2. Services in Microsoft Threat Protection
• The solution capabilities announced at
Ignite and provide updates on
significant enhancements made since
September.
• Engineers across teams at Microsoft are
collaborating to unlock the full,
envisioned potential of Microsoft Threat
Protection.
• Microsoft Threat Protection leverages
the unique capabilities of different
services to secure several attack vectors.
• The quadrant picture summarizes the
services in the solution. As each
individual service is enhanced, so too is
the overall solution.
3.
4. • Office 365 ATP which provides best-in-class security in
Office 365 against advanced threats to email. Enabling
users to view the destination URL for links in email. This
allows users to make an informed decision before clicking
through. This feature was a high demand request from
customers who educate users on spotting suspicious links
in email and we’re excited to deliver on it.
• This snapshot shows the
investigation graph of an
ongoing investigation in the
Windows Defender Security
Center. The capability was
released earlier this year and
can now mark your alerts as
resolved automatically once
automation successfully
remediates the threat.
5. Microsoft Cloud App
Security | apps
permission
management view
• Microsoft Cloud App Security further
helps reduce impact from shadow IT by
providing granular visibility into Open
Authentication (OAuth) application
permissions that have access to Office
365, G Suite, and Salesforce data.
• OAuth apps are a newer attack vector
often leveraged in phishing attacks,
where attackers trick users into granting
access to rogue applications.
• This picture show the managing apps
view -admins see a full list of both
permissions granted to an OAuth app
and the users granting the apps access.
The permission level details help admins
decide which apps users can continue to
have access and which ones will have
access revoked.
6. The Intelligent Security Graph serves as the
foundation for all of Microsoft’s security solutions,
obtaining threat signal from Microsoft’s services,
expansive user base, and global footprint.
The graph blends threat signal with powerful
machine learning capabilities, threat analysis from
our 3500+ in-house security specialists, and support
from over $1 billion in annual cybersecurity
investments.
This helps remove the noise from the threat
landscape, providing intelligent solutions to mitigate
today’s attack campaigns, from generic high volume
threats, to more sophisticated and targeted
attacks. It is the powerful differentiator which
elevates Microsoft’s security solutions to the
forefront of the security industry.
7. Microsoft Threat
Protection
• Microsoft Threat Protection solution
goes far beyond protection. It has a
rich set of detection, response and
remediation, and education and
training capabilities.
• Protection is only one part of
security; thus, the most effective
and robust solutions must also allow
for quick detection, rapid response,
and full remediation of threats.
• Microsoft Threat Protection even
offers the ability to simulate threat
campaigns, enabling customers to
educate their end users on how to
react in the event of an attack