Professional Documents
Culture Documents
Author name
Date
Agenda:
Threat Findings
• Threat Check Results
• Endpoint Protection Optional Module Results
• Hybrid Identity Protection Optional Module
Results
Endpoint Protection
Optional Module Results
da t a to
n sh o t and real
Scree a t ed with Action
d .
be up e and data hed.
imag finis <Add recommended actions here>
•
hen
te th is w
Dele
Ex
am
pl
Threats found by Microsoft 365 Defender e
Action
• <Add recommended actions here>
da t a to
n s h o t and real
Scree a t e d with
d .
be up e and data hed.
imag hen finis
te t h is w
Dele
Ex
am
pl
Threats found by Azure Active Directory Identity Protection e
Overview
Key insights
• <Add key insights here>
Action
nd d ata to • <Add recommended actions here>
e ns h ot a h real
Scr e w it
u p d ated ata.
be e an d d
h ed.
im a g i ni s
i s w hen f
e th
Delet
Ex
am
pl
Threats found by Azure Active Directory Identity Protection e
Risky users
Key insights
• <Add key insights here>
da t a to
ns h o t and real
Scree a t e d with Action
d .
be up e and data hed.
imag hen finis • <Add recommended actions here>
te t h is w
Dele
Ex
am
pl
Threats found by Microsoft Defender for Office 365 e
Overview
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
d d at a to
e n sh ot an h real
Scre
d a t ed wit .
be up e and data hed.
imag e n f inis
e th is wh
Delet
Ex
am
pl
Threats found by Microsoft Defender for Office 365 e
Phish threats
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
d d a ta to
ns h o t an real
Scree ated w it h
u pd ata.
be and d ed.
image hen finish
te t h is w
Dele
Ex
am
pl
Threats found by Microsoft Defender for Office 365 e
Malware threats
Key insights
• <Add key insights here>
d ata to Action
ot a n d
c re en s h
w it h real • <Add recommended actions here>
S ated
u p d a ta.
be e an d d
h ed.
im a g in is
is w hen f
e th
Delet
Ex
am
pl
Threats found by Microsoft Defender for e
Action
nd d ata to • <Add recommended actions here>
e n sh ot a h real
Sc r e w it
u p d ated ata.
be e an d d
h ed.
im ag in is
is w hen f
e th
Delet
Ex
am
pl
Threats found by Microsoft Cloud App Security e
d ata to Action
ot a n d
c re en s h
w i t h real • <Add recommended actions here>
S ated
u pd a ta.
be e and d
h ed.
im a g i ni s
i s w hen f
e th
Delet
Ex
am
pl
Threats found by Microsoft Cloud App Security e
Key insights
• <Add key insights here>
n d d ata to
e ns h ot a h real
Sc re
d ated w i t Action
be u p
d d a ta.
a g e an
i ni sh ed. • <Add recommended actions here>
im hen f
i s w
e th
Delet
Ex
am
pl
Cloud discovery done by Microsoft Cloud App Security e
Action
• <Add recommended actions here>
d a t a to
o t and
c ree ns h
wi t h real
S ated
u pd ata.
be e and d
h ed.
im a g i ni s
i s w hen f
e th
Delet
Ex
am
pl
Cloud discovery done by Microsoft Cloud App Security e
d data to Action
en sh ot an h real
Scre
d a t ed wit . • <Add recommended actions here>
be up e and data hed.
imag en f inis
e th i s wh
Delet
Endpoint Protection
Optional Module Results
Ex
am
pl
Threat Exploration (summary view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
d ata to
n s h o t and real
Scree a t ed with
d ata.
be up and d ed.
m a g e in i sh
i
s w h en f
e th i
Delet
Ex
am
pl
Threat Exploration (summary view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
n d d ata to
ee n s hot a ith real
Scr a t edw
d ata.
be up an d d ed.
m a g e in i sh
i
i s w he n f
e th
Delet
Ex
am
pl
Threat & Vulnerability Management (summary view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
d d ata to
e n s h ot an h real
Scre a t ed wit .
d
be up and data ed.
a g e n ish
im
w h e n fi
e thi s
D el et
Ex
am
pl
Threat & Vulnerability Management (summary view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
d d a ta to
n s h ot an real
Scree w it h
e u p dated data.
b and ed.
image hen finish
et e this w
Del
Ex
am
pl
e
Threat Exploration – High and Medium Severity Incidents
d d a ta to
n s h ot an real
Scree ated w it h
u p d ata.
be and d ed.
image hen finish
et e this w
Del
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
Ex
am
pl
e
Threat Exploration – <Incident Name>, Alerts
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
n d d ata to
e n s h ot a h real
Scre w it
u p d ated ata.
be an d d ed.
m a g e in i sh
i
s w h en f
e th i
Delet
Ex
am
pl
e
Threat Exploration – <Incident Name>, Devices
Key insights
• <Add key insights here>
d d ata to Action
e n s h ot an h real
Scre a t ed wit • <Add recommended actions here>
d ata.
be up and d ed.
image hen finish
e t e t his w
Del
Ex
am
pl
e
Threat Exploration – <Incident Name>, Investigations
Key insights
• <Add key insights here>
d d a ta to Action
n s h ot an real
Scree ated w i t h • <Add recommended actions here>
u p d ata.
be and d ed.
image hen finish
et e t his w
Del
Ex
am
pl
e
Threat Exploration – <Incident Name>, Evidence
Key insights
• <Add key insights here>
d d ata to Action
en sh ot an h real
Scre at ed wit • <Add recommended actions here>
d data. ed.
be up and
image hen finish
e t e this w
Del
Ex
am
pl
e
Threat Exploration – <Incident Name>, Graph
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
d at a to
n sh o t and real
Scree a t ed with
d ata.
be up and d ed.
image hen finish
te th is w
Dele
Ex
am
pl
e
Threat & Vulnerability Management – Security
Recommendations
Key insights
• <Add key insights here>
Action
d data to
e n s h ot an h real • <Add recommended actions here>
Scre a t ed wit .
d
be up and data ed.
image hen finish
et e this w
Del
Ex
am
pl
e
Threat & Vulnerability Management – Weaknesses
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
d data to
e n s h ot an h real
Scre a t ed wit .
d
be up and data ed.
image hen finish
et e this w
Del
Hybrid Identity
Protection Optional
Module Results
Ex
am
pl
e
Microsoft Defender for Identity Sensors
Ex
am
pl
Microsoft Defender for Identity Alerts (Summary view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
Ex
am
pl
Microsoft Defender for Identity Alerts (Detailed view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
Ex
am
pl
Microsoft Defender for Identity Alerts (Detailed view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
Ex
am
pl
Microsoft Defender for Identity Alerts (Detailed view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
Ex
am
pl
Identity Security Assessment (Summary view) e
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
Ex
am
pl
e
Identity Security Assessment – Entities exposing
credentials in clear text
Key insights
• <Add key insights here>
Action
• <Add recommended actions here>
Recommendations &
Next Steps
Recommendation
Threat type:
Threat severity: low, medium, severe
Threat Details:
Recommended Mitigation (Product/Feature):
Recommendation
Threat type:
Threat severity: low, medium, severe
Threat Details:
Recommended Mitigation (Product/Feature):
recommendation
• Recommended next steps: complete an in-depth cost savings analysis with Microsoft
partner or field.
Recommendations are to be updated based on the customer's specific desires for cost savings
analysis rather than the real threats found.
Delete this when finished.
Next Steps Discussion
Next Steps Discussion