You are on page 1of 35

LOGIN

*****
Zero Trust Security
PASSWORD
*******

Strategy For
Microsoft 365
Presented by : Jaweher Ben Torkia
OUTLINE
Cybersecurity Infographics

ZERO TRUST

Username
MICROSOFT DEFENDER

Login

MICROSOFT SENTIEL

2
Cybersecurity Infographics

Zero Trust

3
Cybersecurity Infographics

4
Cybersecurity Infographics

5
Cybersecurity Infographics

6
Zero TrustInfographics
Cybersecurity

Verify explicitly Use least privilege access Assume breach

7
Cybersecurity Infographics

MICROSOFT DEFENDER
Microsoft Defender For Office 365
Microsoft Defender For Endpoints
Microsoft Defender for Cloud Apps
Microsoft Defender For Identity

8
Cybersecurity Infographics

9
Features of Microsoft Defender for Office 365
Cybersecurity Infographics

Real-time security threat Malware protection for Office files


protection for email 01 02 (Word, Excel, Powerpoint…)

Option of additional protections


for sensitive data 04 03 Advanced reporting on the security
of Office 365 environment to
identify, prioritize and block
existing threats

10
ComparisonCybersecurity Infographics
between Microsoft Defender for Office 365 Plan 1
and Plan 2 licenses

Safe Attachments to manage attachment


security

Safe Link to secure links

Anti-phishing Policy

•Office 365 E5 


•Microsoft 365 E5 
•Microsoft 365 E5 Security 
Real-time reports
•Microsoft 365 Business Premium 
•Microsoft 365 Education A5
•Microsoft 365 Education A5 Security

11
ComparisonCybersecurity Infographics
between Microsoft Defender for Office 365 Plan 1
and Plan 2 licenses

Threat Tracking 

Automated investigations and


responses 

Attack simulation

•Office 365 E5 


•Microsoft 365 E5 
•Microsoft 365 E5 Security 
Threat Investigation
•Microsoft 365 Education A5
•Microsoft 365 Education A5 Security

12
Cybersecurity Infographics

13
Cybersecurity Infographics
Licence requirements : Microsoft 365
(E5, E5 Security, A5, A5 Security)

14
ApplicationCybersecurity
management using Infographics
Microsoft Endpoint Manager

Support applications on multiple


Protect enterprise data at the
platforms and operating systems
application level

Assign policies to limit access and Perform a selective reset by only


prevent data from being used deleting corporate data from apps
outside your organization

View reports on apps used and Verify that personal data is kept
track their usage separate from managed data

15
Manage Device compliance
Cybersecurity Infographics

See enrolled devices and get


an inventory of devices
accessing organization
resources

See reports on users and


Configure devices to meet
devices compliance
your security and health
standards

Push certificates to devices so


users can access your Wi-Fi Remove organization data if a
network or connect via VPN device is lost, stolen, or not used
anymore
16
Cybersecurity Infographics

17
Cybersecurity Infographics

18
Cybersecurity
Features Infographics
of Microsoft Defender for Cloud Apps

Regulatory compliance
Complete cloud app visibility 

Protection against threats Protect your sensitive data anywhere in


the cloud 

19
Cybersecurity Infographics

20
Cybersecurity Infographics

Identify and investigate Provide clear


Monitor users, Protect user
suspicious user activities incident
entity behavior, identities and
and advanced attacks information on
and activities with credentials stored
throughout the kill chain a simple
learning-based in Active
analytics Directory timeline for
fast triage

21
Cybersecurity
Microsoft Infographics
Defender for Identity Architecture

22
Cybersecurity Infographics

MICROSOFT SENTIEL
SIEM – Security Information and Event Management
SOAR – Security, Orchestration, Automation and Response

23
24
25
26
27
1

AZURE + MICROSOFT 365


Security Alerts, Activity Data

COLLECTORS
CEF, Syslog, Windows, Linux AZURE SENTINEL

TAXII + MS Graph
Threat Indicators

AZURE MONITOR LOG ANALYTICS


APIs
Custom Logs

28
2 Use overview dashboard and workbooks to get visibility across enterprise

29
3 Leverage analytics to detect threats

30
4 Hunt for threats

31
Investigate incidents
5

32
6 Automate and orchestrate security operations using
integrated Azure Logic Apps

33
Example playbooks

Incident Management Enrichment + Investigation Remediation

Assign an Incident to an Analyst Lookup Geo for an IP Block an IP Address


Open a Ticket (ServiceNow/Jira) Trigger Defender ATP Investigation Block User Access
Keep Incident Status in Sync Send Validation Email to User Trigger Conditional Access
Post in a Teams or Slack Channel Isolate Machine

34
Cybersecurity Infographics

Thank You For Your


Attention

You might also like