SlideShare a Scribd company logo
1 of 27
Combatting
Cyberthreats
with Microsoft 365 Defender
MICHAEL NOEL, CCO CollabDays
Finland
9.9.2023
Michael Noel
@MichaelTNoel
Authored/Co-authored 20 books including the best-selling
SharePoint, Exchange, and Windows Unleashed series
Presented at over 250 events in 91 UN countries and all
continents of the world
Partner at Convergent Computing in the San Francisco Bay
Area (cco.com)
Microsoft Security Products
Microsoft Sentinel
◦ Security Information and Event Management Platform
◦ Centralized location for logs, alerting, and
Microsoft Entra
◦ Cloud Infrastructure Entitlement Management
◦ Permissions Management/Governance
Microsoft Purview
◦ Information Protection / DLP
◦ Regulatory / Risk Management
Microsoft Priva
◦ Privacy Management
◦ Compliance / Subject Rights Requests
Microsoft Intune
◦ Mobile Device Management (MDM) Platform
◦ Updates, deployment, autopilot, apps, etc.
Microsoft Defender
◦ Threat protection across clients, on-prem, and cloud
◦ The subject of this session…
Microsoft Security Copilot (Preview)
◦ Artificial Intelligence / Skynet
◦ Finally, robotic beings rule the world
Microsoft 365 Defender
Tools and Integrations
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Azure Active Directory Identity Protection
Microsoft Data Loss Prevention
App Governance
Microsoft Defender for Endpoint
Endpoint security/hygiene
platform for Windows and
Mac clients
Dynamically reduces attack
surfaces, discovered
vulnerabilities and
misconfigurations
Extends capabilities of built-
in Windows Defender to
allow reporting and
management from the
Defender console in the
cloud
Microsoft Defender for Office 365
Security toolset
for Exchange
Online and
SharePoint Online
Includes phishing
training
simulations
AI automation
based to improve
noise/signal ratio
Microsoft Defender for Office 365
Built-in natively to all
versions of Office 365 in
basic EOP and SOP form.
P1 License extends
functionality to move
beyond reacting to threats
and instead helps to detect
and be more protactive
P2 License improves the
ability to dynamically
respond to threats.
Microsoft Defender for Identity (MDI)
MDI deploys sensors to domain
controllers to look for behaviors
associated with compromised
internal systems
MDI Sensors perform their
calculations locally and then
forward their alerts to the cloud
MDI Integrates with MDCA to
provide a single console
experience for hybrid events
(On-Prem with MDI and Online
with MCAS)
Microsoft Defender for Cloud Apps
MDCA is a multimode Cloud
Access Security Broker (CASB)
Proactively identifies threats
across and in between cloud
platforms
Now integrated into the
Microsoft 365 Defender
console
(security.microsoft.com)
Microsoft Defender
Vulnerability Management
Provides mechanisms to
inventory and remediate
vulnerabilities and
weaknesses in applications,
browser extensions, and
discovered certificates.
Create security baselines,
remediation packages, and
address risks that factor into
your organization’s Secure
Score
Azure Active Directory Identity Protection
Service built into Azure
that feeds alerts and
signals into MS
Defender
Microsoft Data Loss
Prevention
DLP Technologies are part of MS Purview but
are part of the signals received by MS
Defender and are can be integrated into
security runbooks
DLP is about protecting content and
controlling what happens to it after its been
properly accessed (i.e. restricting
copy/paste, print, etc.)
App Governance
App governance add-on to
Defender for Cloud apps allows for
quick view of all third-party apps
in your tenant
Governance policies, detection
alerts, and remediation of oAuth
enabled apps that register with
Azure AD helps strengthen
security and compliance posture
Microsoft Defender for Cloud
(prev. Azure Defender)
MS Defender for Servers
MS Defender for Storage
MS Defender for SQL
MS Defender for Containers
MS Defender for App Service
MS Defender for Key Vault
MS Defender for Resource
Manager
MS Defender for DNS
MS Defender for open-source
relational databases
MS Defender for Azure Cosmos
DB
Microsoft Security Copilot
Artificial Intelligence (AI) based on
the ChatGPT technologies licensed
by Microsoft
Prompt bar that uses natural
language selection – You can
upload files, urls, code snippets,
etc. to find more information about
them.
Immutable audit trail and
information from your security
tools is kept private. Transparency
designed in.
Pin board allows for quick
researching during security alerts.
Skynet Jr. ;)
AI based behavioral analytics engine
Important to configure the following:
◦ Activity Log
◦ Discovery log
◦ Proxy log
After configuring sources, fine-tune the following
policies:
◦ Anomaly detection
◦ Cloud Discovery anomaly detection
◦ Rule-based activity detection
Detect Suspicious User Activity with
MDCA behavioral analytics (UEBA)
Investigative Priority
Score
◦ Helps to determine which
users to investigate first
◦ Based on user profiles that
are created from analytics
◦ Dynamic investigation
priority score – updated
based on recent behavior
and impact
Investigate Risky Users
Investigate risky OAuth apps
• MDCA will alert on
OAuth apps that
seem risky
• Identifies
possible OAuth
phishing exploits
• Detect risky apps
using either
alerts or via
hunting
Use MDCA to protect
apps via the following:
◦Monitor user activities
for anomalies
◦Protect data from
exfiltration
◦Prevent unprotected
data from being
uploaded
Protect company apps in real time
Block unauthorized
downloads with the
following:
◦ Create a block download policy
for unmanaged devices
◦ Configure your IdP to work
with MDCA
◦ Create a session policy
◦ Validate your policy
Block download of sensitive
information
Create file
policies to find
places with
sensitive
information
Use admin
quarantine for
files
Protect files with admin
quarantine
Identify public
permissions set on
documents
Set up data protection
Validate your policy
Set up automatic
encryption of files
Automatically apply MS Information
Protection sensitivity labels
Remediate endpoints
through the following
process:
◦ Generate a Defender for
Cloud Apps API token
◦ Create a flow to run an
antivirus scan
◦ Configure the flow
◦ Configure a policy to run the
flow
Extend governance to endpoint
remediation
Licensing for MS Defender
Individuals
◦ Basic functionality built-into MS 365 Personal or Family plans
◦ Very pared back version, includes personal security app and mainly endpoint
protections
Small and Mid-sized Businesses:
◦ Built-in to MS 365 Business Premium
◦ €3/user/month Standalone
◦ €3 /license/month servers
Enterprises:
◦ E5/A5 Plans include full licenses
◦ A la carte licenses available for Defender for Office 365, Defender for Endpoint,
Defender for Cloud Apps, and Defender for Identity. Can be added to E3.
And yes, this is
what AI
generated
when I asked it
to create me an
image of a man
giving a demo
in Finland… ;)
Kiitos! Kysymyksiä?
CCO.com
@MichaelTNoel
Linkedin.com/in/michaeltnoel
SharingTheGlobe.com
Slideshare.net/michaeltnoel
Michael Noel

More Related Content

Similar to Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023

Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and SecurityCreate IT
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security CenterMicrosoft
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAmazon Web Services
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
 
Microsoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptxMicrosoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptxInfosectrain3
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 
03_Azure Security Center_GAB2019
03_Azure Security Center_GAB201903_Azure Security Center_GAB2019
03_Azure Security Center_GAB2019Kumton Suttiraksiri
 

Similar to Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023 (20)

Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security Center
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Microsoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptxMicrosoft Sentinel and Its Components.pptx
Microsoft Sentinel and Its Components.pptx
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
 
03_Azure Security Center_GAB2019
03_Azure Security Center_GAB201903_Azure Security Center_GAB2019
03_Azure Security Center_GAB2019
 

More from Michael Noel

AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...Michael Noel
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleMichael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Michael Noel
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Michael Noel
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Michael Noel
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Michael Noel
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Michael Noel
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Michael Noel
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Michael Noel
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...Michael Noel
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Michael Noel
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Michael Noel
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Michael Noel
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014Michael Noel
 
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...Michael Noel
 

More from Michael Noel (20)

AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital Brazzaville
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
 
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023

  • 1. Combatting Cyberthreats with Microsoft 365 Defender MICHAEL NOEL, CCO CollabDays Finland 9.9.2023
  • 2.
  • 3. Michael Noel @MichaelTNoel Authored/Co-authored 20 books including the best-selling SharePoint, Exchange, and Windows Unleashed series Presented at over 250 events in 91 UN countries and all continents of the world Partner at Convergent Computing in the San Francisco Bay Area (cco.com)
  • 4. Microsoft Security Products Microsoft Sentinel ◦ Security Information and Event Management Platform ◦ Centralized location for logs, alerting, and Microsoft Entra ◦ Cloud Infrastructure Entitlement Management ◦ Permissions Management/Governance Microsoft Purview ◦ Information Protection / DLP ◦ Regulatory / Risk Management Microsoft Priva ◦ Privacy Management ◦ Compliance / Subject Rights Requests Microsoft Intune ◦ Mobile Device Management (MDM) Platform ◦ Updates, deployment, autopilot, apps, etc. Microsoft Defender ◦ Threat protection across clients, on-prem, and cloud ◦ The subject of this session… Microsoft Security Copilot (Preview) ◦ Artificial Intelligence / Skynet ◦ Finally, robotic beings rule the world
  • 5. Microsoft 365 Defender Tools and Integrations Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Microsoft Defender Vulnerability Management Azure Active Directory Identity Protection Microsoft Data Loss Prevention App Governance
  • 6. Microsoft Defender for Endpoint Endpoint security/hygiene platform for Windows and Mac clients Dynamically reduces attack surfaces, discovered vulnerabilities and misconfigurations Extends capabilities of built- in Windows Defender to allow reporting and management from the Defender console in the cloud
  • 7. Microsoft Defender for Office 365 Security toolset for Exchange Online and SharePoint Online Includes phishing training simulations AI automation based to improve noise/signal ratio
  • 8. Microsoft Defender for Office 365 Built-in natively to all versions of Office 365 in basic EOP and SOP form. P1 License extends functionality to move beyond reacting to threats and instead helps to detect and be more protactive P2 License improves the ability to dynamically respond to threats.
  • 9. Microsoft Defender for Identity (MDI) MDI deploys sensors to domain controllers to look for behaviors associated with compromised internal systems MDI Sensors perform their calculations locally and then forward their alerts to the cloud MDI Integrates with MDCA to provide a single console experience for hybrid events (On-Prem with MDI and Online with MCAS)
  • 10. Microsoft Defender for Cloud Apps MDCA is a multimode Cloud Access Security Broker (CASB) Proactively identifies threats across and in between cloud platforms Now integrated into the Microsoft 365 Defender console (security.microsoft.com)
  • 11. Microsoft Defender Vulnerability Management Provides mechanisms to inventory and remediate vulnerabilities and weaknesses in applications, browser extensions, and discovered certificates. Create security baselines, remediation packages, and address risks that factor into your organization’s Secure Score
  • 12. Azure Active Directory Identity Protection Service built into Azure that feeds alerts and signals into MS Defender
  • 13. Microsoft Data Loss Prevention DLP Technologies are part of MS Purview but are part of the signals received by MS Defender and are can be integrated into security runbooks DLP is about protecting content and controlling what happens to it after its been properly accessed (i.e. restricting copy/paste, print, etc.)
  • 14. App Governance App governance add-on to Defender for Cloud apps allows for quick view of all third-party apps in your tenant Governance policies, detection alerts, and remediation of oAuth enabled apps that register with Azure AD helps strengthen security and compliance posture
  • 15. Microsoft Defender for Cloud (prev. Azure Defender) MS Defender for Servers MS Defender for Storage MS Defender for SQL MS Defender for Containers MS Defender for App Service MS Defender for Key Vault MS Defender for Resource Manager MS Defender for DNS MS Defender for open-source relational databases MS Defender for Azure Cosmos DB
  • 16. Microsoft Security Copilot Artificial Intelligence (AI) based on the ChatGPT technologies licensed by Microsoft Prompt bar that uses natural language selection – You can upload files, urls, code snippets, etc. to find more information about them. Immutable audit trail and information from your security tools is kept private. Transparency designed in. Pin board allows for quick researching during security alerts. Skynet Jr. ;)
  • 17. AI based behavioral analytics engine Important to configure the following: ◦ Activity Log ◦ Discovery log ◦ Proxy log After configuring sources, fine-tune the following policies: ◦ Anomaly detection ◦ Cloud Discovery anomaly detection ◦ Rule-based activity detection Detect Suspicious User Activity with MDCA behavioral analytics (UEBA)
  • 18. Investigative Priority Score ◦ Helps to determine which users to investigate first ◦ Based on user profiles that are created from analytics ◦ Dynamic investigation priority score – updated based on recent behavior and impact Investigate Risky Users
  • 19. Investigate risky OAuth apps • MDCA will alert on OAuth apps that seem risky • Identifies possible OAuth phishing exploits • Detect risky apps using either alerts or via hunting
  • 20. Use MDCA to protect apps via the following: ◦Monitor user activities for anomalies ◦Protect data from exfiltration ◦Prevent unprotected data from being uploaded Protect company apps in real time
  • 21. Block unauthorized downloads with the following: ◦ Create a block download policy for unmanaged devices ◦ Configure your IdP to work with MDCA ◦ Create a session policy ◦ Validate your policy Block download of sensitive information
  • 22. Create file policies to find places with sensitive information Use admin quarantine for files Protect files with admin quarantine
  • 23. Identify public permissions set on documents Set up data protection Validate your policy Set up automatic encryption of files Automatically apply MS Information Protection sensitivity labels
  • 24. Remediate endpoints through the following process: ◦ Generate a Defender for Cloud Apps API token ◦ Create a flow to run an antivirus scan ◦ Configure the flow ◦ Configure a policy to run the flow Extend governance to endpoint remediation
  • 25. Licensing for MS Defender Individuals ◦ Basic functionality built-into MS 365 Personal or Family plans ◦ Very pared back version, includes personal security app and mainly endpoint protections Small and Mid-sized Businesses: ◦ Built-in to MS 365 Business Premium ◦ €3/user/month Standalone ◦ €3 /license/month servers Enterprises: ◦ E5/A5 Plans include full licenses ◦ A la carte licenses available for Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps, and Defender for Identity. Can be added to E3.
  • 26. And yes, this is what AI generated when I asked it to create me an image of a man giving a demo in Finland… ;)