SlideShare a Scribd company logo
1 of 21
Download to read offline
Defender for Business
March 2022
@directorcia
http://about.me/ciaops
In what year was the car first invented?
Benz Patent Motorwagen - 1886
In what year was wearing seat belts made
compulsory across Australia?
1972
All new cars today typically include:
• Seat belts
• Airbags
• Disk brakes
• Antilock brakes (ABS)
• Intermittent wipers
• Headlamps
• Lane guidance
• Automatic windows
• Demisting
• GPS
• Electronic Stability Control (ESC)
• Reversing camera
• Blind spot monitoring
• And more
All Windows 10/11 Pro systems include:
• Bit locker
• Windows Defender
• Attack Surface Reduction
• Virtualization Based Security (VBS)
• Device Guard
• Credential Guard
• Application Guard
• Advanced auditing
• UEFI BIOS
• Firewall
• Windows Hello
• And more
M365 Business Premium includes:
• Conditional Access
• Cloud App Discovery
• Device Management
• Application Management
• App Locker
• Windows Defender Application Control (WDAC)
• Defender for Office 365
• Secure Score
• Exchange Configuration Analyzer
• Identity Score
• Windows Hello for Business
• MFA / Passwordless login
• Advanced auditing
• And more
And now M365 Business Premium includes
Microsoft Defender for Business
Elevate your security
Elevate your security with enterprise-grade endpoint protection specially built for businesses with up to 300 employees.
Enterprise-grade
protection
Security for all your devices
with next-gen protection,
endpoint detection and
response, and threat and
vulnerability management.
Easy to use
Streamline onboarding with
wizard-driven set up and
recommended security
policies activated out-of-the-
box to quickly secure devices.
Cost-effective
Endpoint security that keeps
you productive and works with
your IT without compromising
budget.
Endpoint Detection
& Response
Attack Surface
Reduction
Microsoft Defender
for Business
Elevate your security
Next Generation
Protection
Auto Investigation
& Remediation
Threat & Vulnerability
Management
Simplified Onboarding
and Administration
APIs and Integration
Azure Virtual Desktop
Delivering endpoint security across platforms
How to purchase Microsoft Defender for Business
Microsoft Defender Business
($3pupm)
Enterprise-grade
endpoint security
Per user license
✓ Next generation protection
✓ Cross Platform support (iOS,
Android, Windows, MacOS)
✓ Endpoint Detection and Response
✓ Threat and Vulnerability
Management
✓ …and more
Microsoft 365 Business Premium
($20pupm)
Comprehensive productivity and security solution
Per user license
1) As standalone SKU
Entitlement for use on up to 5 devices
Generally available H1 2022
2) Included as part of Microsoft 365
Business Premium
Microsoft Defender for Business will
roll out to new and existing M365
Business Premium customers, post GA
Microsoft 365 Business Standard ($12.50)
Office apps and services, Teams
Microsoft Defender for Office 365 Plan 1
Intune
Azure AD Premium Plan 1
Azure Information Protection Premium P1
Exchange Online Archiving
Autopilot
Azure Virtual Desktop license
Windows 10/11 Business
Microsoft Defender for Business
Shared Computer Activation
Product comparison
Cross platform and enterprise grade
protection with next-gen protection,
endpoint detection and response, and
threat and vulnerability management
Available as a
standalone offering and
as part of Microsoft 365
Business Premium
Standalone offering will
serve non-Microsoft
365 customers. No
licensing prerequisites
Supports multi-customer
viewing of security incidents
with Microsoft 365 Lighthouse
for partners in preview
Customer size < 300 seats > 300 seats
Endpoint capabilitiesSKU
Microsoft Defender
for Business
Microsoft Defender
for Endpoint Plan 1
Microsoft Defender
for Endpoint Plan 2
Centralized management
Simplified client configuration
Threat and Vulnerability Management
Attack Surface Reduction
Next-Gen Protection
Endpoint Detection and Response 2
Automated Investigation and Response 2
Threat Hunting and 6-months data retention
Threat Analytics 2
Cross platform support for Windows, MacOS, iOS, and Android
Microsoft Threat Experts
Partner APIs
Microsoft 365 Lighthouse for viewing security incidents across customers 3
1
Limited. 2
Optimized for SMB. 3
Additional capabilities planned
Detailed product comparison
Capabilities MDB MDE P1 MDE P2
Threat & Vulnerability
Microsoft secure score l l
Vulnerability management (visibility into software and vulnerabilities) l l
Vulnerability remediation based on Intune integration l l
Attack Surface Reduction
Advanced vulnerability and zero-day exploit mitigations l l l
Attack Surface Reduction rules l l l
Application Control l l l
Network Firewall l l l
Device Control (e.g.: USB) l l l
Network protection l l l
Device-based conditional access l l l
Web Control / Category-based URL Blocking l l l
Ransomware mitigation l l l
Next Gen Protection
Advanced cloud protection (deep inspection and detonation) BAFS l l l
Monitoring, analytics and reporting for Next Generation Protection capabilities l l l
Endpoint Detection and Response
Behavioral-based detection (post-breach) l l
Rich investigation tools l
Custom detections l
6-month searchable data per endpoint l
Advanced hunting l
Evaluation Lab l
Manual response actions - (Run AV scan, Machine isolation, File stop and quarantine) l l l
Live response l l
Detailed product comparison
Capabilities MDB MDE P1 MDE P2
Automatic Investigation and Remediation
Default automation levels l l
Customized automation levels l
Centralized Management
Role-based access control l l l
Simplified client configuration l
Reporting l l l
API's
SIEM Connector l l
API's (Response, Data collection) l l
Partner applications l l
Threat Intelligence
Threat Analytics l l
Custom Threat Intelligence l l l
Sandbox l
3rd party Threat Intelligence Connector l
Partner Support
APIs (For Partners) l l l
RMM Integration l
​MSP Support (Multi-tenant API, multi tenant authentication) l l l
Microsoft Threat Expert
Targeted attack notification l
Collaborate with Experts, on demand l
Platform support
Windows Client l l l
MacOS l l l
Mobile (Android, iOS) l l l
Demo
Take aways
•There are so many included security services from
Microsoft.
•Configuration is key.
•Integration provides the bigger picture.
•Only the biggest security providers will prevail.
•The priority should be to minimise the major risk.
•Focus on intelligence not information.
•Good security is simple but most complicate.
Resources
• Microsoft Defender for Endpoint Plan 1 and Plan 2-
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/defender-endpoint-
plan-1-2?view=o365-worldwide
• Microsoft Defender for Business - https://www.microsoft.com/en-
au/security/business/threat-protection/microsoft-defender-business
• Microsoft Defender for Endpoint – https://docs.microsoft.com/en-us/microsoft-
365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide
• Configure Microsoft Defender for Endpoint in Intune -
https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection-configure
• Short & sweet educational videos for Microsoft Defender for Endpoint -
https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/short-amp-sweet-
educational-videos-on-microsoft-defender-for/ba-p/1021978
• Enterprise Grade Protection for Small & Medium Businesses -
https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/enterprise-grade-protection-for-
small-amp-medium-businesses/ba-p/3233966#M140
CIAOPS Resources
• Blog – http://blog.ciaops.com
• Free SharePoint Training via email – http://bit.ly/cia-gs-spo
• Free Office 365, Azure Administration newsletter – http://bit.ly/cia-o365-tech
• Free Office 365, Azure video tutorials – http://www.youtube.com/directorciaops
• Free documents, presentations, eBooks – http://slideshare.net/directorcia
• Office 365, Azure, Cloud podcast – http://ciaops.podbean.com
• Office 365, Azure online training courses – http://www.ciaopsacademy.com
• Office 365 and Azure community – http://www.ciaopspatron.com
Twitter
@directorcia
Facebook
https://www.facebook.com/ciaops
Email
director@ciaops.com
Teams
admin@ciaops365.com
That’s all folks!
Thanks for attending

More Related Content

What's hot

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 

What's hot (20)

Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Azure Migrate
Azure MigrateAzure Migrate
Azure Migrate
 
Understanding Azure AD
Understanding Azure ADUnderstanding Azure AD
Understanding Azure AD
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
 
Azure active directory
Azure active directoryAzure active directory
Azure active directory
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Azure Active Directory - An Introduction
Azure Active Directory  - An IntroductionAzure Active Directory  - An Introduction
Azure Active Directory - An Introduction
 

Similar to An introduction to Defender for Business

Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Michael Noel
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Graeme Wood
 

Similar to An introduction to Defender for Business (20)

January 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know WebinarJanuary 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know Webinar
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 

More from Robert Crane

More from Robert Crane (20)

202310
202310202310
202310
 
September 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know WebinarSeptember 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know Webinar
 
August 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know WebinarAugust 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know Webinar
 
July 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know WebinarJuly 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know Webinar
 
June 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know WebinarJune 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know Webinar
 
May 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know WebinarMay 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know Webinar
 
April 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know WebinarApril 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know Webinar
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
 
December 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know WebinarDecember 2022 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know Webinar
 
November 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know WebinarNovember 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know Webinar
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know Webinar
 
September 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know WebinarSeptember 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know Webinar
 
August 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know WebinarAugust 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know Webinar
 
July 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know WebinarJuly 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know Webinar
 
June 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know WebinarJune 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know Webinar
 
May 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know WebinarMay 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know Webinar
 
April 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know WebinarApril 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know Webinar
 
March 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know WebinarMarch 2022 CIAOPS Need to Know Webinar
March 2022 CIAOPS Need to Know Webinar
 
January 2022 CIAOPS Need to Know Webinar
January 2022 CIAOPS Need to Know WebinarJanuary 2022 CIAOPS Need to Know Webinar
January 2022 CIAOPS Need to Know Webinar
 
December 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know WebinarDecember 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know Webinar
 

Recently uploaded

一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
AS
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
A
 

Recently uploaded (20)

APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 

An introduction to Defender for Business

  • 1. Defender for Business March 2022 @directorcia http://about.me/ciaops
  • 2. In what year was the car first invented? Benz Patent Motorwagen - 1886
  • 3. In what year was wearing seat belts made compulsory across Australia? 1972
  • 4. All new cars today typically include: • Seat belts • Airbags • Disk brakes • Antilock brakes (ABS) • Intermittent wipers • Headlamps • Lane guidance • Automatic windows • Demisting • GPS • Electronic Stability Control (ESC) • Reversing camera • Blind spot monitoring • And more
  • 5. All Windows 10/11 Pro systems include: • Bit locker • Windows Defender • Attack Surface Reduction • Virtualization Based Security (VBS) • Device Guard • Credential Guard • Application Guard • Advanced auditing • UEFI BIOS • Firewall • Windows Hello • And more
  • 6. M365 Business Premium includes: • Conditional Access • Cloud App Discovery • Device Management • Application Management • App Locker • Windows Defender Application Control (WDAC) • Defender for Office 365 • Secure Score • Exchange Configuration Analyzer • Identity Score • Windows Hello for Business • MFA / Passwordless login • Advanced auditing • And more
  • 7. And now M365 Business Premium includes
  • 8. Microsoft Defender for Business Elevate your security Elevate your security with enterprise-grade endpoint protection specially built for businesses with up to 300 employees. Enterprise-grade protection Security for all your devices with next-gen protection, endpoint detection and response, and threat and vulnerability management. Easy to use Streamline onboarding with wizard-driven set up and recommended security policies activated out-of-the- box to quickly secure devices. Cost-effective Endpoint security that keeps you productive and works with your IT without compromising budget.
  • 9. Endpoint Detection & Response Attack Surface Reduction Microsoft Defender for Business Elevate your security Next Generation Protection Auto Investigation & Remediation Threat & Vulnerability Management Simplified Onboarding and Administration APIs and Integration
  • 10. Azure Virtual Desktop Delivering endpoint security across platforms
  • 11. How to purchase Microsoft Defender for Business Microsoft Defender Business ($3pupm) Enterprise-grade endpoint security Per user license ✓ Next generation protection ✓ Cross Platform support (iOS, Android, Windows, MacOS) ✓ Endpoint Detection and Response ✓ Threat and Vulnerability Management ✓ …and more Microsoft 365 Business Premium ($20pupm) Comprehensive productivity and security solution Per user license 1) As standalone SKU Entitlement for use on up to 5 devices Generally available H1 2022 2) Included as part of Microsoft 365 Business Premium Microsoft Defender for Business will roll out to new and existing M365 Business Premium customers, post GA Microsoft 365 Business Standard ($12.50) Office apps and services, Teams Microsoft Defender for Office 365 Plan 1 Intune Azure AD Premium Plan 1 Azure Information Protection Premium P1 Exchange Online Archiving Autopilot Azure Virtual Desktop license Windows 10/11 Business Microsoft Defender for Business Shared Computer Activation
  • 12. Product comparison Cross platform and enterprise grade protection with next-gen protection, endpoint detection and response, and threat and vulnerability management Available as a standalone offering and as part of Microsoft 365 Business Premium Standalone offering will serve non-Microsoft 365 customers. No licensing prerequisites Supports multi-customer viewing of security incidents with Microsoft 365 Lighthouse for partners in preview Customer size < 300 seats > 300 seats Endpoint capabilitiesSKU Microsoft Defender for Business Microsoft Defender for Endpoint Plan 1 Microsoft Defender for Endpoint Plan 2 Centralized management Simplified client configuration Threat and Vulnerability Management Attack Surface Reduction Next-Gen Protection Endpoint Detection and Response 2 Automated Investigation and Response 2 Threat Hunting and 6-months data retention Threat Analytics 2 Cross platform support for Windows, MacOS, iOS, and Android Microsoft Threat Experts Partner APIs Microsoft 365 Lighthouse for viewing security incidents across customers 3 1 Limited. 2 Optimized for SMB. 3 Additional capabilities planned
  • 13. Detailed product comparison Capabilities MDB MDE P1 MDE P2 Threat & Vulnerability Microsoft secure score l l Vulnerability management (visibility into software and vulnerabilities) l l Vulnerability remediation based on Intune integration l l Attack Surface Reduction Advanced vulnerability and zero-day exploit mitigations l l l Attack Surface Reduction rules l l l Application Control l l l Network Firewall l l l Device Control (e.g.: USB) l l l Network protection l l l Device-based conditional access l l l Web Control / Category-based URL Blocking l l l Ransomware mitigation l l l Next Gen Protection Advanced cloud protection (deep inspection and detonation) BAFS l l l Monitoring, analytics and reporting for Next Generation Protection capabilities l l l Endpoint Detection and Response Behavioral-based detection (post-breach) l l Rich investigation tools l Custom detections l 6-month searchable data per endpoint l Advanced hunting l Evaluation Lab l Manual response actions - (Run AV scan, Machine isolation, File stop and quarantine) l l l Live response l l
  • 14. Detailed product comparison Capabilities MDB MDE P1 MDE P2 Automatic Investigation and Remediation Default automation levels l l Customized automation levels l Centralized Management Role-based access control l l l Simplified client configuration l Reporting l l l API's SIEM Connector l l API's (Response, Data collection) l l Partner applications l l Threat Intelligence Threat Analytics l l Custom Threat Intelligence l l l Sandbox l 3rd party Threat Intelligence Connector l Partner Support APIs (For Partners) l l l RMM Integration l ​MSP Support (Multi-tenant API, multi tenant authentication) l l l Microsoft Threat Expert Targeted attack notification l Collaborate with Experts, on demand l Platform support Windows Client l l l MacOS l l l Mobile (Android, iOS) l l l
  • 15.
  • 16. Demo
  • 17. Take aways •There are so many included security services from Microsoft. •Configuration is key. •Integration provides the bigger picture. •Only the biggest security providers will prevail. •The priority should be to minimise the major risk. •Focus on intelligence not information. •Good security is simple but most complicate.
  • 18. Resources • Microsoft Defender for Endpoint Plan 1 and Plan 2- https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/defender-endpoint- plan-1-2?view=o365-worldwide • Microsoft Defender for Business - https://www.microsoft.com/en- au/security/business/threat-protection/microsoft-defender-business • Microsoft Defender for Endpoint – https://docs.microsoft.com/en-us/microsoft- 365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide • Configure Microsoft Defender for Endpoint in Intune - https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection-configure • Short & sweet educational videos for Microsoft Defender for Endpoint - https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/short-amp-sweet- educational-videos-on-microsoft-defender-for/ba-p/1021978 • Enterprise Grade Protection for Small & Medium Businesses - https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/enterprise-grade-protection-for- small-amp-medium-businesses/ba-p/3233966#M140
  • 19. CIAOPS Resources • Blog – http://blog.ciaops.com • Free SharePoint Training via email – http://bit.ly/cia-gs-spo • Free Office 365, Azure Administration newsletter – http://bit.ly/cia-o365-tech • Free Office 365, Azure video tutorials – http://www.youtube.com/directorciaops • Free documents, presentations, eBooks – http://slideshare.net/directorcia • Office 365, Azure, Cloud podcast – http://ciaops.podbean.com • Office 365, Azure online training courses – http://www.ciaopsacademy.com • Office 365 and Azure community – http://www.ciaopspatron.com Twitter @directorcia Facebook https://www.facebook.com/ciaops Email director@ciaops.com Teams admin@ciaops365.com
  • 20.
  • 21. That’s all folks! Thanks for attending