SlideShare a Scribd company logo
SaaS, Mastered.
5 Effective
M365 IT Pro
Habits
16 | February | 2021
MORNING COFFEE WITH
OUR FOUNDERS
SaaS, Mastered.
GRAB YOUR COFFEE AND ENJOY THE SESSION
• This session will be recorded will be
shared with everyone after the event
• If you have questions, please type them in
the questions area and we’ll save time to
answer those at the end
• If you have technical difficulties, please
chat those into the moderator and we’ll do
our best to address them
CONFIDENTIAL | 2
The leading global
SaaS Management Platform
5,000,000+ user mailboxes
managed in over 100 countries
Founded 2014 in Italy
4.8 out of 5 stars
Hundreds of partners
worldwide
Gartner Cool Vendor and
Microsoft Gold Partner
Offices throughout North
America and Europe
Insight Partners-backed
SaaS, Mastered.
David Mascarella
Chief Global Strategist
Ivan Fioravanti
Chief Technology Officer
SaaS, Mastered
PROTECT
YOUR
ADMIN
ACCOUNTS
WORKFLOW
APPLY
POLICIES
LICENSING
LEAST
PRIVILEGE
ACCESS
4 RULES
These accounts have the keys of your
kingdom, protect them!
DEFINE BEST PRACTICES
IS NOT GOOD ENOUGH
Apply and verify policies is a must!
DELEGATED ADMIN
Limit visibility and permissions to
avoid human errors and breaches
AUTOMATION
Provisioning &
Deprovisioning are just
basic processes to
automate
OPTIMIZE LICENSE USAGE
The goal is improving ROI, ensure that
licenses are correctly distributed and used
across your tenant
5 EFFECTIVE M365 IT PROS HABITS
SaaS, Mastered
Consequences for NOT securing
80% of data Breaches involve a
Privileged Identity (Gartner)
85% of reported breaches were
due to misconfiguration (IBM)
Through 2025, 99% of cloud
security failures will be the
customer’s fault (Gartner)
Protect your admin account
Question Time
From 2 to 4
Reduce number of company administrators
Dedicated accounts
Create dedicated Microsoft 365 global administrator
accounts and use them only when necessary
Strong Authentication
MFA is a must! Avoid Conditional access is possible, MFA ALWAYS!
SMS and Calls forbidden if you are under NIST (avoid them if possible)
Authorization
Implement Least Privilege Access
Roles, PIM, PAM, …
Protect Your Admin Accounts
Organization Policy
Question time
SaaS, Mastered
SaaS, Mastered
Policy monitor and enforcement
Track the adherence to your policies and best practices and enforce them.
How does CoreView help?
• Single pane of glass with all your users’
configuration setting.
• Flexibility to validate all your configuration
policies
• Single customizable dashboard to monitor
them
• Alerts to be engaged on misconfiguration
• Single click to remediate misconfiguration
• Exception management
• Automation to enforce policies
SaaS, Mastered
A Challenge: What about Risk-Based Password Management?
How does CoreView help?
• Instead of mandating scheduled password resets, CoreView enables risk-based response with workflow that can log
out, disable, and notify IT.
https://docs.microsoft.com/en-us/microsoft-365/admin/misc/password-policy-recommendations?view=o365-worldwide
SaaS, Mastered
Security Benchmarking
Track your configurations against recommended best practices
How does CoreView help?
• CoreView monitors and can enforce most of the
CIS Benchmark controls for M365
CoreView Automates Customization Required
Least Privilege Access Model
Question Time
Roles
(Too) Many Predefined Roles
Are they granular enough?
Admin Units
Limit visibility, mainly on Azure AD
Multi vs Single Tenant
Multi tenant gives you total segregation and maximum security but…
It will limit productivity and collaboration!
PIM/PAM
PIM - just-in-time assignment
PAM - just-in-time access for task-
based activities (Exchange only)
Least Privilege Access - Microsoft
SaaS, Mastered
Least Privilege Access Model
Single Tenant Virtual Tenants
Defined Roles Custom Roles
SaaS, Mastered
Delegated Administration
SaaS, Mastered.
Protect your Admin Accounts
#01
- Microsoft dedicate page link
- MFA: No Text and Call (NIST)
link
Microsoft 365 Security
for IT Pros
#05
This book is great and monthly
updated:
https://m365securitybook.com/
Useful link to navigate Microsoft 365 security
Center for Internet Security
#02
- A step-by-step checklist to
secure M365 link
Least Privilege Access
#03
- Admin Units link
- PIM link
- PAM link
All Microsoft Admin Centers
#04
- Microsoft Portal Sites: msportals.io
SaaS, Mastered
Don’t fly blind
when it
comes to
M365 security
flaws and
application
use.
Least privilege access to
M365 and other SaaS
Enhanced e-discovery
with enriched data
Security policies
Automated workflows
Document classification
Mitigate Risk
Delegated administration
for segregation of duties
Visibility and Control with
Actionable analytics
Automated workflows
Improve IT
efficiency
License management and
chargebacks
License consumption
optimization
Workload adoption and
proficiency
Maximize SaaS
ROI
Request the free
health check
https://www.coreview.com/office-365-health-check-report/
Thank you!
SaaS, Mastered

More Related Content

What's hot

Security Challenges: Integrating Mac Computers into Windows Environments
Security Challenges: Integrating Mac Computers into Windows EnvironmentsSecurity Challenges: Integrating Mac Computers into Windows Environments
Security Challenges: Integrating Mac Computers into Windows Environments
Carlos Capó
 
The “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active DirectoryThe “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active Directory
ScriptLogic
 
SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017
SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017
SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017
SolarWinds
 
7 Reasons Why Bespoke Software Development Makes Sense
7 Reasons Why Bespoke Software Development Makes Sense 7 Reasons Why Bespoke Software Development Makes Sense
7 Reasons Why Bespoke Software Development Makes Sense
Schnell Solutions Limited
 
Windows 10 Migration
Windows 10 MigrationWindows 10 Migration
Windows 10 Migration
Ambareesh Kulkarni
 
Remote Workers MDM Management
Remote Workers MDM Management Remote Workers MDM Management
Remote Workers MDM Management
Ivanti
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
Apixel IT Support
 
Securing the cloud and your assets
Securing the cloud and your assetsSecuring the cloud and your assets
Securing the cloud and your assets
Marcus Dempsey
 
AWS Summit - Auckland 2017 - Cloud Ops
AWS Summit - Auckland 2017 - Cloud OpsAWS Summit - Auckland 2017 - Cloud Ops
AWS Summit - Auckland 2017 - Cloud Ops
API Talent
 
SCUG.DK - Automation Strategy - April 2015
SCUG.DK - Automation Strategy - April 2015SCUG.DK - Automation Strategy - April 2015
SCUG.DK - Automation Strategy - April 2015
Ronni Pedersen
 
TechEd recap of SAP's mobile strategy + my critical view
TechEd recap of SAP's mobile strategy + my critical viewTechEd recap of SAP's mobile strategy + my critical view
TechEd recap of SAP's mobile strategy + my critical view
tamas_szirtes
 
Empathy in Monitoring
Empathy in MonitoringEmpathy in Monitoring
Empathy in Monitoring
Zenoss
 
June 2021 Microsoft 365 Need to Know Webinar
June 2021 Microsoft 365 Need to Know WebinarJune 2021 Microsoft 365 Need to Know Webinar
June 2021 Microsoft 365 Need to Know Webinar
Robert Crane
 
Bulwarklabs
BulwarklabsBulwarklabs
Bulwarklabs
Bulwark Labs
 
The Newgistics Digital Transformation Journey
The Newgistics Digital Transformation JourneyThe Newgistics Digital Transformation Journey
The Newgistics Digital Transformation Journey
Zenoss
 
Office 365 FactSheet-2
Office 365 FactSheet-2Office 365 FactSheet-2
Office 365 FactSheet-2
Stuart Potter
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentation
Sue Baxter
 
What's New in Puppet Enterprise 2015.3
What's New in Puppet Enterprise 2015.3What's New in Puppet Enterprise 2015.3
What's New in Puppet Enterprise 2015.3
Puppet
 
AOS - One Offering
AOS - One OfferingAOS - One Offering
AOS - One Offering
NGINX at F5
 
Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...
Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...
Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...
TOPdesk
 

What's hot (20)

Security Challenges: Integrating Mac Computers into Windows Environments
Security Challenges: Integrating Mac Computers into Windows EnvironmentsSecurity Challenges: Integrating Mac Computers into Windows Environments
Security Challenges: Integrating Mac Computers into Windows Environments
 
The “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active DirectoryThe “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active Directory
 
SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017
SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017
SolarWinds Federal Webinar: Technical Update & New Feature Demo May 16, 2017
 
7 Reasons Why Bespoke Software Development Makes Sense
7 Reasons Why Bespoke Software Development Makes Sense 7 Reasons Why Bespoke Software Development Makes Sense
7 Reasons Why Bespoke Software Development Makes Sense
 
Windows 10 Migration
Windows 10 MigrationWindows 10 Migration
Windows 10 Migration
 
Remote Workers MDM Management
Remote Workers MDM Management Remote Workers MDM Management
Remote Workers MDM Management
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
 
Securing the cloud and your assets
Securing the cloud and your assetsSecuring the cloud and your assets
Securing the cloud and your assets
 
AWS Summit - Auckland 2017 - Cloud Ops
AWS Summit - Auckland 2017 - Cloud OpsAWS Summit - Auckland 2017 - Cloud Ops
AWS Summit - Auckland 2017 - Cloud Ops
 
SCUG.DK - Automation Strategy - April 2015
SCUG.DK - Automation Strategy - April 2015SCUG.DK - Automation Strategy - April 2015
SCUG.DK - Automation Strategy - April 2015
 
TechEd recap of SAP's mobile strategy + my critical view
TechEd recap of SAP's mobile strategy + my critical viewTechEd recap of SAP's mobile strategy + my critical view
TechEd recap of SAP's mobile strategy + my critical view
 
Empathy in Monitoring
Empathy in MonitoringEmpathy in Monitoring
Empathy in Monitoring
 
June 2021 Microsoft 365 Need to Know Webinar
June 2021 Microsoft 365 Need to Know WebinarJune 2021 Microsoft 365 Need to Know Webinar
June 2021 Microsoft 365 Need to Know Webinar
 
Bulwarklabs
BulwarklabsBulwarklabs
Bulwarklabs
 
The Newgistics Digital Transformation Journey
The Newgistics Digital Transformation JourneyThe Newgistics Digital Transformation Journey
The Newgistics Digital Transformation Journey
 
Office 365 FactSheet-2
Office 365 FactSheet-2Office 365 FactSheet-2
Office 365 FactSheet-2
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentation
 
What's New in Puppet Enterprise 2015.3
What's New in Puppet Enterprise 2015.3What's New in Puppet Enterprise 2015.3
What's New in Puppet Enterprise 2015.3
 
AOS - One Offering
AOS - One OfferingAOS - One Offering
AOS - One Offering
 
Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...
Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...
Bruger og kontekstbaseret tilgang til automatiseret IT-service levering - TOP...
 

Similar to 5 Effective M365 IT Pro Habits

DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
Shannon Lietz
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
Shannon Lietz
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
Shannon Lietz
 
Salesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social EnterpriseSalesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social Enterprise
James Hindes
 
Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
Bluewolf
 
Dsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation successDsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation success
Bootstrap Marketing
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Teemu Tiainen
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
TechSoup
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
Smart ERP Solutions, Inc.
 
10 differences between SAFe and LeSS
10 differences between SAFe and LeSS10 differences between SAFe and LeSS
10 differences between SAFe and LeSS
Stanislaw Matczak
 
Atlassian summit comes to you - London AUG
Atlassian summit comes to you - London AUGAtlassian summit comes to you - London AUG
Atlassian summit comes to you - London AUG
Beejal Nagar
 
TrailblazerDX Motihari.pptx
TrailblazerDX Motihari.pptxTrailblazerDX Motihari.pptx
TrailblazerDX Motihari.pptx
Om Prakash
 
Future Proof Your DAM
Future Proof Your DAMFuture Proof Your DAM
Future Proof Your DAM
jflorance
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features
Cireson
 
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Emtec Inc.
 
Mark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment JourneyMark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment Journey
IBM Sverige
 
How to grow to a modern workplace in 16 steps with microsoft 365
How to grow to a modern workplace in 16 steps with microsoft 365How to grow to a modern workplace in 16 steps with microsoft 365
How to grow to a modern workplace in 16 steps with microsoft 365
Tim Hermie ☁️
 
Get High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter PerformanceGet High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter Performance
SolarWinds
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with Runpipe
Runpipe
 
iSQI Certification Days DASA – DevOps & ISTQB Frank Frambach
iSQI Certification Days DASA – DevOps & ISTQB Frank FrambachiSQI Certification Days DASA – DevOps & ISTQB Frank Frambach
iSQI Certification Days DASA – DevOps & ISTQB Frank Frambach
Ievgenii Katsan
 

Similar to 5 Effective M365 IT Pro Habits (20)

DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Salesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social EnterpriseSalesforce Platform: Governance and the Social Enterprise
Salesforce Platform: Governance and the Social Enterprise
 
Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
 
Dsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation successDsg best practice guide for net suite implementation success
Dsg best practice guide for net suite implementation success
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
 
10 differences between SAFe and LeSS
10 differences between SAFe and LeSS10 differences between SAFe and LeSS
10 differences between SAFe and LeSS
 
Atlassian summit comes to you - London AUG
Atlassian summit comes to you - London AUGAtlassian summit comes to you - London AUG
Atlassian summit comes to you - London AUG
 
TrailblazerDX Motihari.pptx
TrailblazerDX Motihari.pptxTrailblazerDX Motihari.pptx
TrailblazerDX Motihari.pptx
 
Future Proof Your DAM
Future Proof Your DAMFuture Proof Your DAM
Future Proof Your DAM
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features
 
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
Webinar: Ten Ways to Enhance Your Salesforce.com Application in 2013
 
Mark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment JourneyMark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment Journey
 
How to grow to a modern workplace in 16 steps with microsoft 365
How to grow to a modern workplace in 16 steps with microsoft 365How to grow to a modern workplace in 16 steps with microsoft 365
How to grow to a modern workplace in 16 steps with microsoft 365
 
Get High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter PerformanceGet High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter Performance
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with Runpipe
 
iSQI Certification Days DASA – DevOps & ISTQB Frank Frambach
iSQI Certification Days DASA – DevOps & ISTQB Frank FrambachiSQI Certification Days DASA – DevOps & ISTQB Frank Frambach
iSQI Certification Days DASA – DevOps & ISTQB Frank Frambach
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

5 Effective M365 IT Pro Habits

  • 1. SaaS, Mastered. 5 Effective M365 IT Pro Habits 16 | February | 2021 MORNING COFFEE WITH OUR FOUNDERS
  • 2. SaaS, Mastered. GRAB YOUR COFFEE AND ENJOY THE SESSION • This session will be recorded will be shared with everyone after the event • If you have questions, please type them in the questions area and we’ll save time to answer those at the end • If you have technical difficulties, please chat those into the moderator and we’ll do our best to address them CONFIDENTIAL | 2
  • 3. The leading global SaaS Management Platform 5,000,000+ user mailboxes managed in over 100 countries Founded 2014 in Italy 4.8 out of 5 stars Hundreds of partners worldwide Gartner Cool Vendor and Microsoft Gold Partner Offices throughout North America and Europe Insight Partners-backed
  • 4. SaaS, Mastered. David Mascarella Chief Global Strategist Ivan Fioravanti Chief Technology Officer
  • 5. SaaS, Mastered PROTECT YOUR ADMIN ACCOUNTS WORKFLOW APPLY POLICIES LICENSING LEAST PRIVILEGE ACCESS 4 RULES These accounts have the keys of your kingdom, protect them! DEFINE BEST PRACTICES IS NOT GOOD ENOUGH Apply and verify policies is a must! DELEGATED ADMIN Limit visibility and permissions to avoid human errors and breaches AUTOMATION Provisioning & Deprovisioning are just basic processes to automate OPTIMIZE LICENSE USAGE The goal is improving ROI, ensure that licenses are correctly distributed and used across your tenant 5 EFFECTIVE M365 IT PROS HABITS
  • 6. SaaS, Mastered Consequences for NOT securing 80% of data Breaches involve a Privileged Identity (Gartner) 85% of reported breaches were due to misconfiguration (IBM) Through 2025, 99% of cloud security failures will be the customer’s fault (Gartner)
  • 7. Protect your admin account Question Time
  • 8. From 2 to 4 Reduce number of company administrators Dedicated accounts Create dedicated Microsoft 365 global administrator accounts and use them only when necessary Strong Authentication MFA is a must! Avoid Conditional access is possible, MFA ALWAYS! SMS and Calls forbidden if you are under NIST (avoid them if possible) Authorization Implement Least Privilege Access Roles, PIM, PAM, … Protect Your Admin Accounts
  • 11. SaaS, Mastered Policy monitor and enforcement Track the adherence to your policies and best practices and enforce them. How does CoreView help? • Single pane of glass with all your users’ configuration setting. • Flexibility to validate all your configuration policies • Single customizable dashboard to monitor them • Alerts to be engaged on misconfiguration • Single click to remediate misconfiguration • Exception management • Automation to enforce policies
  • 12. SaaS, Mastered A Challenge: What about Risk-Based Password Management? How does CoreView help? • Instead of mandating scheduled password resets, CoreView enables risk-based response with workflow that can log out, disable, and notify IT. https://docs.microsoft.com/en-us/microsoft-365/admin/misc/password-policy-recommendations?view=o365-worldwide
  • 13. SaaS, Mastered Security Benchmarking Track your configurations against recommended best practices How does CoreView help? • CoreView monitors and can enforce most of the CIS Benchmark controls for M365 CoreView Automates Customization Required
  • 14. Least Privilege Access Model Question Time
  • 15. Roles (Too) Many Predefined Roles Are they granular enough? Admin Units Limit visibility, mainly on Azure AD Multi vs Single Tenant Multi tenant gives you total segregation and maximum security but… It will limit productivity and collaboration! PIM/PAM PIM - just-in-time assignment PAM - just-in-time access for task- based activities (Exchange only) Least Privilege Access - Microsoft
  • 16. SaaS, Mastered Least Privilege Access Model Single Tenant Virtual Tenants Defined Roles Custom Roles
  • 18. SaaS, Mastered. Protect your Admin Accounts #01 - Microsoft dedicate page link - MFA: No Text and Call (NIST) link Microsoft 365 Security for IT Pros #05 This book is great and monthly updated: https://m365securitybook.com/ Useful link to navigate Microsoft 365 security Center for Internet Security #02 - A step-by-step checklist to secure M365 link Least Privilege Access #03 - Admin Units link - PIM link - PAM link All Microsoft Admin Centers #04 - Microsoft Portal Sites: msportals.io
  • 19. SaaS, Mastered Don’t fly blind when it comes to M365 security flaws and application use. Least privilege access to M365 and other SaaS Enhanced e-discovery with enriched data Security policies Automated workflows Document classification Mitigate Risk Delegated administration for segregation of duties Visibility and Control with Actionable analytics Automated workflows Improve IT efficiency License management and chargebacks License consumption optimization Workload adoption and proficiency Maximize SaaS ROI Request the free health check https://www.coreview.com/office-365-health-check-report/

Editor's Notes

  1. CoreView is established and well-respected having become the leading global SaaS management platform, as defined by Gartner and others 5M user mailboxes managed (Microsoft uses this instead of saying user accounts) 4.8 out of 5 stars rating on G2, and 5 star on Gartner Peer Review; 96% Recommended by UserVoice [No need to go thru remainder]
  2. Things do go wrong if you don’t properly secure yourself as you move to the cloud with M365 and SaaS applications. Whether it’s from Gartner research about access control in breaches, IBM analysis regarding misconfigurations causing problems, or Gartner’s assessment that 99% of failures will be the customer's fault. It's all bad!
  3. Pool 1: How many M365 company administrators do you have in your tenant? Pool 2: Are you using separate and dedicated accounts for administrative activities?
  4. Dedicated Account: our statistics said more than 80% of admin account are not dedicated. Why do you think is this happening? (a policy should be verifying and enforce dedicated account) MFA: your point of view about MFA and Conditional access. When Conditional Access should be adopted (service account?) From 2 to 4: we see very few companies into this range. Some time company before to start working with us have dozen (if not hundreds) company administrators or operator with other very high permissions like the exchange administrator right. - Why company are granting so many right to their administrators? Is there a way to limit admin rights? (answer PIM/PAM)
  5. Pool 3: Do you have complete control and visibility on your tenant configuration? Ci sono i dati ma bisogna accedere a molteplici portali:
  6. This image is rappresnting what miscrosoft give you to implement the zero trust principle.as we can see Ms have a lot of staff to help you to protect your environment but the KEY fo the success is the Policy enforcement. Have good tool and policy is not good enought. You have to apply, verify and enforce these policy to implemnent a secure environement. Furthermore we talking ab out a every day live environement, that means you can not make a one time check you need something to implement a real time policy evaluation. Here Visibility and Automation are the two key element to reach this goal. Microsoft fornisce tantissimi strumenti ma poi è il cliente che li deve usare in modo corretto. Link . Quando David finisce di parlare, David e Ivan chiedono di leggere la domanda sul CIS
  7. CoreView enables you to see the metrics and alerts *you* want – against the controls *you* select. This enables ongoing communication, whether security issues regarding a single user, provisioning, use of M365 licenses and adopting those features, or maybe simply communicating specific metrics to management. CALL CIS Question.
  8. Fine slide: Do you know how your M365 configuration compares to the policies of the Center for Internet Security (CIS) benchmarks for Microsoft 365? And what about the ability to detect security issues, and then react to them automatically? Rather than employees needing to change passwords every so many days, What about using CoreView’s high risk report that could be configured to automatically trigger a workflow that wipes out the user session, disables the user account, and notifies the IT Security Help Desk that the user’s account is being misused or is at high risk, and requires some steps to be completed before the account can be re-enabled – achieving better protection without inconveniencing all employees! So this could automate reaction to risk events, or non-compliant devices, or other events, as desired. It’s near real-time, and because we’re doing it from inside the applications, it's much more powerful than what Microsoft is doing in this area, which would be to send a text message, even though they have recommended such a practice in the link here. Again, CoreView does something that Microsoft simply can't do.
  9. The CIS framework is very well known within commercial organizations for being explicit instructions for how you should secure O365 environments. So, for example, when we're setting up customers, our Customer Success team uses a checklist and helps customers deploy the recommended M365 configurations. We are at least as good as what the best practices say that customers should have. And these can be reviewed in the KPI Dashboard, operationalizing these reports so you can stay in compliance, not just set it up once and then no longer be compliant when something changes. And, CoreView can enforce these security recommendations, including items such as: Email forwarding Remove external users, with approval Clear inactive users Check on failed logins, and send email if needed or approvals needed Alert on risks detected Reclaim licenses from disabled users On that first one, email forwarding, we found a customer where hundreds of state troopers were forwarding police email to their personal accounts. Uh oh. They had no idea, but were able to fix it right away with CoreView.
  10. Pool 5: Are you implementing the best Least Privilege Access policies on your admin accounts to comply with industry standards?
  11. Fine della slide domanda pim and pam
  12. Parla David
  13. Aprire link punto 4 – qua dare il link
  14. Recap. Protect + manage + Optimize + mettere slide health check