Combatting
Cyberthreats
with Microsoft 365 Defender
MICHAEL NOEL, CCO CollabDays
Finland
9.9.2023
Michael Noel
@MichaelTNoel
Authored/Co-authored 20 books including the best-selling
SharePoint, Exchange, and Windows Unleashed series
Presented at over 250 events in 91 UN countries and all
continents of the world
Partner at Convergent Computing in the San Francisco Bay
Area (cco.com)
Microsoft Security Products
Microsoft Sentinel
◦ Security Information and Event Management Platform
◦ Centralized location for logs, alerting, and
Microsoft Entra
◦ Cloud Infrastructure Entitlement Management
◦ Permissions Management/Governance
Microsoft Purview
◦ Information Protection / DLP
◦ Regulatory / Risk Management
Microsoft Priva
◦ Privacy Management
◦ Compliance / Subject Rights Requests
Microsoft Intune
◦ Mobile Device Management (MDM) Platform
◦ Updates, deployment, autopilot, apps, etc.
Microsoft Defender
◦ Threat protection across clients, on-prem, and cloud
◦ The subject of this session…
Microsoft Security Copilot (Preview)
◦ Artificial Intelligence / Skynet
◦ Finally, robotic beings rule the world
Microsoft 365 Defender
Tools and Integrations
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Azure Active Directory Identity Protection
Microsoft Data Loss Prevention
App Governance
Microsoft Defender for Endpoint
Endpoint security/hygiene
platform for Windows and
Mac clients
Dynamically reduces attack
surfaces, discovered
vulnerabilities and
misconfigurations
Extends capabilities of built-
in Windows Defender to
allow reporting and
management from the
Defender console in the
cloud
Microsoft Defender for Office 365
Security toolset
for Exchange
Online and
SharePoint Online
Includes phishing
training
simulations
AI automation
based to improve
noise/signal ratio
Microsoft Defender for Office 365
Built-in natively to all
versions of Office 365 in
basic EOP and SOP form.
P1 License extends
functionality to move
beyond reacting to threats
and instead helps to detect
and be more protactive
P2 License improves the
ability to dynamically
respond to threats.
Microsoft Defender for Identity (MDI)
MDI deploys sensors to domain
controllers to look for behaviors
associated with compromised
internal systems
MDI Sensors perform their
calculations locally and then
forward their alerts to the cloud
MDI Integrates with MDCA to
provide a single console
experience for hybrid events
(On-Prem with MDI and Online
with MCAS)
Microsoft Defender for Cloud Apps
MDCA is a multimode Cloud
Access Security Broker (CASB)
Proactively identifies threats
across and in between cloud
platforms
Now integrated into the
Microsoft 365 Defender
console
(security.microsoft.com)
Microsoft Defender
Vulnerability Management
Provides mechanisms to
inventory and remediate
vulnerabilities and
weaknesses in applications,
browser extensions, and
discovered certificates.
Create security baselines,
remediation packages, and
address risks that factor into
your organization’s Secure
Score
Azure Active Directory Identity Protection
Service built into Azure
that feeds alerts and
signals into MS
Defender
Microsoft Data Loss
Prevention
DLP Technologies are part of MS Purview but
are part of the signals received by MS
Defender and are can be integrated into
security runbooks
DLP is about protecting content and
controlling what happens to it after its been
properly accessed (i.e. restricting
copy/paste, print, etc.)
App Governance
App governance add-on to
Defender for Cloud apps allows for
quick view of all third-party apps
in your tenant
Governance policies, detection
alerts, and remediation of oAuth
enabled apps that register with
Azure AD helps strengthen
security and compliance posture
Microsoft Defender for Cloud
(prev. Azure Defender)
MS Defender for Servers
MS Defender for Storage
MS Defender for SQL
MS Defender for Containers
MS Defender for App Service
MS Defender for Key Vault
MS Defender for Resource
Manager
MS Defender for DNS
MS Defender for open-source
relational databases
MS Defender for Azure Cosmos
DB
Microsoft Security Copilot
Artificial Intelligence (AI) based on
the ChatGPT technologies licensed
by Microsoft
Prompt bar that uses natural
language selection – You can
upload files, urls, code snippets,
etc. to find more information about
them.
Immutable audit trail and
information from your security
tools is kept private. Transparency
designed in.
Pin board allows for quick
researching during security alerts.
Skynet Jr. ;)
AI based behavioral analytics engine
Important to configure the following:
◦ Activity Log
◦ Discovery log
◦ Proxy log
After configuring sources, fine-tune the following
policies:
◦ Anomaly detection
◦ Cloud Discovery anomaly detection
◦ Rule-based activity detection
Detect Suspicious User Activity with
MDCA behavioral analytics (UEBA)
Investigative Priority
Score
◦ Helps to determine which
users to investigate first
◦ Based on user profiles that
are created from analytics
◦ Dynamic investigation
priority score – updated
based on recent behavior
and impact
Investigate Risky Users
Investigate risky OAuth apps
• MDCA will alert on
OAuth apps that
seem risky
• Identifies
possible OAuth
phishing exploits
• Detect risky apps
using either
alerts or via
hunting
Use MDCA to protect
apps via the following:
◦Monitor user activities
for anomalies
◦Protect data from
exfiltration
◦Prevent unprotected
data from being
uploaded
Protect company apps in real time
Block unauthorized
downloads with the
following:
◦ Create a block download policy
for unmanaged devices
◦ Configure your IdP to work
with MDCA
◦ Create a session policy
◦ Validate your policy
Block download of sensitive
information
Create file
policies to find
places with
sensitive
information
Use admin
quarantine for
files
Protect files with admin
quarantine
Identify public
permissions set on
documents
Set up data protection
Validate your policy
Set up automatic
encryption of files
Automatically apply MS Information
Protection sensitivity labels
Remediate endpoints
through the following
process:
◦ Generate a Defender for
Cloud Apps API token
◦ Create a flow to run an
antivirus scan
◦ Configure the flow
◦ Configure a policy to run the
flow
Extend governance to endpoint
remediation
Licensing for MS Defender
Individuals
◦ Basic functionality built-into MS 365 Personal or Family plans
◦ Very pared back version, includes personal security app and mainly endpoint
protections
Small and Mid-sized Businesses:
◦ Built-in to MS 365 Business Premium
◦ €3/user/month Standalone
◦ €3 /license/month servers
Enterprises:
◦ E5/A5 Plans include full licenses
◦ A la carte licenses available for Defender for Office 365, Defender for Endpoint,
Defender for Cloud Apps, and Defender for Identity. Can be added to E3.
And yes, this is
what AI
generated
when I asked it
to create me an
image of a man
giving a demo
in Finland… ;)
Kiitos! Kysymyksiä?
CCO.com
@MichaelTNoel
Linkedin.com/in/michaeltnoel
SharingTheGlobe.com
Slideshare.net/michaeltnoel
Michael Noel

Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023

  • 1.
    Combatting Cyberthreats with Microsoft 365Defender MICHAEL NOEL, CCO CollabDays Finland 9.9.2023
  • 3.
    Michael Noel @MichaelTNoel Authored/Co-authored 20books including the best-selling SharePoint, Exchange, and Windows Unleashed series Presented at over 250 events in 91 UN countries and all continents of the world Partner at Convergent Computing in the San Francisco Bay Area (cco.com)
  • 4.
    Microsoft Security Products MicrosoftSentinel ◦ Security Information and Event Management Platform ◦ Centralized location for logs, alerting, and Microsoft Entra ◦ Cloud Infrastructure Entitlement Management ◦ Permissions Management/Governance Microsoft Purview ◦ Information Protection / DLP ◦ Regulatory / Risk Management Microsoft Priva ◦ Privacy Management ◦ Compliance / Subject Rights Requests Microsoft Intune ◦ Mobile Device Management (MDM) Platform ◦ Updates, deployment, autopilot, apps, etc. Microsoft Defender ◦ Threat protection across clients, on-prem, and cloud ◦ The subject of this session… Microsoft Security Copilot (Preview) ◦ Artificial Intelligence / Skynet ◦ Finally, robotic beings rule the world
  • 5.
    Microsoft 365 Defender Toolsand Integrations Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Microsoft Defender Vulnerability Management Azure Active Directory Identity Protection Microsoft Data Loss Prevention App Governance
  • 6.
    Microsoft Defender forEndpoint Endpoint security/hygiene platform for Windows and Mac clients Dynamically reduces attack surfaces, discovered vulnerabilities and misconfigurations Extends capabilities of built- in Windows Defender to allow reporting and management from the Defender console in the cloud
  • 7.
    Microsoft Defender forOffice 365 Security toolset for Exchange Online and SharePoint Online Includes phishing training simulations AI automation based to improve noise/signal ratio
  • 8.
    Microsoft Defender forOffice 365 Built-in natively to all versions of Office 365 in basic EOP and SOP form. P1 License extends functionality to move beyond reacting to threats and instead helps to detect and be more protactive P2 License improves the ability to dynamically respond to threats.
  • 9.
    Microsoft Defender forIdentity (MDI) MDI deploys sensors to domain controllers to look for behaviors associated with compromised internal systems MDI Sensors perform their calculations locally and then forward their alerts to the cloud MDI Integrates with MDCA to provide a single console experience for hybrid events (On-Prem with MDI and Online with MCAS)
  • 10.
    Microsoft Defender forCloud Apps MDCA is a multimode Cloud Access Security Broker (CASB) Proactively identifies threats across and in between cloud platforms Now integrated into the Microsoft 365 Defender console (security.microsoft.com)
  • 11.
    Microsoft Defender Vulnerability Management Providesmechanisms to inventory and remediate vulnerabilities and weaknesses in applications, browser extensions, and discovered certificates. Create security baselines, remediation packages, and address risks that factor into your organization’s Secure Score
  • 12.
    Azure Active DirectoryIdentity Protection Service built into Azure that feeds alerts and signals into MS Defender
  • 13.
    Microsoft Data Loss Prevention DLPTechnologies are part of MS Purview but are part of the signals received by MS Defender and are can be integrated into security runbooks DLP is about protecting content and controlling what happens to it after its been properly accessed (i.e. restricting copy/paste, print, etc.)
  • 14.
    App Governance App governanceadd-on to Defender for Cloud apps allows for quick view of all third-party apps in your tenant Governance policies, detection alerts, and remediation of oAuth enabled apps that register with Azure AD helps strengthen security and compliance posture
  • 15.
    Microsoft Defender forCloud (prev. Azure Defender) MS Defender for Servers MS Defender for Storage MS Defender for SQL MS Defender for Containers MS Defender for App Service MS Defender for Key Vault MS Defender for Resource Manager MS Defender for DNS MS Defender for open-source relational databases MS Defender for Azure Cosmos DB
  • 16.
    Microsoft Security Copilot ArtificialIntelligence (AI) based on the ChatGPT technologies licensed by Microsoft Prompt bar that uses natural language selection – You can upload files, urls, code snippets, etc. to find more information about them. Immutable audit trail and information from your security tools is kept private. Transparency designed in. Pin board allows for quick researching during security alerts. Skynet Jr. ;)
  • 17.
    AI based behavioralanalytics engine Important to configure the following: ◦ Activity Log ◦ Discovery log ◦ Proxy log After configuring sources, fine-tune the following policies: ◦ Anomaly detection ◦ Cloud Discovery anomaly detection ◦ Rule-based activity detection Detect Suspicious User Activity with MDCA behavioral analytics (UEBA)
  • 18.
    Investigative Priority Score ◦ Helpsto determine which users to investigate first ◦ Based on user profiles that are created from analytics ◦ Dynamic investigation priority score – updated based on recent behavior and impact Investigate Risky Users
  • 19.
    Investigate risky OAuthapps • MDCA will alert on OAuth apps that seem risky • Identifies possible OAuth phishing exploits • Detect risky apps using either alerts or via hunting
  • 20.
    Use MDCA toprotect apps via the following: ◦Monitor user activities for anomalies ◦Protect data from exfiltration ◦Prevent unprotected data from being uploaded Protect company apps in real time
  • 21.
    Block unauthorized downloads withthe following: ◦ Create a block download policy for unmanaged devices ◦ Configure your IdP to work with MDCA ◦ Create a session policy ◦ Validate your policy Block download of sensitive information
  • 22.
    Create file policies tofind places with sensitive information Use admin quarantine for files Protect files with admin quarantine
  • 23.
    Identify public permissions seton documents Set up data protection Validate your policy Set up automatic encryption of files Automatically apply MS Information Protection sensitivity labels
  • 24.
    Remediate endpoints through thefollowing process: ◦ Generate a Defender for Cloud Apps API token ◦ Create a flow to run an antivirus scan ◦ Configure the flow ◦ Configure a policy to run the flow Extend governance to endpoint remediation
  • 25.
    Licensing for MSDefender Individuals ◦ Basic functionality built-into MS 365 Personal or Family plans ◦ Very pared back version, includes personal security app and mainly endpoint protections Small and Mid-sized Businesses: ◦ Built-in to MS 365 Business Premium ◦ €3/user/month Standalone ◦ €3 /license/month servers Enterprises: ◦ E5/A5 Plans include full licenses ◦ A la carte licenses available for Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps, and Defender for Identity. Can be added to E3.
  • 26.
    And yes, thisis what AI generated when I asked it to create me an image of a man giving a demo in Finland… ;)
  • 27.