SlideShare a Scribd company logo
1 of 94
Engagement Kickoff &
Technology Overview
Microsoft 365 Business Secure Deployment T
oolkit
Speaker name
<Partner Name>
Our expertise + Microsoft 365 Business
We can manage your security operations
remotely so you don’t have to…
 Supporting point #1
 Supporting point #2
 Supporting point #3
We can help you integrate your…
 Supporting point #1
 Supporting point #2
 Supporting point #3
We’re the expert in cloud deployment…
 Supporting point #1
 Supporting point #2
 Supporting point #3
Introductions
Project Overview and Scope
Approach and Scope
Timeline
Engagement Process
Technology Overview
Microsoft 365 Business Overview
Windows Defender Exploit Guard
Office 365 Advanced Threat Protection (ATP)
Office 365 Data Loss Prevention (DLP)
Device Management Policies
Azure Information Protection (AIP)
Closing
Questions & Answers
Next Steps
Workflow and Schedule
Two weeks ago
Pre-Engagement meeting
Last week
Secure executive sponsor and
align resources to complete the
offer
Now
Complete the Microsoft 365
Business Secure Deployment
offer
One week from now
Present the findings, discuss
remediation and next steps.
Deliver prioritized roadmap
Workshop Description Outcome Customer attendees Time Scheduled time, room
Day 1
Engagement Kickoff
Provides an overview of the
offer goals as well as an
opportunity to cover Q&A and
project governance.
Agreed plan and schedule for
the 2-day on-site assessment.
Confirm schedule and logistics
All project team 2 hours <Time>, <Room>
Start Assessment &
Remediation
Answer the questions from the
offline assessment and
examine Office 365 Secure
Score if applicable
Remediation Checklist Selected customer responders 6 hours <Time>, <Room>
Day 2
Day 1 Review
Review progress from day one,
discuss any open items and
identified issues.
Ready to move on with
completion of the Microsoft
GDPR Detailed Assessment.
All project team 0.5 hours
<Time>, <Room>
Complete Deployment
Workshop
Microsoft 365 Business
Deployment Plan
Selected customer responders
1.5 hours <Time>, <Room>
Deployment, outcome analysis
& Write-Up
Microsoft 365 Business
Deployed
IT Team
6 hours <Time>, <Room>
Microsoft 365 Business Secure Deployment Agenda
Workshop Description Outcome Customer attendees Time Scheduled time, room
Day 3
Day 2 Review
Review progress from day two,
discuss any open items and
identified issues.
Ready to move on with
completion of Security
Workshop
All project team 30 minutes <Time>, <Room>
Start Security Workshop
Security Plan Selected customer responders 1.5 hours <Time>, <Room>
Deployment, outcome analysis
& Write-Up
Security features implemented IT Team 6 hours <Time>, <Room>
Day 4
Day 3 Review
Review progress from day
three, discuss any open items
and identified issues.
Ready to move on with
completion of Sensitive Data
Workshop
All project team 0.5 hours
<Time>, <Room>
Complete Sensitive Data
Workshop
Data Governance Plan Selected customer responders
1.5 hours <Time>, <Room>
Deployment, outcome analysis
& Write-Up
Data governance features
implemented
IT Team
6 hours <Time>, <Room>
Microsoft 365 Business Secure Deployment Agenda
Workshop Description Outcome Customer attendees Time Scheduled time, room
Day 5
Day 4 Review
Review progress from day
four, discuss any open items
and identified issues.
Ready to move on with
completion of Migration
Workshop
All project team 30 minutes <Time>, <Room>
Start Migration Workshop
Migration Plan Selected customer responders 1.5 hours <Time>, <Room>
Migration, outcome analysis &
Write-Up
Migration started IT Team 6 hours <Time>, <Room>
Days 6-10
Daily Review
Review progress from prior
day, discuss any open items
and identified issues.
Ready to continue with
migraiton
All project team 0.5 hours
<Time>, <Room>
Migration
Email and files migrated to
Office 365 Business
Selected customer responders
6.5 hours <Time>, <Room>
Outcome analysis & Write-Up
Status report & project close
on final day
IT Team
1 hours <Time>, <Room>
Microsoft 365 Business Secure Deployment Agenda
Customer Team - Workshop Attendees
Role Description Title Contact information
Project Executive
Sponsor
• Executive sponsor who is responsible for driving the strategic vision for the
organization & making key decisions
• Ultimate authority and accountability for the project and delivery on project
objectives
• Helps resolve issues escalated by project team
• Provides guidance and clarity regarding overall security strategy, standards
and policies for the organization
Project Manager
• Coordinates partner and working teams engaged in the project
• Schedules all meetings with appropriate resources
• Is the central point for dissemination of the engagement deliverables
• Records and manages project issues, including escalations
• Liaises with, and provides updates to, project executive sponsors
• Ensures that the on-site requirements are met in time for the on-site
workshops
IT Administrator(s)
and Security team
• Responsible for IT security strategy defined by the organization
• Analyses and chooses products for the organization that meets business goals
• Accountable for creating and maintaining the infrastructure
• Provides insights into current and planned IT & security guidelines,
requirements and standards for the organization
Partner Team - Workshop Attendees
Role Description Title Contact information
Project /
Engagement
Manager
• Develops and maintains project timeline
• Coordinates partner and working teams engaged in the project
• Manages project deliverables
• Records and manages project issues, including escalations
• Liaises with, and provides updates to, customer Project Manager
DeliveryArchitect
s / Consultants
• Prepares the workshop materials and delivers the workshops
• Performs deployment, configuration, and migration tasks
• Accountable for creating the engagement deliverables
Team Introductions
Please share your name and where you are from
Please share your role in the company
Please share your expectations of the session
14
Assist with the deployment of:
Microsoft 365 Business
Intune Device Management
Office 365 Advanced Threat Protection (ATP)
Data Loss Prevention (DLP)
Azure Information Protection (AIP)
We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
15
Initiation Assess Remediate Enable Migrate
We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
16
Initiation Assess Remediate Enable Migrate
Initiate team formation and
communicate expectations.
Conduct a detailed walk-
through of the SOW.
Complete the project
initiation and launch
prerequisites.
We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
17
Initiation Assess Remediate Enable Migrate
Conduct the assessment
workshop.
Complete the Secure Score
assessment
Document the remediation
checklist.
We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
18
Initiation Assess Remediate Enable Migrate
Provide the customer up to
½ day of remediation
activity assistance.
Update and finalize the
remediation checklist based
on Customer Name’s
feedback.
Customer to perform
remaining remediation
activities, resolving or
mitigating all items in the
remediation checklist.
We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
19
Initiation Assess Remediate Enable Migrate
Conduct the deployment
workshop.
Update the deployment
plan based on Customer
input.
Assist with the deployment
of the products in scope.
Assist with the functional
testing of the deployed
solution.
We will utilize the Online Services Lifecycle methodology (OSL) to complete
this project:
20
Initiation Assess Remediate Enable Migrate (optional)
Plan for migration of email
Plan for migration of files
Execute migration
The following items are considered out of scope for
this engagement—
For Office 365 ATP:
Deployment or configuration of non-Microsoft message hygiene solutions.
Migration of email block/allow lists.
Configuration of Domain Name System records required for DomainKeys
Identified Mail.
SIEM integration.
Creation of custom reports, dashboards, or delivery schedules.
Integration of Office 365 Advanced Threat Protection with other email
antivirus or antimalware solutions, whether on-premises or cloud-based.
21
The primary risks to the success of the
engagement are:
Delays in necessary changes to DNS for Office 365 custom
domains.
Unknown/Insecure mail flow ingress (bypassing EOP/ATP).
24
MALWARE
INFRASTRUCTURE
ATTACKS
PHISHING
CREDENTIAL
THEFT
User
Complexity
Initial setup, fine-tuning, creating rules, policies, thresholds, and
baselines can take a long time.
Prone to false positives
You receive too many reports in a day with several false
positives that require valuable time you don’t have.
Designed to protect the perimeter
When attackers successfully compromise a user, your current
defenses provide limited detection and protection.
25
26
User and entity behavior
analytics (UEBA)
Machine Learning Big Data
Technology challenges faced
by small and midsized
businesses today
Keeping
technology
up-to-date
Mobile,
distributed
workforce
Protecting
sensitive data
Cyber threats &
phishing schemes
INTRODUCING
Microsoft 365 Business
Get more
done
Work better
together
Safeguard your
data
Build your
business
Simplified
for you
What’s new?
We’ve recently added advanced security features to Microsoft 365 Business to help businesses
protect against cyberthreats and safeguard sensitive information.
1. Office 365 Advanced Threat Protection
Attachment scanning & ML detection to catch
suspicious attachments
Link Scanning/Checking to prevent users from
clicking suspicious links
2. Windows Exploit Guard Enforcement
Preventing devices from ransomware and malicious
websites at device end points
Cyber Threats
1. Data Loss Prevention
Does Deep Content Analysis to easily identify, monitor,
and protect sensitive information from leaving org
2. Azure Information Protection
Controls & Manages how sensitive content is accessed
3. Intune Availability
Protecting data across devices with E2E Device and
app management
4. Exchange Online archiving
100GB Archiving & preservation policies to recover
data or remain compliant
5. BitLocker Enforcement
Encrypt Data on devices to protect data if device
lost or stolen
Safeguard Sensitive Information
[1] Indicates Office 365 has Plan 2 and Microsoft 365 Business has Plan 1 of the functionality
[2] Available in US, UK, Canada
Features (new in blue)
Office 365
E3
Microsoft 365
Business
Estimated retail price per user per month $USD (with annual commitment) $20 $20
Maximum number of users unlimited 300
Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote, Access), Office Online ProPlus Business
Email & Calendar Outlook, Exchange Online 100GB 50GB
Chat-based Workspace,
Meetings
Microsoft Teams, Skype For Business  
File Storage OneDrive for Business, Unlimited 1 TB
Social, Video, Sites Stream, Yammer, Planner, SharePoint Online1, Power Apps1, Flow1  
Business Apps Scheduling Apps – Booking, StaffHub  
Business Apps – Outlook Customer Manager, MileIQ1 Business center2, Listings2, Connections2, Invoicing2 
Threat Protection Office 365 Advanced Threat Protection 
Windows Exploit Guard Enforcement 
Identity & Access Management Azure Active Directory - SSPR Cloud Identities, MFA, SSO >10 Apps 
Device & App Management Office 365 MDM  
Microsoft Intune, Windows AutoPilot, Windows Pro Management 
Upgrade rights to Windows 10 Pro for Win 7/8/8.1 Pro licenses 
Information Protection 100 GB Exchange Archiving, Office 365 Data Loss Prevention4  
Azure Information Protection Plan 1, BitLocker Enforcement 
On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype) 
Compliance Litigation Hold, eDiscovery, Compliance Manager, Data Subject Requests  
Comparison of Microsoft 365 Business and Office 365 E3
[3] Currently in public preview in US, UK, Canada
[4] Data Loss Prevention Features will be available summer 2018
Safeguard your data
Protect your company against
external threats and data leaks
Protection
fromthreats
Protectionfrom
dataleaks
Control
dataaccess
Safeguard your data:
Protectionfromthreats
AI-powered attachment scanning
detects malware previously not seen
Links are checked in real time to warn
you if the destination is a malicious site
Windows devices are monitored for
suspicious processes like ransomware
Safeguard your data:
Protectionfromdataleaks
Apply data loss prevention policies to
help keep sensitive information from
falling into the wrong hands*
Enforce BitLocker device encryption to
protect data if a computer is lost or
stolen
Manage all your devices—PCs, Mac, iOS,
and Android—with full-featured Intune
management
Safeguard your data:
Controldataaccess
​Apply encryption and restrictions like
do not forward to emails and
documents
Remotely wipe business data without
affecting personal information
Require PIN or fingerprint to access
business documents and data
Security that travels with you
Protect your data and devices against malware, malicious
attacks, and device loss or theft. BitLocker, BitLocker to
Go, and Windows Information Protection help protect
business data on mobile devices by ensuring all business
data is encrypted and accessible only by authorized users.
Further protect Windows 10 devices from unauthorized
access using Windows Hello multi-factor authentication
to strengthen your users’ device credentials.
Perform a remote Selective Wipe of company data easily
on lost or stolen devices.
Reduce your security risk
Centralize control of your company data on
personal devices.
Reduce your risk profile with security features
for SMB customers.
Apply a consistent security configuration
profile, across managed devices.
Establish a baseline of security policies across
managed devices.
Configure devices consistently to help ensure
that your data and devices are protected from
malware and external threats.
Help protect your devices, data, and people
Know that lost or stolen devices are protected with Windows 10 built-in encryption
capabilities like BitLocker and BitLocker to Go.
Help prevent accidental data leaks by securely separating business information from
personal information with Windows Information Protection, and perform a remote
Selective Wipe of business data on demand while leaving personal data untouched.
Make sure employees always have access to files while confining company
information to Office apps, using App Protection for Office mobile apps capabilities
for personal iOS, and Android devices.
Make accessing Windows 10 devices more convenient, simple, and secure by using
Windows Hello biometric authentication2 to unlock devices with a look or a touch.
Help make sure that devices boot securely and that only trusted software can run
during start-up with Windows Trusted Boot used in combination with the PC industry
hardware standard, UEFI Secure Boot.
Enforce Windows Defender to always be on from within the admin console.
Windows Defender Exploit Guard
Antivirus/antimalware detection and protection enhanced by cloud-
based analysis and insights.
Office 365 Advanced Threat Protection
Detection of—and protection against—malware and malicious links for
your Office 365 email and productivity apps.
Data Loss Prevention
Identify and protect sensitive information
Device Management Policies
Protect & secure devices and the business data access by and stored
on devices
Azure Information Protection
Classify, label, and protect files no matter where they are or where they
go 41
Resist attacks and exploitations
43
Protect against all types of emerging threats
44
Apply policies that provide pre-breach threat resistance in Windows 10,
reducing the attack and exploit surface area of Windows and your
applications.
Automatically applies a number of exploit mitigation techniques on both the
operating system processes and on individual apps.
• Attack surface reduction
• Controlled folder access
• Network Protection
45
Targets specific behaviors that are typically used by malware and malicious
apps to infect machines, such as:
• Malware included as executable files and scripts in Office apps or email.
• Scripts that are obfuscated or otherwise suspicious.
• App behaviors that are not usually initiated during normal day-to-day work.
46
Protect company data from modification by suspicious or malicious apps,
such as ransomware. These types of apps are blocked from making changes
in protected folders.
Executable files (.exe, .scr, .dll files and others) are assessed by to determine if
the app is malicious or safe. If the app is determined to be malicious or
suspicious, then it will not be allowed to make changes to any files in any
protected folder.
47
Helps reduce the attack surface of your devices from Internet-based events.
Prevents employees from using any application to access dangerous domains
that may host:
• Phishing scams
• Exploits
• Other malicious content
48
Network protection
49
Advanced threat protection: Time-of-click protection for malicious links.
51
Web servers
perform latest URL
reputation check
Rewriting URLs to
redirect to a web
server.
User clicking URL is
taken to EOP web
servers for the latest
check at the “time-
of-click”
Advanced threat protection: Sandboxing technology for malicious attachments.
52
Sandboxing
Advanced threat protection: URL detonation.
53
Sandboxing
Email with link Link added to
reputation server
Our systems continuously update and enhance: Updating known ”malware” after discovery
of unknown file hash.
54
Email with attachment
Signature based AV
blocks known threats
#
With DLP
, you can:
• Identify sensitive information across many locations.
• Prevent accidental sharing of sensitive information.
• Help users learn how to stay compliant without interrupting their workflow.
• View DLP reports showing content that matches your organization’s DLP
policies.
56
57
You may scope a policy to specific locations or all locations
All locations includes:
• SharePoint Online
• OneDrive for Business accounts
• Exchange mailboxes
58
• Over 80 built in sensitive item types
• Custom sensitive item types
59
BitLocker is a data protection feature that encrypts drives on your computer
to help prevent data theft or exposure.
Simple setting to enforce BitLocker device encryption on all Windows devices
to help protect against data theft or exposure if a protected device is lost or
stolen
61
62
Device management polices can be applied to a variety of devices:
• iOS
• Android
• Windows 10
63
Automatically to protect a device that is lost or stolen
• Delete work files from an inactive device
• Save all work files to OneDrive for Business
• Encrypt work files
64
Settings that control how users access Office files on mobile devices
• Require a PIN or fingerprint to access Office apps
• Reset PIN when logins fail
• Require users to sign in again after Office apps have been idle
• Deny access to work files on jailbroken or rooted devices
• Don't allow users to copy content from Office apps into personal apps
65
Files used by these apps can be protected:
66
iOS / Android Windows 10
Word Mobile Office Desktop
Excel Mobile OneDrive
PowerPoint Mobile OneNote
Outlook Mobile Mail and Calendar
OneDrive Skype for Business
OneNote Microsoft Edge
Skype for Business Internet Explorer
Teams
Windows 10 devices have additional protection options:
• Prevent copying of company data
• Enable recovery of personal data
• Protection for additional company cloud locations
67
68
Challenges with the complex environment
Employees
Business partners
Customers
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen credentials
The problem is ubiquitous
Intellectual Property theft has
increased
56% rise data theft
Accidental or malicious breaches due
to lack of internal controls
88% of organizations are Losing control of
data
80% of employees admit to
use non-approved SaaS app 91% of breaches could have
been avoided
Organizations no longer confident in
their ability to detect and prevent threats
Saving files to non-approved cloud
storage apps is common
Sources:
Unregulated,
unknown
Managed mobile
environment
How much control
do you have?
On-premises
Perimeter
protection
Identity, device
management protection
Hybrid data = new normal
It is harder to protect
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELING
CLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Azure Information
Protection DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELING
CLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Full Data
Lifecycle
SECRET
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
PERSONAL
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
Policies for specific
groups/departments
Can be viewed and applied only
by the members of that group
Customization options for
labels, sub-labels, and settings
like mandatory labeling, default
label, and justifications
Reclassification
You can override a
classification and
optionally be required
to provide a justification
Recommended
Based on the content you’re
working on, you can be
prompted with suggested
classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
Label and protect any file through
the windows shell-explorer
Select either one file, multiple files
or a folder and apply a label
Query for file labels and protection
attributes
Set a label and/or protection for
documents stored locally or on file
shares
Classified as Microsoft Confidential
Role: Finance
Group: Contoso Finance
Office: London, UK
INTERNAL
Azure information
protection
Identifies document tagged
INTERNAL being shared publicly
Move to
quarantine
Restricted
to owner
USER
Uploaded to
public share
Admin notified
about problem.
CLOUD APP
SECURITY PORTAL
FINANCE
CONFIDENTIAL
Persistent labels that travel with the document
Labels are metadata written to
documents
Labels are in clear text so that other
systems such as a DLP engine can read
it
VIEW EDIT COPY PASTE
Email
attachment
FILE
Protect data needing protection by:
Encrypting data
Including authentication requirement and a
definition of use rights (permissions) to the data
Providing protection that is persistent and travels
with the data
Personal apps
Corporate apps
aEZQAR]ibr{qU@M]
BXNoHp9nMDAtnBfr
fC;jx+Tg@XL2,Jzu
()&(*7812(*:
Use rights +
Secret cola formula
Water
Sugar
Brown #16
PROTECT
Usage rights and symmetric
key stored in file as “license”
Each file is protected by
a unique AES symmetric
License protected
by customer-owned
RSA key
Water
Sugar
Brown #16
UNPROTECT
Use rights
+
Azure RMS never
sees the file content,
only the license
Apps protected with
RMS enforce rights
SDK
Apps use the SDK to
communicate with the
RMS service/servers
File content is never sent
to the RMS server/service
aEZQAR]ibr{qU@M]B
XNoHp9nMDAtnBfrfC
;jx+Tg@XL2,Jzu
()&(*7812(*:
Use rights
+
LOCAL PROCESSING ON PCS/DEVICES
Authentication & collaboration BYO Key
RMS connector
Authorization
requests go to
a federation
service
Data protection for
organizations at different
stages of cloud adoption
Ensures security because
sensitive data is never
sent to the RMS server
Integration with on-premises
assets with minimal effort
AAD Connect
ADFS
Authentication & collaboration BYO Key
RMS connector
Authorization
requests go to
a federation
service
Data protection for
organizations at different
stages of cloud adoption
Ensures security because
sensitive data is never
sent to the RMS server
Integration with on-premises
assets with minimal effort
Hold your key on premises
(roadmap)
AAD Connect
ADFS
HYO Key
Share internally, with business partners, and customers
Bob
Jane
Internal user
*******
External user
*******
Any device/
any platform
Sue
File share
SharePoint
Email
LoB
Leverage ad-hoc end user controls
or automatic policies
Protect
Mitigates risk of unintended disclosure
through encryption and rights protection
Control
Leverage automatic policies or ad hoc end-
user controls, for emails shared with anyone
Compliance
Meet obligations that require encrypting
data
Recipients can read
protected messages using
consumer identities
Easily read protected
emails on any device
Azure Active Directory
On-premises organizations
doing full sync
On-premises organizations
doing partial sync
Organizations completely in cloud
…and all of these organizations
can interact with each other.
Organizations created
through ad-hoc signup
ADFS
Using Azure AD for authentication
Monitor use, control and block abuse
Sue
Joe blocked in North America
Jane accessed from India
Bob accessed from South America
MAP VIEW
Jane blocked in Africa
Jane
Competitors
Jane access is revoked
Sue
Bob
Jane
WHY AZURE INFORMATION PROTECTION?
Persistent
protection
Safe
sharing
Intuitive
experience
Greater
control
Best Practice - Start small, do it now, and move quickly
1. Classify Take simple steps, it generates high-impact quickly (ie.‘Do Not
Forward’ for HR and Legal)
2. Label Test, phase the roll out, and learn – IT can’t know it all
3. Protect Control sensitive internal email flow across all PCs/Devices
4. Monitor ‘Share Protected’ files with business partners (B2B)
5. Respond Teach and enable users to revoke access
Next Steps:
00 - Microsoft 365 Business Secure Deployment Toolkit - Kickoff and Technical Overview.pptx

More Related Content

Similar to 00 - Microsoft 365 Business Secure Deployment Toolkit - Kickoff and Technical Overview.pptx

James dimas it infrastructure approach
James dimas it infrastructure approachJames dimas it infrastructure approach
James dimas it infrastructure approachJames (JD) Dimas
 
Ray Business Technologies Process Methodology
Ray Business Technologies Process MethodologyRay Business Technologies Process Methodology
Ray Business Technologies Process Methodologyray biztech
 
SITB130: Project Management for the Digitally Enabled
SITB130: Project Management for the Digitally EnabledSITB130: Project Management for the Digitally Enabled
SITB130: Project Management for the Digitally EnabledIvanti
 
SQA Manager_Profile_Suman Kumar Ghosh
SQA Manager_Profile_Suman Kumar GhoshSQA Manager_Profile_Suman Kumar Ghosh
SQA Manager_Profile_Suman Kumar GhoshSuman Ghosh
 
Working effectively with primavera support
Working effectively with primavera supportWorking effectively with primavera support
Working effectively with primavera supportp6academy
 
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...ssuser835d1a
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...Chirag Patel
 
É possível medir se um gigante é ágil?
É possível medir se um gigante é ágil?É possível medir se um gigante é ágil?
É possível medir se um gigante é ágil?Alan Braz
 
Agile Truths and Misconceptions
Agile Truths and MisconceptionsAgile Truths and Misconceptions
Agile Truths and MisconceptionsRichard Cheng
 
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingMoving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingZero Wait-State
 
Methodologies 3: Using Spira for Waterfall
Methodologies 3: Using Spira for WaterfallMethodologies 3: Using Spira for Waterfall
Methodologies 3: Using Spira for WaterfallInflectra
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptx
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptx00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptx
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptxDuyVo750289
 

Similar to 00 - Microsoft 365 Business Secure Deployment Toolkit - Kickoff and Technical Overview.pptx (20)

James dimas it infrastructure approach
James dimas it infrastructure approachJames dimas it infrastructure approach
James dimas it infrastructure approach
 
Ray Business Technologies Process Methodology
Ray Business Technologies Process MethodologyRay Business Technologies Process Methodology
Ray Business Technologies Process Methodology
 
SITB130: Project Management for the Digitally Enabled
SITB130: Project Management for the Digitally EnabledSITB130: Project Management for the Digitally Enabled
SITB130: Project Management for the Digitally Enabled
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
SQA Manager_Profile_Suman Kumar Ghosh
SQA Manager_Profile_Suman Kumar GhoshSQA Manager_Profile_Suman Kumar Ghosh
SQA Manager_Profile_Suman Kumar Ghosh
 
Jai Dinesh Babu_Resume
Jai Dinesh Babu_ResumeJai Dinesh Babu_Resume
Jai Dinesh Babu_Resume
 
Working effectively with primavera support
Working effectively with primavera supportWorking effectively with primavera support
Working effectively with primavera support
 
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
103240-The-New-Way-of-Thinking-Our-Implementation-experience-with-Oracle-HCM-...
 
Resume
ResumeResume
Resume
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
DPTripathy_Profile
DPTripathy_ProfileDPTripathy_Profile
DPTripathy_Profile
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Pavankumar Kakarla
Pavankumar KakarlaPavankumar Kakarla
Pavankumar Kakarla
 
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...
Collab365 Global Conference 1 Rolling out Microsoft Teams for collaboration i...
 
É possível medir se um gigante é ágil?
É possível medir se um gigante é ágil?É possível medir se um gigante é ágil?
É possível medir se um gigante é ágil?
 
Agile Truths and Misconceptions
Agile Truths and MisconceptionsAgile Truths and Misconceptions
Agile Truths and Misconceptions
 
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingMoving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial Manufacturing
 
Methodologies 3: Using Spira for Waterfall
Methodologies 3: Using Spira for WaterfallMethodologies 3: Using Spira for Waterfall
Methodologies 3: Using Spira for Waterfall
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptx
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptx00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptx
00 - Microsoft 365 Digital Workforce Workshop - Delivery Guide.pptx
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

00 - Microsoft 365 Business Secure Deployment Toolkit - Kickoff and Technical Overview.pptx

  • 1. Engagement Kickoff & Technology Overview Microsoft 365 Business Secure Deployment T oolkit Speaker name <Partner Name>
  • 2. Our expertise + Microsoft 365 Business We can manage your security operations remotely so you don’t have to…  Supporting point #1  Supporting point #2  Supporting point #3 We can help you integrate your…  Supporting point #1  Supporting point #2  Supporting point #3 We’re the expert in cloud deployment…  Supporting point #1  Supporting point #2  Supporting point #3
  • 3. Introductions Project Overview and Scope Approach and Scope Timeline Engagement Process Technology Overview Microsoft 365 Business Overview Windows Defender Exploit Guard Office 365 Advanced Threat Protection (ATP) Office 365 Data Loss Prevention (DLP) Device Management Policies Azure Information Protection (AIP) Closing Questions & Answers Next Steps
  • 4. Workflow and Schedule Two weeks ago Pre-Engagement meeting Last week Secure executive sponsor and align resources to complete the offer Now Complete the Microsoft 365 Business Secure Deployment offer One week from now Present the findings, discuss remediation and next steps. Deliver prioritized roadmap
  • 5. Workshop Description Outcome Customer attendees Time Scheduled time, room Day 1 Engagement Kickoff Provides an overview of the offer goals as well as an opportunity to cover Q&A and project governance. Agreed plan and schedule for the 2-day on-site assessment. Confirm schedule and logistics All project team 2 hours <Time>, <Room> Start Assessment & Remediation Answer the questions from the offline assessment and examine Office 365 Secure Score if applicable Remediation Checklist Selected customer responders 6 hours <Time>, <Room> Day 2 Day 1 Review Review progress from day one, discuss any open items and identified issues. Ready to move on with completion of the Microsoft GDPR Detailed Assessment. All project team 0.5 hours <Time>, <Room> Complete Deployment Workshop Microsoft 365 Business Deployment Plan Selected customer responders 1.5 hours <Time>, <Room> Deployment, outcome analysis & Write-Up Microsoft 365 Business Deployed IT Team 6 hours <Time>, <Room> Microsoft 365 Business Secure Deployment Agenda
  • 6. Workshop Description Outcome Customer attendees Time Scheduled time, room Day 3 Day 2 Review Review progress from day two, discuss any open items and identified issues. Ready to move on with completion of Security Workshop All project team 30 minutes <Time>, <Room> Start Security Workshop Security Plan Selected customer responders 1.5 hours <Time>, <Room> Deployment, outcome analysis & Write-Up Security features implemented IT Team 6 hours <Time>, <Room> Day 4 Day 3 Review Review progress from day three, discuss any open items and identified issues. Ready to move on with completion of Sensitive Data Workshop All project team 0.5 hours <Time>, <Room> Complete Sensitive Data Workshop Data Governance Plan Selected customer responders 1.5 hours <Time>, <Room> Deployment, outcome analysis & Write-Up Data governance features implemented IT Team 6 hours <Time>, <Room> Microsoft 365 Business Secure Deployment Agenda
  • 7. Workshop Description Outcome Customer attendees Time Scheduled time, room Day 5 Day 4 Review Review progress from day four, discuss any open items and identified issues. Ready to move on with completion of Migration Workshop All project team 30 minutes <Time>, <Room> Start Migration Workshop Migration Plan Selected customer responders 1.5 hours <Time>, <Room> Migration, outcome analysis & Write-Up Migration started IT Team 6 hours <Time>, <Room> Days 6-10 Daily Review Review progress from prior day, discuss any open items and identified issues. Ready to continue with migraiton All project team 0.5 hours <Time>, <Room> Migration Email and files migrated to Office 365 Business Selected customer responders 6.5 hours <Time>, <Room> Outcome analysis & Write-Up Status report & project close on final day IT Team 1 hours <Time>, <Room> Microsoft 365 Business Secure Deployment Agenda
  • 8. Customer Team - Workshop Attendees Role Description Title Contact information Project Executive Sponsor • Executive sponsor who is responsible for driving the strategic vision for the organization & making key decisions • Ultimate authority and accountability for the project and delivery on project objectives • Helps resolve issues escalated by project team • Provides guidance and clarity regarding overall security strategy, standards and policies for the organization Project Manager • Coordinates partner and working teams engaged in the project • Schedules all meetings with appropriate resources • Is the central point for dissemination of the engagement deliverables • Records and manages project issues, including escalations • Liaises with, and provides updates to, project executive sponsors • Ensures that the on-site requirements are met in time for the on-site workshops IT Administrator(s) and Security team • Responsible for IT security strategy defined by the organization • Analyses and chooses products for the organization that meets business goals • Accountable for creating and maintaining the infrastructure • Provides insights into current and planned IT & security guidelines, requirements and standards for the organization
  • 9. Partner Team - Workshop Attendees Role Description Title Contact information Project / Engagement Manager • Develops and maintains project timeline • Coordinates partner and working teams engaged in the project • Manages project deliverables • Records and manages project issues, including escalations • Liaises with, and provides updates to, customer Project Manager DeliveryArchitect s / Consultants • Prepares the workshop materials and delivers the workshops • Performs deployment, configuration, and migration tasks • Accountable for creating the engagement deliverables
  • 10. Team Introductions Please share your name and where you are from Please share your role in the company Please share your expectations of the session
  • 11.
  • 12. 14 Assist with the deployment of: Microsoft 365 Business Intune Device Management Office 365 Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Azure Information Protection (AIP)
  • 13. We will utilize the Online Services Lifecycle methodology (OSL) to complete this project: 15 Initiation Assess Remediate Enable Migrate
  • 14. We will utilize the Online Services Lifecycle methodology (OSL) to complete this project: 16 Initiation Assess Remediate Enable Migrate Initiate team formation and communicate expectations. Conduct a detailed walk- through of the SOW. Complete the project initiation and launch prerequisites.
  • 15. We will utilize the Online Services Lifecycle methodology (OSL) to complete this project: 17 Initiation Assess Remediate Enable Migrate Conduct the assessment workshop. Complete the Secure Score assessment Document the remediation checklist.
  • 16. We will utilize the Online Services Lifecycle methodology (OSL) to complete this project: 18 Initiation Assess Remediate Enable Migrate Provide the customer up to ½ day of remediation activity assistance. Update and finalize the remediation checklist based on Customer Name’s feedback. Customer to perform remaining remediation activities, resolving or mitigating all items in the remediation checklist.
  • 17. We will utilize the Online Services Lifecycle methodology (OSL) to complete this project: 19 Initiation Assess Remediate Enable Migrate Conduct the deployment workshop. Update the deployment plan based on Customer input. Assist with the deployment of the products in scope. Assist with the functional testing of the deployed solution.
  • 18. We will utilize the Online Services Lifecycle methodology (OSL) to complete this project: 20 Initiation Assess Remediate Enable Migrate (optional) Plan for migration of email Plan for migration of files Execute migration
  • 19. The following items are considered out of scope for this engagement— For Office 365 ATP: Deployment or configuration of non-Microsoft message hygiene solutions. Migration of email block/allow lists. Configuration of Domain Name System records required for DomainKeys Identified Mail. SIEM integration. Creation of custom reports, dashboards, or delivery schedules. Integration of Office 365 Advanced Threat Protection with other email antivirus or antimalware solutions, whether on-premises or cloud-based. 21
  • 20. The primary risks to the success of the engagement are: Delays in necessary changes to DNS for Office 365 custom domains. Unknown/Insecure mail flow ingress (bypassing EOP/ATP).
  • 22. Complexity Initial setup, fine-tuning, creating rules, policies, thresholds, and baselines can take a long time. Prone to false positives You receive too many reports in a day with several false positives that require valuable time you don’t have. Designed to protect the perimeter When attackers successfully compromise a user, your current defenses provide limited detection and protection. 25
  • 23. 26 User and entity behavior analytics (UEBA) Machine Learning Big Data
  • 24.
  • 25. Technology challenges faced by small and midsized businesses today Keeping technology up-to-date Mobile, distributed workforce Protecting sensitive data Cyber threats & phishing schemes
  • 26. INTRODUCING Microsoft 365 Business Get more done Work better together Safeguard your data Build your business Simplified for you
  • 27.
  • 28. What’s new? We’ve recently added advanced security features to Microsoft 365 Business to help businesses protect against cyberthreats and safeguard sensitive information. 1. Office 365 Advanced Threat Protection Attachment scanning & ML detection to catch suspicious attachments Link Scanning/Checking to prevent users from clicking suspicious links 2. Windows Exploit Guard Enforcement Preventing devices from ransomware and malicious websites at device end points Cyber Threats 1. Data Loss Prevention Does Deep Content Analysis to easily identify, monitor, and protect sensitive information from leaving org 2. Azure Information Protection Controls & Manages how sensitive content is accessed 3. Intune Availability Protecting data across devices with E2E Device and app management 4. Exchange Online archiving 100GB Archiving & preservation policies to recover data or remain compliant 5. BitLocker Enforcement Encrypt Data on devices to protect data if device lost or stolen Safeguard Sensitive Information
  • 29. [1] Indicates Office 365 has Plan 2 and Microsoft 365 Business has Plan 1 of the functionality [2] Available in US, UK, Canada Features (new in blue) Office 365 E3 Microsoft 365 Business Estimated retail price per user per month $USD (with annual commitment) $20 $20 Maximum number of users unlimited 300 Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote, Access), Office Online ProPlus Business Email & Calendar Outlook, Exchange Online 100GB 50GB Chat-based Workspace, Meetings Microsoft Teams, Skype For Business   File Storage OneDrive for Business, Unlimited 1 TB Social, Video, Sites Stream, Yammer, Planner, SharePoint Online1, Power Apps1, Flow1   Business Apps Scheduling Apps – Booking, StaffHub   Business Apps – Outlook Customer Manager, MileIQ1 Business center2, Listings2, Connections2, Invoicing2  Threat Protection Office 365 Advanced Threat Protection  Windows Exploit Guard Enforcement  Identity & Access Management Azure Active Directory - SSPR Cloud Identities, MFA, SSO >10 Apps  Device & App Management Office 365 MDM   Microsoft Intune, Windows AutoPilot, Windows Pro Management  Upgrade rights to Windows 10 Pro for Win 7/8/8.1 Pro licenses  Information Protection 100 GB Exchange Archiving, Office 365 Data Loss Prevention4   Azure Information Protection Plan 1, BitLocker Enforcement  On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype)  Compliance Litigation Hold, eDiscovery, Compliance Manager, Data Subject Requests   Comparison of Microsoft 365 Business and Office 365 E3 [3] Currently in public preview in US, UK, Canada [4] Data Loss Prevention Features will be available summer 2018
  • 30. Safeguard your data Protect your company against external threats and data leaks Protection fromthreats Protectionfrom dataleaks Control dataaccess
  • 31. Safeguard your data: Protectionfromthreats AI-powered attachment scanning detects malware previously not seen Links are checked in real time to warn you if the destination is a malicious site Windows devices are monitored for suspicious processes like ransomware
  • 32. Safeguard your data: Protectionfromdataleaks Apply data loss prevention policies to help keep sensitive information from falling into the wrong hands* Enforce BitLocker device encryption to protect data if a computer is lost or stolen Manage all your devices—PCs, Mac, iOS, and Android—with full-featured Intune management
  • 33. Safeguard your data: Controldataaccess ​Apply encryption and restrictions like do not forward to emails and documents Remotely wipe business data without affecting personal information Require PIN or fingerprint to access business documents and data
  • 34. Security that travels with you Protect your data and devices against malware, malicious attacks, and device loss or theft. BitLocker, BitLocker to Go, and Windows Information Protection help protect business data on mobile devices by ensuring all business data is encrypted and accessible only by authorized users. Further protect Windows 10 devices from unauthorized access using Windows Hello multi-factor authentication to strengthen your users’ device credentials. Perform a remote Selective Wipe of company data easily on lost or stolen devices.
  • 35. Reduce your security risk Centralize control of your company data on personal devices. Reduce your risk profile with security features for SMB customers. Apply a consistent security configuration profile, across managed devices. Establish a baseline of security policies across managed devices. Configure devices consistently to help ensure that your data and devices are protected from malware and external threats.
  • 36. Help protect your devices, data, and people Know that lost or stolen devices are protected with Windows 10 built-in encryption capabilities like BitLocker and BitLocker to Go. Help prevent accidental data leaks by securely separating business information from personal information with Windows Information Protection, and perform a remote Selective Wipe of business data on demand while leaving personal data untouched. Make sure employees always have access to files while confining company information to Office apps, using App Protection for Office mobile apps capabilities for personal iOS, and Android devices. Make accessing Windows 10 devices more convenient, simple, and secure by using Windows Hello biometric authentication2 to unlock devices with a look or a touch. Help make sure that devices boot securely and that only trusted software can run during start-up with Windows Trusted Boot used in combination with the PC industry hardware standard, UEFI Secure Boot. Enforce Windows Defender to always be on from within the admin console.
  • 37.
  • 38. Windows Defender Exploit Guard Antivirus/antimalware detection and protection enhanced by cloud- based analysis and insights. Office 365 Advanced Threat Protection Detection of—and protection against—malware and malicious links for your Office 365 email and productivity apps. Data Loss Prevention Identify and protect sensitive information Device Management Policies Protect & secure devices and the business data access by and stored on devices Azure Information Protection Classify, label, and protect files no matter where they are or where they go 41
  • 39.
  • 40. Resist attacks and exploitations 43
  • 41. Protect against all types of emerging threats 44
  • 42. Apply policies that provide pre-breach threat resistance in Windows 10, reducing the attack and exploit surface area of Windows and your applications. Automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. • Attack surface reduction • Controlled folder access • Network Protection 45
  • 43. Targets specific behaviors that are typically used by malware and malicious apps to infect machines, such as: • Malware included as executable files and scripts in Office apps or email. • Scripts that are obfuscated or otherwise suspicious. • App behaviors that are not usually initiated during normal day-to-day work. 46
  • 44. Protect company data from modification by suspicious or malicious apps, such as ransomware. These types of apps are blocked from making changes in protected folders. Executable files (.exe, .scr, .dll files and others) are assessed by to determine if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder. 47
  • 45. Helps reduce the attack surface of your devices from Internet-based events. Prevents employees from using any application to access dangerous domains that may host: • Phishing scams • Exploits • Other malicious content 48 Network protection
  • 46. 49
  • 47.
  • 48. Advanced threat protection: Time-of-click protection for malicious links. 51 Web servers perform latest URL reputation check Rewriting URLs to redirect to a web server. User clicking URL is taken to EOP web servers for the latest check at the “time- of-click”
  • 49. Advanced threat protection: Sandboxing technology for malicious attachments. 52 Sandboxing
  • 50. Advanced threat protection: URL detonation. 53 Sandboxing Email with link Link added to reputation server
  • 51. Our systems continuously update and enhance: Updating known ”malware” after discovery of unknown file hash. 54 Email with attachment Signature based AV blocks known threats #
  • 52.
  • 53. With DLP , you can: • Identify sensitive information across many locations. • Prevent accidental sharing of sensitive information. • Help users learn how to stay compliant without interrupting their workflow. • View DLP reports showing content that matches your organization’s DLP policies. 56
  • 54. 57
  • 55. You may scope a policy to specific locations or all locations All locations includes: • SharePoint Online • OneDrive for Business accounts • Exchange mailboxes 58
  • 56. • Over 80 built in sensitive item types • Custom sensitive item types 59
  • 57.
  • 58. BitLocker is a data protection feature that encrypts drives on your computer to help prevent data theft or exposure. Simple setting to enforce BitLocker device encryption on all Windows devices to help protect against data theft or exposure if a protected device is lost or stolen 61
  • 59. 62
  • 60. Device management polices can be applied to a variety of devices: • iOS • Android • Windows 10 63
  • 61. Automatically to protect a device that is lost or stolen • Delete work files from an inactive device • Save all work files to OneDrive for Business • Encrypt work files 64
  • 62. Settings that control how users access Office files on mobile devices • Require a PIN or fingerprint to access Office apps • Reset PIN when logins fail • Require users to sign in again after Office apps have been idle • Deny access to work files on jailbroken or rooted devices • Don't allow users to copy content from Office apps into personal apps 65
  • 63. Files used by these apps can be protected: 66 iOS / Android Windows 10 Word Mobile Office Desktop Excel Mobile OneDrive PowerPoint Mobile OneNote Outlook Mobile Mail and Calendar OneDrive Skype for Business OneNote Microsoft Edge Skype for Business Internet Explorer Teams
  • 64. Windows 10 devices have additional protection options: • Prevent copying of company data • Enable recovery of personal data • Protection for additional company cloud locations 67
  • 65. 68
  • 66.
  • 67. Challenges with the complex environment Employees Business partners Customers Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 68. The problem is ubiquitous Intellectual Property theft has increased 56% rise data theft Accidental or malicious breaches due to lack of internal controls 88% of organizations are Losing control of data 80% of employees admit to use non-approved SaaS app 91% of breaches could have been avoided Organizations no longer confident in their ability to detect and prevent threats Saving files to non-approved cloud storage apps is common Sources:
  • 69. Unregulated, unknown Managed mobile environment How much control do you have? On-premises Perimeter protection Identity, device management protection Hybrid data = new normal It is harder to protect
  • 71. Azure Information Protection DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELING CLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT Full Data Lifecycle
  • 72. SECRET CONFIDENTIAL INTERNAL NOT RESTRICTED IT admin sets policies, templates, and rules PERSONAL Classify data based on sensitivity Start with the data that is most sensitive IT can set automatic rules; users can complement it Associate actions such as visual markings and protection
  • 73. Policies for specific groups/departments Can be viewed and applied only by the members of that group Customization options for labels, sub-labels, and settings like mandatory labeling, default label, and justifications
  • 74.
  • 75.
  • 76. Reclassification You can override a classification and optionally be required to provide a justification Recommended Based on the content you’re working on, you can be prompted with suggested classification User set Users can choose to apply a sensitivity label to the email or file they are working on with a single click
  • 77. Label and protect any file through the windows shell-explorer Select either one file, multiple files or a folder and apply a label
  • 78. Query for file labels and protection attributes Set a label and/or protection for documents stored locally or on file shares
  • 79. Classified as Microsoft Confidential Role: Finance Group: Contoso Finance Office: London, UK INTERNAL Azure information protection Identifies document tagged INTERNAL being shared publicly Move to quarantine Restricted to owner USER Uploaded to public share Admin notified about problem. CLOUD APP SECURITY PORTAL
  • 80. FINANCE CONFIDENTIAL Persistent labels that travel with the document Labels are metadata written to documents Labels are in clear text so that other systems such as a DLP engine can read it
  • 81. VIEW EDIT COPY PASTE Email attachment FILE Protect data needing protection by: Encrypting data Including authentication requirement and a definition of use rights (permissions) to the data Providing protection that is persistent and travels with the data Personal apps Corporate apps
  • 82. aEZQAR]ibr{qU@M] BXNoHp9nMDAtnBfr fC;jx+Tg@XL2,Jzu ()&(*7812(*: Use rights + Secret cola formula Water Sugar Brown #16 PROTECT Usage rights and symmetric key stored in file as “license” Each file is protected by a unique AES symmetric License protected by customer-owned RSA key Water Sugar Brown #16 UNPROTECT
  • 83. Use rights + Azure RMS never sees the file content, only the license Apps protected with RMS enforce rights SDK Apps use the SDK to communicate with the RMS service/servers File content is never sent to the RMS server/service aEZQAR]ibr{qU@M]B XNoHp9nMDAtnBfrfC ;jx+Tg@XL2,Jzu ()&(*7812(*: Use rights + LOCAL PROCESSING ON PCS/DEVICES
  • 84. Authentication & collaboration BYO Key RMS connector Authorization requests go to a federation service Data protection for organizations at different stages of cloud adoption Ensures security because sensitive data is never sent to the RMS server Integration with on-premises assets with minimal effort AAD Connect ADFS
  • 85. Authentication & collaboration BYO Key RMS connector Authorization requests go to a federation service Data protection for organizations at different stages of cloud adoption Ensures security because sensitive data is never sent to the RMS server Integration with on-premises assets with minimal effort Hold your key on premises (roadmap) AAD Connect ADFS HYO Key
  • 86. Share internally, with business partners, and customers Bob Jane Internal user ******* External user ******* Any device/ any platform Sue File share SharePoint Email LoB
  • 87. Leverage ad-hoc end user controls or automatic policies Protect Mitigates risk of unintended disclosure through encryption and rights protection Control Leverage automatic policies or ad hoc end- user controls, for emails shared with anyone Compliance Meet obligations that require encrypting data Recipients can read protected messages using consumer identities Easily read protected emails on any device
  • 88. Azure Active Directory On-premises organizations doing full sync On-premises organizations doing partial sync Organizations completely in cloud …and all of these organizations can interact with each other. Organizations created through ad-hoc signup ADFS Using Azure AD for authentication
  • 89. Monitor use, control and block abuse Sue Joe blocked in North America Jane accessed from India Bob accessed from South America MAP VIEW Jane blocked in Africa Jane Competitors Jane access is revoked Sue Bob Jane
  • 90. WHY AZURE INFORMATION PROTECTION? Persistent protection Safe sharing Intuitive experience Greater control
  • 91. Best Practice - Start small, do it now, and move quickly 1. Classify Take simple steps, it generates high-impact quickly (ie.‘Do Not Forward’ for HR and Legal) 2. Label Test, phase the roll out, and learn – IT can’t know it all 3. Protect Control sensitive internal email flow across all PCs/Devices 4. Monitor ‘Share Protected’ files with business partners (B2B) 5. Respond Teach and enable users to revoke access
  • 92.

Editor's Notes

  1. This deck is frequently updated with new insights and feedback from the field. Please keep version history up to date.
  2.  [Note: This customizable slide is for talking about your company and its value. You can fill it out with your own information and add your company logo.]
  3. The time line provided is indicative and needs to be tailored to customers requirements and availability. The pre-engagement meeting is there to set things in motion and to start the process of identifying the right people and take care of logistics. This usually takes a week. The actual on-site engagement will start after the online re-engagement meeting and will take 1-2 weeks. After completion a close out meeting will be conducted in which the outcomes will be presented.
  4. Customize to match your assessment timeframe.
  5. Customize to match your assessment timeframe.
  6. Customize to match your assessment timeframe.
  7. Update team member titles and names during the workshop.
  8. Update team member titles and names prior to the workshop.
  9. Ask everyone on the meeting to present themselves. Note takers should capture this information in the provided template. Limit to 30 seconds per person. It is important to understand the role of the attendees, this will help in identifying the right responders for the questionnaire.
  10. Adapt this slide based on the scope of the project
  11. Instructions: Please remove items that are not in scope for your delivery. You may consider keeping the red text. If you choose to do so, please change the font to match the blue text.
  12. Instructions: Update the timeframe for your scope and remove items that are out of scope for your delivery.
  13. Customize this slide for your customer’s situation
  14. Users face multiple threats—from credential theft (like Mimikatz, password spray, or breach harvesting) to malware (viruses, ransomware, and the like), to phishing (gaining access to a user’s computer and credentials) and infrastructure attacks (including improperly-secured virtual machines and resources in Azure).
  15. Highlight the challenges with traditional tools, and remind them that most companies (including, most like, their own) have deployed numerous solutions from different vendors to address different threat vectors.
  16. Emphasize that while attackers have had advantages in the past, defenders now have a number of advantages as well. Encourage them to think of technological shifts as “force multipliers”, capabilities which greatly enhance an organization’s ability to defend its own assets.
  17. Deliver this section if customer will benefit from a primer on Microsoft 365 Business. We will touch on the major security components again so this section may be unnecessary for customers that already have a solid grasp on Microsoft 365 Business features & functionality.
  18. In designing Microsoft 365 Business, we wanted to address the day to day technology challenges SMBs are facing. Keeping your Technology Current: As an SMB it is hard to keep up with the changes in Technology and update your current systems. Any tech refresh is time consuming, possibly business disrupting – what you need is Technology that keeps up with your needs, that is agile with no down time Mobile distributed workforce: Add to these, the challenges of a Mobile distributed workforce. According to a Yougov survey, 71% of employees in Small and Midsized business admit to accessing work content on their personal mobile devices. The technology demands of catering to a mobile, distributed workforce requires strong collaboration capabilities that transcends devices Protecting Sensitive Data: 53% of SMBs collect sensitive information Like Social Security Number and 1 in 5 SMBs collect Bank account details. Given this and the rise in data breaches it is important to have technology to protect the intentional or unintentional transmission of sensitive data that could put you out of compliance or cause business threatening downtime Cyber Threats & Phishing Schemes: 72% of SMBs believe that their company is very vulnerable to becoming a victim of Cyber-Attack. Again having technology in place that helps prevent you and your employees from being victims to phishing attacks and social engineered ransomware attacks is Paramount given current climate
  19.   What is Microsoft 365 Business? Microsoft 365 Business is a complete integrated solution powered by Office 365 and windows 10 designed to help you securely run and grow your business.   It brings together the best-in-class productivity capabilities of Office 365 that enable you and your employees to create, connect and co-author from anywhere, on any device while also providing you peace of mind through sophisticated security features to safeguard your business information from threats.   Microsoft 365 Business also helps you build your business through specific tools that help you interact with and find new customers   With Microsoft 365 Business you have one subscription that enables collaboration, has tools that help you grow your business while providing you peace of mind by safe guarding your business information.
  20. Now before we begin, let us take a minute to see what we’re going to cover today in Microsoft 365 Business:   You’re going to Learn how you can get more done with Intelligent tools built into the Office you love along with enterprise grade email and file storage   We’ll show you how you can work better together with the new Microsoft Teams and how you can collaborate as a group with your co-workers, customers and suppliers.     Microsoft 365 Business also includes specific business apps designed to help build the business Like Bookings and Outlook customer Manager for Example. These help you Get more customers and improve the efficiency of your business operations​   We’ll also show how Microsoft 365 Business safeguards your data by Helping protect your company against external threats like phishing and malicious emails. It also includes features to help you protect sensitive information like Social security numbers, Credit card information etc from leaving the organization     Finally, we’ll show you how you can easily enable all of these features along with simplifying device setup so you can unlock the value of your Microsoft 365 Business subscription faster   let’s take a deeper dive in to what you get with your Microsoft 365 Business Subscription  
  21. Today, no matter what your small business does, data has never been more valuable. Your business contacts. Your SOWs and invoices. Your accounts information. Your methods and processes. Your templates. Your email.   Technology gives you the ability to access these things, to carry them around on a laptop or a mobile phone, but all of that access exposes them to risk. Employees who don’t understand how to create secure passwords or take precautions, or who forget a device, need guidance. That’s where simplified device management empowers you to take advantage of the enterprise-level security features of Windows 10 Pro. In addition to Enabling all of these amazing productivity and collaboration features, M365 B gives you peace of mind by Safeguarding your business. It helps protect your company against external threats and data leaks of sensitive business information   And it does this by taking a layered approach to security:   First, you get Protection from sophisticated threats hidden in email attachments and links, and get cutting-edge defenses against zero-day threats, ransomware, and other advanced malware attempts.   Second, you get Protection from data leaks helping you prevent sensitive information like SSNs and customer credit card numbers from being shared outside your business   3rd you get to control and manage access to information. With M365 B, you can control who has access to company information by applying restrictions like Do not Copy and Do Not Forward. You can Enjoy peace of mind by remotely wiping business data on lost or stolen devices without affecting personal information  
  22. The top layer focuses on protecting your business from external threats by giving you access to the same enterprise-grade service and protection but without the need for an enterprise-sized IT department.   Our threat protection tools keep your business free of hazards such as spam, malware, viruses, phishing attempts, malicious links, etc. while helping to protect from sophisticated threats cunningly disguised as email attachments or links, zero-day ransomware, and other advanced threat techniques.   These capabilities come from our built-in malware protection capabilities that not only help you prevent threats, but also alert you if a breach has taken place and notify you when additional actions are required, and from advanced file encryption made possible through our BitLocker technology.   Unfortunately, we live in a day and age when virus and malware attacks are a common occurrence. When successful, these attacks can cause several issues for a company—from loss of customer trust to financial woes resulting from business-threatening downtime and more. ATP helps Protects your business from sophisticated phishing attacks, unsafe attachments, suspicious links, ransomware, and other advanced malware The Threat Protection Features in Microsoft 365 Business scan each & every attachment coming in via email. It does a comprehensive, real time analysis of the behavior of the file to determine its intent (whether normal or malicious), thereby leading to better intelligent protection against unsafe attachments that are the basis for phishing schemes and ransomware infections While it would be ideal for employees to understand they shouldn’t click on hyperlinks sent to them from people they don’t know—or messages with other obvious red flags—it’s not realistic to think that all of them will avoid phishing schemes. [Dave edit… replace the previous sentence with: Today’s “bad actors” are more clever than ever. Even your staff who understand that they shouldn’t click on hyperlinks sent from people they don’t know, could be easily fooled by today’s sophisticated phishing schemes.] These features remove the guesswork by doing the check for you and protecting your users from clicking through to malicious or unsafe sites or the system takes users to a warning page before allowing them access to the link. These Threat Protection capabilities also extend to Device end points helping prevent users from interacting with Ransomware and malicious web locations
  23. The second layer helps you protect your business data or sensitive customer or employee information from accidental leaks by utilizing Data Loss Prevention capabilities and mobile device management functionality across both iOS and Android devices which protect your sensitive data from being accessed from unauthorized locations or through unauthorized applications.   What you really get, in other words, is peace of mind that a file isn’t going to be magically lost or corrupted. The threat of information loss is what keeps you up at night, but with your files securely backed up in the cloud, and accessible only by you or your employees – even in the event of a lost or damaged device – you will never lay awake worrying about the security of your data again. Small businesses deal with a variety of sensitive information like Customer credit card numbers, SSN, DOB or even intellectual property that is core to the running of the business. Keeping this information safe can be a challenge because expecting employees to manually check every email or document shared for sensitive information can be hard. The Data Loss Prevention policies in M365 Business help businesses easily identify, monitor, and protect sensitive information through deep content analysis It Includes preconfigured templates that can help businesses detect specific types of sensitive information being communicated such as Credit Card Numbers, SSN, DOB or even locale-specific personally identifiable information (PII). It also provides policy tips, which can help educate and prevent end users from accidental sharing of sensitive info by displaying a policy tip in Outlook. Enforce device encryption with BitLocker to help protect against data theft or exposure if a computer is lost or stolen. Get End to End Intune Device Management across all your devices – PCs, Macs, Mobile devices to protect sensitive information from leaking
  24. Controlling and managing access to who has access to content is the 3rd layer of your security strategy. A challenge that small businesses have is controlling & managing who has access to the company’s sensitive information. Enabling these controls without hindering productivity is also hard. Information Protection Policies in M365B provide capabilities to control & manage how information is accessed and making sure that only the right folks have access to the right data Enjoy peace of mind with features such as: The ability to communicate and collaborate securely while controlling access to sensitive information with controls like “Do No Forward”; “Do not copy” etc The ability to classify sensitive information like “Confidential” and enable specific restriction for how classified can be shared outside and inside the business The ability to securely share sensitive content with authorized external parties through easy to enable encryption controls
  25. Instructions: Update this slide to match the scope of your delivery. Remove items that are not in scope or change the items in red to match the font used for the others.
  26. The slide contents are relatively straightforward; highlight one or two capabilities based on your customer’s profile/history (for example, customers in the health care industry have been hugely impacted by ransomware, so that would be an excellent capability to discuss in more detail).
  27. To tell this story more effectively, consider using content from the MSRC blog on recent success stories involving Windows Defender (for example, https://cloudblogs.microsoft.com/microsoftsecure/2018/02/14/how-artificial-intelligence-stopped-an-emotet-outbreak/ or https://cloudblogs.microsoft.com/microsoftsecure/2017/12/11/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses/).
  28. Attack Surface Reduction = Use rules that reduce the attack surface of devices Controlled folder access = Protect folders from threats such as ransomeware Network protection = Prevent network access to potentially malicious content on the Internet
  29. Safe Links provides real-time, time-of-click protection against malicious URLs in email by redirecting suspicious URLs to an internal web server that checks them against a list of known malicious sites which updated every 20 minutes. When users click on the rewritten URLs, Safe Links redirects them — based on the verdict from inspection — to either the original webpage or a page that warns the user that the site has been determined to be malicious. Safe Links utilizes URL trace capabilities that allow you to track individual malicious links in messages that have been clicked to support faster remediation.
  30. Safe Attachments helps to protect against zero day malware in email attachments by blocking messages that could be malicious. It is designed to detect malicious attachments even before antivirus signatures are available. After passing through Office 365’s normal protection of three anti-virus engines and multiple spam filters provided by Exchange Online Protection, email with a suspicious attachment enters the Safe Attachments’ sandbox environment where we spin up multiple hypervisor environments, each running various versions of a Windows operating system, Office and common 3rd party applications. Attachments are not released until a behavior analysis is performed and the attachments are determined to be safe. Safe Attachments will analyze attachments that are common targets for malicious content, such as Office documents, PDFs, executable file types and flash files. The administrator can establish separate policies for Safe Attachments. Each policy can be applied to a specific set of users, distribution groups or domains. It is also possible to have unique policies within Safe Attachments and so each group of users can have custom settings. The administrator can configure the settings to receive an email notification when an unsafe attachment is identified.
  31. In the Safe Links policy window, click Safe Attachments to scan downloadable content and with the URL detonation feature turned on. URL Detonation provides deeper protection against malicious URLs. Not only do we check a list of malicious URLs when a user clicks on a link, but Office 365 ATP will also perform real-time behavioral malware analysis in a sandbox environment against malicious attachments at destination URLs. For example, if an email includes a link to a Word document on a web server, the document is downloaded into our sandbox environment and detonated as if it were an attachment. The administrator can establish separate policies for Safe Links. Each policy can be applied to a specific set of users, distribution groups, or domains. It is also possible to have unique policies within Safe Links and so each group of users can have custom settings. When a user clicks on an unsafe link, they receive a notification from Office 365.
  32. Our services harness the power of Microsoft’s machine learning capabilities and continuously update and enhance our basic filters. In the example shown here, an email arrives with an attachment which initially gets past our basic filters. However, with the additional protection offered by our advanced threat protection, the attachment is detonated in a sandboxing event and found to be malicious. We then update ALL of our filters across so that the file hash goes from being unknown to known and on the subsequent arrival of an email carrying the attachment, we now block it. That is the power of machine learning which enables our systems to enhance themselves with each new piece of malware we detect.
  33. This illustration shows the options for creating a DLP policy: Choose the protection to apply. Protection can include: Policy tips for users Email report for admins Prevent sharing externally, internally, or both Choose the criteria for applying the protection. Apply the protection to documents with this type of content: you can configure the policy to use sensitive information types and/or labels.
  34. Built in sensitive item types include things such as credit card numbers, SWIFT codes, personal identifiers, etc. Custom sensitive items types can be defined using regular expressions, keywords, built in functions, additional patterns such as dates or addresses, and different combinations of evidence.
  35. Attack Surface Reduction = Use rules that reduce the attack surface of devices Controlled folder access = Protect folders from threats such as ransomeware Network protection = Prevent network access to potentially malicious content on the Internet
  36. We recommend you accept the default values during setup to create application policies for Android, iOS, and Windows 10 that apply to all users. You can create more policies after setup completes.
  37. We recommend you accept the default values during setup to create application policies for Android, iOS, and Windows 10 that apply to all users. You can create more policies after setup completes.
  38. By default, work files are encrypted using a secret key that is stored on the device and associated with the user's profile. Only the user can open and decrypt the file. However, if a device is lost or a user is removed, a file can be stuck in an encrypted state. The Data Recovery Agent (DRA) certificate can be used by an admin as a sort of master key to decrypt the file.  You may specify additional domains or SharePoint locations to make sure those files are protected too.
  39. You have these entities – users, devices, apps and data Data is being shared with employees, customers and business partners You have to manage the complexity of protecting your users’ identities, and data stored on their devices and apps You need to prepare to mitigate the risks of providing freedom and space to your employees. You need to meet compliance and regulatory standards, maintain company security policies and requirements, and detect threats — all the while giving workers a better and more productive experience The cloud is here to stay The ‘cloud accepting’ population is growing… VERY rapidly Your managers (CxO) are changing their minds… or soon will… or are being replaced Microsoft is meeting organizations ‘in the middle’: abilities like lockbox, ‘going local’, etc. Your competition will use the cloud to their advantage You can’t compete with cloud vendors on substrate services (time, cost, innovation) You can’t lay the substrate and do value-add at the same rate as your cloud peers There will be breaches… both in the cloud and on-premises Cloud vendors, with billions invested and far better ‘signals’, will act/evolve far quicker
  40. We heard from you.. And you are not alone
  41. You had control over your data when it resided within your boundaries Now that boundary has expanded with managed devices and cloud assets. MDM solutions help but not when data moves outside of your controlled environment Once shared outside your environment, you lose control over your data.
  42. 1.For years, RMS helped businesses provide persistent protection over their data through encryption, access control and policy enforcement 2.We added tracking and revocation capabilities for greater control over shared data 3. Now we also have classification and labeling capabilities so that you can identify what data needs protection and protect only the data that needs protection
  43. 1.For years, RMS helped businesses provide persistent protection over their data through encryption, access control and policy enforcement 2.We added tracking and revocation capabilities for greater control over shared data 3. Now we also have classification and labeling capabilities so that you can identify what data needs protection and protect only the data that needs protection
  44. Data is born protected, Using companies’ criteria Enforced by IT Enforced on any device <keep personal data.... Personal>
  45. Scoped Policies allow you to build sets of labels that are only visible and usable to specific employees and groups of employees such as teams, business units or projects. In all instances, a global set of policies is made available to all users. The new scoped policies are layered over this global set, available to just users in the specified security group membership. It is important to note that scoped policies are an admin concept, users will not be aware as they just see a combined set of labels they are assigned. Each set of scoped policies allows for customization, including labels, sub-labels, and settings like mandatory labeling, default label, and justifications. The scoping model is consistent with Azure RMS template scoping, in that it is based on Azure Active Directory users and groups. A few important notes on scoped policies: Scopes are optional, you don’t have to define a set or group for a policy. If not set, the policy has global scope for everyone in the tenant. Policies are ordered by administrators. This order defines which scopes are considered higher than others. Policies are combined into an effective policy, which is given to the client.
  46. Flexibility for users to reclassify because policies won’t get it right all the time. But everything is logged so IT can audit in case of violation Users also have the option to label if they deem necessary, even when not automatically classified
  47. With the new, unified AIP client, Classification, Labeling and Protection support is now extended beyond ‘just’ Office files. We have brought together the existing AIP client with the RMS Sharing App features to provide a more complete Information Protection experience in AIP. When you install this new client, you can now classify, label and protect your files through Office applications, through the Windows Explorer shell extension and through PowerShell commands. A user can label and protect any file through the windows shell-explorer, select either one file, multiple files or a folder and apply a label.  (Note: some file types do not offer an ability to attach persistent metadata, for these file types you can only label when protecting).
  48. RMS PowerShell commands have been updated to support Label and Protection actions based on Azure Information Protection policies. Administrators and data-owners can label and protect files in bulk on File stores, or query for the file’s status. The PowerShell cmdlets, which are installed as part of the new unified client, are now GA and enable our customers to: Query for a files Label and Protection attributes Set a Label and/or Protection for documents stored locally or on file servers and network shares that are accessible through SMB/CIFS (e.g. \\server\finance\)
  49. In this example, sensitive data is protected even as it is uploaded to a cloud app This has become a very common scenario, as workers store and share data across potentially several cloud storage services and SaaS apps. When a user creates a document that contains sensitive data, such as credit card information or confidential project information, Azure Information Project labels the document as “INTERNAL”, which means it shouldn’t be shared with others. If the user then tries to upload this document to a cloud storage location, such as using Box, this is detected by Microsoft Cloud App Security MCAS will understand the INTERNAL label and enforce policy to move the file to quarantine and then restrict access to only the file owner
  50. Labels stay with the data to enforce the policies and classification
  51. Extra protection is available for sensitive data Not just encryption, but rights of who can access it and what they can do with the data
  52. -
  53. Context: Email is also main source of sharing information therefore Email prone to unintended disclosure. Encryption typically is also too difficult to use. For a lot of organizations one of their biggest hurdles is making it easy enough so users can adopt the technology and collaborate securely. At Ignite we announced new capabilities in Office 365 Message Encryption that protect and control your sensitive emails. These enhancements are aimed squarely at helping you better safeguard your sensitive email communications without hampering the ability for your users to be productive and to easily collaborate with those inside or outside of your organization. PROTECT: Mitigate the risk of unintended disclosure of emails to anyone inside or outside your organization, so that only the indented recipient with the right identity can read the encrypted message. Recipients outside of the organization can use their email provider. OME provides added layer of encryption at the content level. OME also enables organizations to rights protect the email so only the people with the right identity can read the message and the Office application that’s attached also inherit the protections applied to the email. Ex. Greg from Big Bank needs to send a sensitive message to his client on his recommended stock picks but does not want him to forward. CONTROL: Admins can apply automatic policies and end users can be empowered to apply ad hoc policies that encrypt and rights protect messages sent inside and outside the organization. Additionally, recipients can easily read protected messages using their consumer identities such as Google, Yahoo or Microsoft Accounts – or use a one time passcode. Ex. secret acquisition, company wishes to encrypt all messages between the external company. Admin applies mail flow rule. Ex. Doctor wants to communicate with his/her patients who uses gmail. Patient can authenticate using their Google identity to read and reply to the protected message COMPLIANCE: We’re also providing more enterprise grade capabilities - for regulated customers, Office 365 Message Encryption will enable you to provide and manage your own tenant encryption keys with BYOK with Azure Information Protection for Exchange Online.
  54. Only use this slide for customers that have obligations with regard to the GDPR
  55. Summary of the key benefits Protect all data with the right level Help share Easy to use with great IT control
  56. Data is born protected, Using companies’ criteria Enforced by IT Enforced on any device <keep personal data.... Personal>