Professional Documents
Culture Documents
*****
Zero Trust Security
PASSWORD
*******
Strategy For
Microsoft 365
Presented by : Jaweher Ben Torkia
OUTLINE
Cybersecurity Infographics
ZERO TRUST
Username
MICROSOFT DEFENDER
Login
MICROSOFT SENTIEL
2
Cybersecurity Infographics
Zero Trust
3
Cybersecurity Infographics
4
Cybersecurity Infographics
5
Cybersecurity Infographics
6
Zero TrustInfographics
Cybersecurity
7
Cybersecurity Infographics
MICROSOFT DEFENDER
Microsoft Defender For Office 365
Microsoft Defender For Endpoints
Microsoft Defender for Cloud Apps
Microsoft Defender For Identity
8
Cybersecurity Infographics
9
Features of Microsoft Defender for Office 365
Cybersecurity Infographics
10
ComparisonCybersecurity Infographics
between Microsoft Defender for Office 365 Plan 1
and Plan 2 licenses
Anti-phishing Policy
11
ComparisonCybersecurity Infographics
between Microsoft Defender for Office 365 Plan 1
and Plan 2 licenses
Threat Tracking
Attack simulation
12
Cybersecurity Infographics
13
Cybersecurity Infographics
Licence requirements : Microsoft 365
(E5, E5 Security, A5, A5 Security)
14
ApplicationCybersecurity
management using Infographics
Microsoft Endpoint Manager
View reports on apps used and Verify that personal data is kept
track their usage separate from managed data
15
Manage Device compliance
Cybersecurity Infographics
17
Cybersecurity Infographics
18
Cybersecurity
Features Infographics
of Microsoft Defender for Cloud Apps
Regulatory compliance
Complete cloud app visibility
19
Cybersecurity Infographics
20
Cybersecurity Infographics
21
Cybersecurity
Microsoft Infographics
Defender for Identity Architecture
22
Cybersecurity Infographics
MICROSOFT SENTIEL
SIEM – Security Information and Event Management
SOAR – Security, Orchestration, Automation and Response
23
24
25
26
27
1
COLLECTORS
CEF, Syslog, Windows, Linux AZURE SENTINEL
TAXII + MS Graph
Threat Indicators
28
2 Use overview dashboard and workbooks to get visibility across enterprise
29
3 Leverage analytics to detect threats
30
4 Hunt for threats
31
Investigate incidents
5
32
6 Automate and orchestrate security operations using
integrated Azure Logic Apps
33
Example playbooks
34
Cybersecurity Infographics