix_Dynamics 365 CRMSolutions Victrix Inc, les
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Déployez votre CRM intelligent et boostez votre croissance dès aujourd’hui !
25 out of 60
Intune for Windows: 6-week ImplementationPractical Solutions, Inc
+2
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Intune for Windows is a configuration service that enables you to manage Windows 10 devices in Intune.
26 out of 60
Victrix_Intranet_IASolutions Victrix Inc, les
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Transform your intranet with AI and deliver a truly modern employee experience!
27 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
28 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Provides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
29 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
30 out of 60
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
31 out of 60
Protección Identidades en ambiente Híbrido con Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Integra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
32 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Hybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
33 out of 60
Implementation of security for Endpoint with Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Advanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
34 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4B
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Ofrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
35 out of 60
On-premise enviroment Identity Protection service with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
On-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
36 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Seguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
37 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Investiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
38 out of 60
Accelerate Microsoft 365 Copilot ROI with our 3-week readiness AssessmentNewWave Computing Pvt Ltd
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Unlock Faster ROI on Microsoft 365 Copilot with a 3-Week Readiness Program
39 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
40 out of 60
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Refuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
41 out of 60
Securing & Protecting Microsoft 365 Copilot SolutionsProtiviti
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Comprehensive solutions for ensuring a secure foundation for Microsoft 365 Copilot and Copilot Studio Agents.
42 out of 60
CYBERWELL Microsoft Security AuditCYBERWELL Canada Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify risks and misconfigurations with prioritized remediation guidance across Microsoft 365 environments.
43 out of 60
Seguridad avanzada de identidad en la nube con Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
44 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
45 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
46 out of 60
External Sharing Risk Assessment - 2 WeeksPenthara Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-workplace-analytics product iconWorkplace Analytics
Identify and reduce data exposure risks by reviewing guest access and external sharing settings across Microsoft Teams and SharePoint.
47 out of 60
Insider Risk Management Setup - 2 WeeksPenthara Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-workplace-analytics product iconWorkplace Analytics
Detect and reduce insider data risks by configuring Microsoft Purview to monitor risky user behavior and prevent internal data loss before it impacts your organization.
48 out of 60
Email Encryption & Sensitivity Configuration Setup - 2 WeeksPenthara Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-workplace-analytics product iconWorkplace Analytics
Standardize email encryption, sensitivity labels, and access controls in Microsoft 365 to protect confidential communication and reduce data leakage risks.
49 out of 60
Secure AI Productivity Accelerator - UnlimitechUnlimitech Consultorias y Capacitaciones SpA
+1
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Management
Unlock secure, AI‑powered productivity with a fast, five‑day Microsoft 365 Copilot readiness accelerator.
50 out of 60
Microsoft Intune Advisory and Optimization ServicesTeam Venti
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Achieve secure, scalable Microsoft Intune success by optimizing your Microsoft Intune & Entra ID across Windows/iOS/macOS/Android. Get rapid cloud-first readiness through collaborative sessions.
51 out of 60
Implementation on Defender for Office 365Mobile Mentor
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Defender for Office 365 service provides end-to-end protection against email-based threats
52 out of 60
Zero Trust Identity Security Implementation with EntraID by ReplyReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reply’s security approach with Microsoft Entra ID helps organizations reduce identity-driven risk, support compliance requirements, and accelerate secure adoption of Microsoft cloud services.
53 out of 60
Zones Microsoft Threat Protection WorkshopZones Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Detect real threats, assess vulnerabilities, and get a tailored Microsoft security roadmap, delivered by Zones’ certified cybersecurity experts.
54 out of 60
Microsoft Intune Deployment & Endpoint Management Implementation ServicesRISHABH SOFTWARE PRIVATE LIMITED
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Management
This professional service delivers end-to-end implementation of Microsoft Intune to help organizations securely deploy, manage, and protect corporate devices through centralized enrollment, compliance
55 out of 60
Microsoft 365 Tenant Setup & HardeningRISHABH SOFTWARE PRIVATE LIMITED
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
This professional service delivers structured Microsoft 365 tenant setup and security hardening implementation to help organizations.
56 out of 60
Microsoft 365 Health Check: 3-Week AssessmentGuidePoint Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Management
Reveal hidden risks in Microsoft 365, validate security controls, and deliver prioritized, actionable recommendations that improve identity, data, device, and threat protection across your environment
57 out of 60
MDS - Microsoft 365 Security Rapid Deployment for Financial ServicesMaureen Data Systems
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Help financial services organizations establish a regulator-ready Microsoft 365 security and compliance baseline in 6–8 weeks using Microsoft Purview.
58 out of 60
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
59 out of 60
M3TC Teams Phone MigrationM3 Technology Consultants Inc
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teamsm365-sa-teams-custom-solutions product iconTeams Custom Solutions
Transform your organization’s communications and collaboration with M3 Technology Consultants’ (M3TC) Microsoft Teams Phone Migration solution.
60 out of 60
  • Atpakaļ
  • 55
  • 56
  • 57
  • 58
  • 59
  • Tālāk
Par Marketplace
  • Kāpēc Microsoft Marketplace
  • Emuāri
  • Klientu stāsti
Klientiem
  • Darba laiks
  • Darba sākšanas ceļvedis
  • Tehniskā dokumentācija
  • Privātie piedāvājumi
  • Microsoft Azure patēriņa saistības
  • Norēķini un rēķinu izrakstīšana
Partneriem
  • Kļūstiet par partneri
  • Tieciet iekļauts sarakstā
  • Saņemt mārketinga atbalstu
  • Tehniskā dokumentācija
  • Detalizēti norādījumi par to, kā veidot, publicēt un pārdot
  • Kļūstiet par koppārdošanas prasībām atbilstošu
  • Marketplace kopiena partneriem
  • Kanāla vadīta Marketplace pārdošana
  • Vairāku pušu privātie piedāvājumi kanāla partneriem
Uzņēmējdarbība
  • Microsoft AI
  • Microsoft drošība
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Uzņēmējsabiedrība
  • Karjera
  • Microsoft privātums
  • Investori
  • Ilgtspējība
Latviešu (Latvija) Jūsu konfidencialitātes izvēles iespējas — atteikšanās ikona Jūsu konfidencialitātes izvēles iespējas Patērētāju veselības konfidencialitāte
  • Vietnes karte
  • Sazināties ar mums
  • Konfidencialitāte un sīkfaili
  • Lietošanas nosacījumi
  • Preču zīmes
  • Par mūsu reklāmām
  • Pārvaldīt sīkfailus
  • © Microsoft 2026