SlideShare a Scribd company logo
1 of 49
#M365May @M365May M365May.com @SP_Twit
CYBERSECURITY AND
MICROSOFT 365
IN ACTION
SÉBASTIEN PAULET
@SP_TWIT
#M365May @M365May M365May.com @SP_Twit
THANK YOU TO OUR SPONSORSTHANK YOU TO OUR SPONSORS
#M365May @M365May M365May.com @SP_Twit
TRADITIONAL OWNERS
We acknowledge the traditional custodians of the land on which this online conference is
hosted, and the traditional custodians of the lands where our Australian-based speakers
and participants are located.
We would also like to pay our respects to Elders past, present and future
Tēnā koutou, tēnā koutou, tēnā tātou katoa.
On behalf of M365 May we would like to welcome and acknowledge all our speakers and
participants from Aotearoa New Zealand. Thank you for supporting this hui.
Tēnā koutou, tēnā koutou, tēnā tātou katoa.
WELCOME TO OUR SPEAKERS AND PARTICIPANTS FROM AROUND THE WORLD
#M365May @M365May M365May.com @SP_Twit
SÉBASTIEN PAULET
Document Mgt, Compliance, IT Security, Lean
Blog : https://sppublish.wordpress.com/
#M365May @M365May M365May.com @SP_Twit
6
Security and M365
#M365May @M365May M365May.com @SP_Twit
MICROSOFT 365
Windows Office 365 EM+S
#M365May @M365May M365May.com @SP_Twit
ENTERPRISE MOBILITY +
SECURITY
 Azure Active Directory Premium
 Azure MFA
 Azure Advanced Protection
 Microsoft Cloud App Security
 Azure Information Protection Premium
 Azure Right Management Premium
 Intune
#M365May @M365May M365May.com @SP_Twit
THIS SESSION PROGRAM
 Fraud to the Chairman / Phishing
 Brute force / spray attack
 Bypassing MFA
 Enduser data leak
 Admins data leak
 Endpoint robbery / loss
 Cryptolocker
#M365May @M365May M365May.com @SP_Twit
10
Fraud to the
Chairman /
Phishing
#M365May @M365May M365May.com @SP_Twit
FRAUD TO THE CHAIRMAN /
PHISHING
 Decreases for large companies, an increase for small and medium-sized enterprises
(SMEs)
 To protect yourself :
 Awareness
 Don't leave information on the Internet
 ACTION : Prevent email spoofing by implementing SPF, DKIM, DMARC
#M365May @M365May M365May.com @SP_Twit
EXCHANGE ONLINE PROTECTION
(EOP)
 Feature included in O365. Add-on for Exchange On-Premise
 Incoming emails:
 Filter
 Antivirus
 Policies check
 Anti Spam
 [EMS]If ATP, ATP
 Delivery
#M365May @M365May M365May.com @SP_Twit
[EMS]OFFICE 365 ATP
 Safe Links
 Antiphishing protection of risky mailboxes (max 60 mailboxes protected)
 Attachments analysis
#M365May @M365May M365May.com @SP_Twit
14
Brute force / spray
attack
#M365May @M365May M365May.com @SP_Twit
BREAK A PASSWORD
 Password spray
 Brute force
 User base purchase (73% of users reuse pwd)
 Phishing
 Keylog
 Written passwords
 Extortion
#M365May @M365May M365May.com @SP_Twit
SIMULER UNE ATTAQUE SPRAY/BRUTE
FORCE (O365 E5)
Top 10 passwords:
 123456
 password
 000000
 1qaz2wsx
 a123456
 abc123
 abcd1234
 1234qwer
 qwe123
 123qwe
#M365May @M365May M365May.com @SP_Twit
PREVIEW : ENDUSERS CHECK THEIR
OWN LOGIN DATA
See: https://mysignins.microsoft.com or https://myprofile.microsoft.com/
#M365May @M365May M365May.com @SP_Twit
REGULAR MFA
 Included with Office 365
 Set up the session
cache/authentication method.
 [EMS]Conditional Access
 Keep an admin account without
MFA (Glass breaker) with
random password of 20
characters minimum
#M365May @M365May M365May.com @SP_Twit
DISABLE LEGACY PROTOCOLS
Microsoft will disable basic
authentication protocols (except
SMTP) from October 2020
Protocol / service Parameter (for Policies)
Exchange Active Sync (EAS) AllowBasicAuthActiveSync
Autodiscover AllowBasicAuthAutodiscover
IMAP4 AllowBasicAuthImap
MAPI over HTTP (MAPI/HTTP) AllowBasicAuthMapi
Offline Address Book (OAB) AllowBasicAuthOfflineAddressBook
Outlook Service AllowBasicAuthOutlookService
POP3 AllowBasicAuthPop
Reporting Web Services AllowBasicAuthReportingWebServices
Outlook Anywhere (RPC over HTTP) AllowBasicAuthRpc
Authenticated SMTP AllowBasicAuthSmtp
Exchange Web Services (EWS) AllowBasicAuthWebServices
PowerShell AllowBasicAuthPowerShell
#M365May @M365May M365May.com @SP_Twit
DISABLE AUTOMATIC EMAIL FORWARD
 First action a pirate does once he enters an account : email forward
 Block it by running Exchange Online Powershell Module
<# Delete existing forwards #>
PS > $AllForwards = Get-Mailbox -ResultSize Unlimited -Filter
{(RecipientTypeDetails -ne "DiscoveryMailbox") -and
((ForwardingSmtpAddress -ne $null) -or (ForwardingAddress -ne
$null))} | Select Identity
PS > $AllForwards | % {Set-Mailbox -Identity $_.Identity -
ForwardingSmtpAddress $null -ForwardingAddress $null}
<# Disable forward creation #>
PS > Set-RemoteDomain Default -AutoForwardEnabled $false
#M365May @M365May M365May.com @SP_Twit
22
Bypass MFA
#M365May @M365May M365May.com @SP_Twit
BYPASS 2FA
 Jack Dorsey, Twitter CEO. Hacked by SIM SWAP in August 2019
#M365May @M365May M365May.com @SP_Twit
MITM MFA TOOL : EVILGINX
#M365May @M365May M365May.com @SP_Twit
MITM MFA DEMO : EVILGINX
@SP_twit #aOSNoumea
#M365May @M365May M365May.com @SP_Twit
PASSWORDLESS WITH
AUTHENTICATOR
 On enduser side, go to https://aka.ms/mysecurityinfo to set up Authenticator (requires
recording the phone)
 Don’t protect against MitM attacks
#M365May @M365May M365May.com @SP_Twit
FIDO2
 MIIT attack proof
#M365May @M365May M365May.com @SP_Twit
29
Enduser data leak
#M365May @M365May M365May.com @SP_Twit
INTERNAL THREAT
Source : Haystax Insider threat report 2019
#M365May @M365May M365May.com @SP_Twit
SENSITIVITY LABELS
 Office 365 E3 requis
 Disponible in Outlook, SharePoint, OWA and O365 Pro Plus clients
#M365May @M365May M365May.com @SP_Twit
SENSITIVITY LABELS - EFFECTS
 File encryption
-> Unable to open for unauthorized / not authenticated
users
 Restriction of permissions
-> Disabling copy and paste, printing, screenshot, email
transfer, etc.
 Watermarking
-> on Word files
 [EMS] Blocking copy on USB key / Attachments on non
O365 services
-> Requieres WIP (Windows Information Protection) and
Intune
#M365May @M365May M365May.com @SP_Twit
INFORMATION PROTECTION / RMS
 IRM on O365 (by O365 E3)
 Bring the sharepoint-level permissions to the document.
 Public/private key system and on-the-fly encryption
(public keys RSA 2048 bits, and SHA-256 for signatures)
 See https://docs.microsoft.com/fr-fr/information-protection/understand-explore/how-does-it-work
 Breakable system as soon as you have the “View Only” permissions https://github.com/RUB-NDS/MS-RMS-Attacks
#M365May @M365May M365May.com @SP_Twit
[EMS] CASB WITH CLOUD APP
SECURITY
 Prevent shadow IT
 Licence EMS E5 required
 Allows log/proxy analysis to detect
unauthorized SaaS applications.
 Portal :
https://portal.cloudappsecurity.com/
#M365May @M365May M365May.com @SP_Twit
35
Admin data leak
#M365May @M365May M365May.com @SP_Twit
HE WAS SHAREPOINT ADMIN
#M365May @M365May M365May.com @SP_Twit
POLP – PRINCIPLE OF LEAST
PRIVILEGES APPLIED TO M365 ADMIN
Better security (Snowden only needed backups)
Minimizing the surface of external attacks
Limiting the spread of viruses
#M365May @M365May M365May.com @SP_Twit
GENERAL RECOMMENDATIONS
 Nominal admin accounts.
 2 to 4 global admin accounts MAX
 1 or 2 icebreaker accounts (20+ chars pwd, renewal of password after use and
periodically).
 Dedicated machines to use admin accounts
 MFA/Passwordless mandatory
 Delegation of rights on the principle of the least privilege.
#M365May @M365May M365May.com @SP_Twit
40
Endpoint robbery /
loss
#M365May @M365May M365May.com @SP_Twit
ENDPOINT ROBBERY / LOSS
#M365May @M365May M365May.com @SP_Twit
GENERAL RECOMMENDATIONS
 Bitlocker encryption of hard drives (possibility of becoming local admin otherwise)
 Implementation of MDM/MAM solutions
#M365May @M365May M365May.com @SP_Twit
MDM / MAM
 System Center Configuration Manager (SCCM)
 « old »
 For Windows
 Part of System Center
 Integrable in Intune
 MDM pour O365
 Included in O365
 iOS, Andoid, Windows compatible
 Security policies (password requirement)
 Remote wipe
 [EMS]Microsoft Intune
 Complete MDM
 Included in EMS or apart
 Does MDM for O365
 + Mac OS
 + Apps deployment
 + In App policies (retrict
Copy/paste)
#M365May @M365May M365May.com @SP_Twit
[EMS] REMOTE TERMINAL WIPE FROM
ENDPOINT MANAGER
 https://devicemanagement.microsoft.com/
#M365May @M365May M365May.com @SP_Twit
45
Cryptolockers and
ransomwares
#M365May @M365May M365May.com @SP_Twit
SECURE ACTIVE DIRECTORY
 AD remains the first point of vulnerability
#M365May @M365May M365May.com @SP_Twit
ONEDRIVE FOR BUSINESS
 Use OneDrive to sync Desktop / My documents / Pictures
#M365May @M365May M365May.com @SP_Twit
RESTORING ONEDRIVE, SHAREPOINT
AND TEAMS DOCUMENTS

#M365May @M365May M365May.com @SP_Twit
[EMS] BLOCK UNSAFE MACHINES
WITH INTUNE
 Create an Intune policy https://devicemanagement.microsoft.com/

#M365May @M365May M365May.com @SP_Twit
50
And if I have no
time?
#M365May @M365May M365May.com @SP_Twit
SAFETY IF YOU START FROM
SCRATCH A TENANT
 Admin MFA
 Users MFA
 Deactivation of legacy
protocols
 MFA for actions with privilege
 This is the future of Microsoft
default settings within 5 years
#M365May @M365May M365May.com @SP_Twit
COMPETITION WEEK 4
SCAN THE QR CODE TO ENTER THE PRIZE DRAW
COMPETITION AND PRIZE RULES
m365may.com/competition-rules
#M365May @M365May M365May.com @SP_Twit
THANK YOU TO OUR SPONSORSTHANK YOU TO OUR SPONSORS

More Related Content

Similar to Cybersecurity and Microsoft 365 in Action

All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020Sébastien Paulet
 
ITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT securityITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT securityITCamp
 
Sentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer PostsSentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer PostsChris Bortlik
 
[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus Tober
[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus Tober[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus Tober
[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus ToberSearchmetrics
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET Journal
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOVHcloud
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...
Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...
Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...Eldert Grootenboer
 
CryptoMondays - Suren Ravindra - Knabu - August 2019
CryptoMondays - Suren Ravindra - Knabu - August 2019CryptoMondays - Suren Ravindra - Knabu - August 2019
CryptoMondays - Suren Ravindra - Knabu - August 2019Hydrogen Group
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
M365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptx
M365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptxM365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptx
M365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptxKai Stenberg
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4Rohit Kapoor
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini PresentationRohit Kapoor
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)Rohit Kapoor
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siegeMeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siegeRiccardo Tempesta
 

Similar to Cybersecurity and Microsoft 365 in Action (20)

All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020
 
ITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT securityITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT security
 
#MSIGNITE by Metricool
#MSIGNITE by Metricool #MSIGNITE by Metricool
#MSIGNITE by Metricool
 
Sentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer PostsSentiment Analysis for Yammer Posts
Sentiment Analysis for Yammer Posts
 
[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus Tober
[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus Tober[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus Tober
[US] 2015 Mobile Ranking Factors and Google Mobile Update - Marcus Tober
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...
Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...
Implementing ChatOps using Microsoft Power Platform - M365 Saturday Ahmedabad...
 
#Mobile360 by Metricool Mayo 2019
#Mobile360 by Metricool  Mayo 2019 #Mobile360 by Metricool  Mayo 2019
#Mobile360 by Metricool Mayo 2019
 
CryptoMondays - Suren Ravindra - Knabu - August 2019
CryptoMondays - Suren Ravindra - Knabu - August 2019CryptoMondays - Suren Ravindra - Knabu - August 2019
CryptoMondays - Suren Ravindra - Knabu - August 2019
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
M365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptx
M365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptxM365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptx
M365VM-Kai Stenberg - 5 ways to succeed on Teams Telephony.pptx
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siegeMeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
MeetMagento NL 2018 - Riccardo Tempesta - Magento 2 under siege
 

More from Sébastien Paulet

aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...Sébastien Paulet
 
aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021Sébastien Paulet
 
aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021Sébastien Paulet
 
Teams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsTeams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsSébastien Paulet
 
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Sébastien Paulet
 
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Sébastien Paulet
 
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020Sébastien Paulet
 
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesaOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesSébastien Paulet
 
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365Sébastien Paulet
 
aOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsaOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsSébastien Paulet
 
aOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsaOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsSébastien Paulet
 
aOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushaOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushSébastien Paulet
 
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesaOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesSébastien Paulet
 
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...Sébastien Paulet
 
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Sébastien Paulet
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Sébastien Paulet
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...Sébastien Paulet
 
Back from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexBack from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexSébastien Paulet
 
MWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionMWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionSébastien Paulet
 
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365Sébastien Paulet
 

More from Sébastien Paulet (20)

aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
 
aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021
 
aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021
 
Teams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsTeams Nation - Syntex dans Teams
Teams Nation - Syntex dans Teams
 
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
 
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
 
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesaOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
 
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
 
aOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsaOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teams
 
aOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsaOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teams
 
aOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushaOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rush
 
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesaOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
 
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
 
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
 
Back from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexBack from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortex
 
MWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionMWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en action
 
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Cybersecurity and Microsoft 365 in Action

  • 1. #M365May @M365May M365May.com @SP_Twit CYBERSECURITY AND MICROSOFT 365 IN ACTION SÉBASTIEN PAULET @SP_TWIT
  • 2. #M365May @M365May M365May.com @SP_Twit THANK YOU TO OUR SPONSORSTHANK YOU TO OUR SPONSORS
  • 3. #M365May @M365May M365May.com @SP_Twit TRADITIONAL OWNERS We acknowledge the traditional custodians of the land on which this online conference is hosted, and the traditional custodians of the lands where our Australian-based speakers and participants are located. We would also like to pay our respects to Elders past, present and future Tēnā koutou, tēnā koutou, tēnā tātou katoa. On behalf of M365 May we would like to welcome and acknowledge all our speakers and participants from Aotearoa New Zealand. Thank you for supporting this hui. Tēnā koutou, tēnā koutou, tēnā tātou katoa. WELCOME TO OUR SPEAKERS AND PARTICIPANTS FROM AROUND THE WORLD
  • 4. #M365May @M365May M365May.com @SP_Twit SÉBASTIEN PAULET Document Mgt, Compliance, IT Security, Lean Blog : https://sppublish.wordpress.com/
  • 5. #M365May @M365May M365May.com @SP_Twit 6 Security and M365
  • 6. #M365May @M365May M365May.com @SP_Twit MICROSOFT 365 Windows Office 365 EM+S
  • 7. #M365May @M365May M365May.com @SP_Twit ENTERPRISE MOBILITY + SECURITY  Azure Active Directory Premium  Azure MFA  Azure Advanced Protection  Microsoft Cloud App Security  Azure Information Protection Premium  Azure Right Management Premium  Intune
  • 8. #M365May @M365May M365May.com @SP_Twit THIS SESSION PROGRAM  Fraud to the Chairman / Phishing  Brute force / spray attack  Bypassing MFA  Enduser data leak  Admins data leak  Endpoint robbery / loss  Cryptolocker
  • 9. #M365May @M365May M365May.com @SP_Twit 10 Fraud to the Chairman / Phishing
  • 10. #M365May @M365May M365May.com @SP_Twit FRAUD TO THE CHAIRMAN / PHISHING  Decreases for large companies, an increase for small and medium-sized enterprises (SMEs)  To protect yourself :  Awareness  Don't leave information on the Internet  ACTION : Prevent email spoofing by implementing SPF, DKIM, DMARC
  • 11. #M365May @M365May M365May.com @SP_Twit EXCHANGE ONLINE PROTECTION (EOP)  Feature included in O365. Add-on for Exchange On-Premise  Incoming emails:  Filter  Antivirus  Policies check  Anti Spam  [EMS]If ATP, ATP  Delivery
  • 12. #M365May @M365May M365May.com @SP_Twit [EMS]OFFICE 365 ATP  Safe Links  Antiphishing protection of risky mailboxes (max 60 mailboxes protected)  Attachments analysis
  • 13. #M365May @M365May M365May.com @SP_Twit 14 Brute force / spray attack
  • 14. #M365May @M365May M365May.com @SP_Twit BREAK A PASSWORD  Password spray  Brute force  User base purchase (73% of users reuse pwd)  Phishing  Keylog  Written passwords  Extortion
  • 15. #M365May @M365May M365May.com @SP_Twit SIMULER UNE ATTAQUE SPRAY/BRUTE FORCE (O365 E5) Top 10 passwords:  123456  password  000000  1qaz2wsx  a123456  abc123  abcd1234  1234qwer  qwe123  123qwe
  • 16. #M365May @M365May M365May.com @SP_Twit PREVIEW : ENDUSERS CHECK THEIR OWN LOGIN DATA See: https://mysignins.microsoft.com or https://myprofile.microsoft.com/
  • 17. #M365May @M365May M365May.com @SP_Twit REGULAR MFA  Included with Office 365  Set up the session cache/authentication method.  [EMS]Conditional Access  Keep an admin account without MFA (Glass breaker) with random password of 20 characters minimum
  • 18. #M365May @M365May M365May.com @SP_Twit DISABLE LEGACY PROTOCOLS Microsoft will disable basic authentication protocols (except SMTP) from October 2020 Protocol / service Parameter (for Policies) Exchange Active Sync (EAS) AllowBasicAuthActiveSync Autodiscover AllowBasicAuthAutodiscover IMAP4 AllowBasicAuthImap MAPI over HTTP (MAPI/HTTP) AllowBasicAuthMapi Offline Address Book (OAB) AllowBasicAuthOfflineAddressBook Outlook Service AllowBasicAuthOutlookService POP3 AllowBasicAuthPop Reporting Web Services AllowBasicAuthReportingWebServices Outlook Anywhere (RPC over HTTP) AllowBasicAuthRpc Authenticated SMTP AllowBasicAuthSmtp Exchange Web Services (EWS) AllowBasicAuthWebServices PowerShell AllowBasicAuthPowerShell
  • 19. #M365May @M365May M365May.com @SP_Twit DISABLE AUTOMATIC EMAIL FORWARD  First action a pirate does once he enters an account : email forward  Block it by running Exchange Online Powershell Module <# Delete existing forwards #> PS > $AllForwards = Get-Mailbox -ResultSize Unlimited -Filter {(RecipientTypeDetails -ne "DiscoveryMailbox") -and ((ForwardingSmtpAddress -ne $null) -or (ForwardingAddress -ne $null))} | Select Identity PS > $AllForwards | % {Set-Mailbox -Identity $_.Identity - ForwardingSmtpAddress $null -ForwardingAddress $null} <# Disable forward creation #> PS > Set-RemoteDomain Default -AutoForwardEnabled $false
  • 20. #M365May @M365May M365May.com @SP_Twit 22 Bypass MFA
  • 21. #M365May @M365May M365May.com @SP_Twit BYPASS 2FA  Jack Dorsey, Twitter CEO. Hacked by SIM SWAP in August 2019
  • 22. #M365May @M365May M365May.com @SP_Twit MITM MFA TOOL : EVILGINX
  • 23. #M365May @M365May M365May.com @SP_Twit MITM MFA DEMO : EVILGINX @SP_twit #aOSNoumea
  • 24. #M365May @M365May M365May.com @SP_Twit PASSWORDLESS WITH AUTHENTICATOR  On enduser side, go to https://aka.ms/mysecurityinfo to set up Authenticator (requires recording the phone)  Don’t protect against MitM attacks
  • 25. #M365May @M365May M365May.com @SP_Twit FIDO2  MIIT attack proof
  • 26. #M365May @M365May M365May.com @SP_Twit 29 Enduser data leak
  • 27. #M365May @M365May M365May.com @SP_Twit INTERNAL THREAT Source : Haystax Insider threat report 2019
  • 28. #M365May @M365May M365May.com @SP_Twit SENSITIVITY LABELS  Office 365 E3 requis  Disponible in Outlook, SharePoint, OWA and O365 Pro Plus clients
  • 29. #M365May @M365May M365May.com @SP_Twit SENSITIVITY LABELS - EFFECTS  File encryption -> Unable to open for unauthorized / not authenticated users  Restriction of permissions -> Disabling copy and paste, printing, screenshot, email transfer, etc.  Watermarking -> on Word files  [EMS] Blocking copy on USB key / Attachments on non O365 services -> Requieres WIP (Windows Information Protection) and Intune
  • 30. #M365May @M365May M365May.com @SP_Twit INFORMATION PROTECTION / RMS  IRM on O365 (by O365 E3)  Bring the sharepoint-level permissions to the document.  Public/private key system and on-the-fly encryption (public keys RSA 2048 bits, and SHA-256 for signatures)  See https://docs.microsoft.com/fr-fr/information-protection/understand-explore/how-does-it-work  Breakable system as soon as you have the “View Only” permissions https://github.com/RUB-NDS/MS-RMS-Attacks
  • 31. #M365May @M365May M365May.com @SP_Twit [EMS] CASB WITH CLOUD APP SECURITY  Prevent shadow IT  Licence EMS E5 required  Allows log/proxy analysis to detect unauthorized SaaS applications.  Portal : https://portal.cloudappsecurity.com/
  • 32. #M365May @M365May M365May.com @SP_Twit 35 Admin data leak
  • 33. #M365May @M365May M365May.com @SP_Twit HE WAS SHAREPOINT ADMIN
  • 34. #M365May @M365May M365May.com @SP_Twit POLP – PRINCIPLE OF LEAST PRIVILEGES APPLIED TO M365 ADMIN Better security (Snowden only needed backups) Minimizing the surface of external attacks Limiting the spread of viruses
  • 35. #M365May @M365May M365May.com @SP_Twit GENERAL RECOMMENDATIONS  Nominal admin accounts.  2 to 4 global admin accounts MAX  1 or 2 icebreaker accounts (20+ chars pwd, renewal of password after use and periodically).  Dedicated machines to use admin accounts  MFA/Passwordless mandatory  Delegation of rights on the principle of the least privilege.
  • 36. #M365May @M365May M365May.com @SP_Twit 40 Endpoint robbery / loss
  • 37. #M365May @M365May M365May.com @SP_Twit ENDPOINT ROBBERY / LOSS
  • 38. #M365May @M365May M365May.com @SP_Twit GENERAL RECOMMENDATIONS  Bitlocker encryption of hard drives (possibility of becoming local admin otherwise)  Implementation of MDM/MAM solutions
  • 39. #M365May @M365May M365May.com @SP_Twit MDM / MAM  System Center Configuration Manager (SCCM)  « old »  For Windows  Part of System Center  Integrable in Intune  MDM pour O365  Included in O365  iOS, Andoid, Windows compatible  Security policies (password requirement)  Remote wipe  [EMS]Microsoft Intune  Complete MDM  Included in EMS or apart  Does MDM for O365  + Mac OS  + Apps deployment  + In App policies (retrict Copy/paste)
  • 40. #M365May @M365May M365May.com @SP_Twit [EMS] REMOTE TERMINAL WIPE FROM ENDPOINT MANAGER  https://devicemanagement.microsoft.com/
  • 41. #M365May @M365May M365May.com @SP_Twit 45 Cryptolockers and ransomwares
  • 42. #M365May @M365May M365May.com @SP_Twit SECURE ACTIVE DIRECTORY  AD remains the first point of vulnerability
  • 43. #M365May @M365May M365May.com @SP_Twit ONEDRIVE FOR BUSINESS  Use OneDrive to sync Desktop / My documents / Pictures
  • 44. #M365May @M365May M365May.com @SP_Twit RESTORING ONEDRIVE, SHAREPOINT AND TEAMS DOCUMENTS 
  • 45. #M365May @M365May M365May.com @SP_Twit [EMS] BLOCK UNSAFE MACHINES WITH INTUNE  Create an Intune policy https://devicemanagement.microsoft.com/ 
  • 46. #M365May @M365May M365May.com @SP_Twit 50 And if I have no time?
  • 47. #M365May @M365May M365May.com @SP_Twit SAFETY IF YOU START FROM SCRATCH A TENANT  Admin MFA  Users MFA  Deactivation of legacy protocols  MFA for actions with privilege  This is the future of Microsoft default settings within 5 years
  • 48. #M365May @M365May M365May.com @SP_Twit COMPETITION WEEK 4 SCAN THE QR CODE TO ENTER THE PRIZE DRAW COMPETITION AND PRIZE RULES m365may.com/competition-rules
  • 49. #M365May @M365May M365May.com @SP_Twit THANK YOU TO OUR SPONSORSTHANK YOU TO OUR SPONSORS

Editor's Notes

  1. We acknowledge the traditional custodians of the land on which  this online conference is hosted, and the traditional custodians of the lands where our Australian-based speakers and participants are located.  We would also like to pay our respects to Elders past, present and future. Tēnā koutou, tēnā koutou, tēnā tātou katoa. Ko Rebecca Jackson tōku ingoa. Nō Melbourne au. On behalf of M365 May I would like to welcome and acknowledge all our speakers and participants from Aotearoa New Zealand. Thank you for supporting this hui.
  2. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  3. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  4. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  5. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  6. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  7. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  8. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  9. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  10. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  11. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  12. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  13. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  14. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  15. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  16. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  17. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  18. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  19. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  20. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  21. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  22. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  23. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  24. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  25. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  26. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  27. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  28. Centre de sécurité > Gestion des menaces > Simulateur d’attaques
  29. Centre de sécurité > Gestion des menaces > Simulateur d’attaques