We ran this webinar in October 2019 to provide a better understanding of the security settings and options that are included in your Microsoft 365 but may not be fully optimised to protect your businesses.
WHAT WE COVERED:
1. The Advanced Security Features In Microsoft 365, Office 365 And The EMS Portfolio
Understanding your current Microsoft security portfolio and better leveraging the features you’ve already paid for.
2. Securing Your Microsoft Environment
Critical considerations in securing your Microsoft cloud environment and why there isn’t a one size fit’s all solution to securing your business.
3. A Real World Business Case Study
2. Adriaan Bekker
Technical Director
Adriaan has over 20 years
experience in information security
management. Holding both
Computer Science and Business
degrees, he offers a valuable blend
of technical expertise and
commercial insight.
ABOUT SOFTWERX
We are the UK’s leading Microsoft cloud security specialist.
Based in Cambridge and London we are a leading Microsoft cloud
security practice with specialist knowledge around cyber security,
cloud infrastructure and compliance.
We have been helping forward-thinking companies modernise and
secure their businesses for nearly 20 years – the chances are we can
help you too.
3. WHAT WE’LL COVER
The advanced security features in Microsoft 365, Office 365 and the
EMS portfolio.
Understanding your current Microsoft security portfolio and better
leveraging the features you've already paid for.
Securing your Microsoft environment.
Critical considerations in securing your Microsoft cloud environment
and why there isn't a one size fit's all solution to securing your business.
A real world business case study.
The background and key priorities of this 200+ seat business, the
process of understanding what was already in place and developing a
clear roadmap to complete security.
5. SETTING THE SCENE: SECURITY PRINCIPLES
Microsoft 365 E5
Office 365 Enterprise E5:
Includes SCP+ O365 E3 plus
Voice: PSTN Conferencing, Phone System
Analytics: Power BI Pro, Delve Analytics
Reporting: Threat Intelligence
Enterprise Mobility+ Security E5:
Includes SCP & EMS E3
Windows 10Enterprise E5:
Includes SCP+ & Win10 E3
Microsoft 365 Security & Compliance Package (SCP)
Security & Compliance: Advanced Threat Protection (ATP)
Advanced Compliance which includes Advanced eDiscovery & Data
Governance, Lockbox & Customer Key.
Identity & Access Management:
Azure Active Directory Premium P2
Information Protection: Azure Information Protection Premium P2
Identity Driven Security: Microsoft Cloud App Security (inc. O365
Advanced Security Management), Azure, ATP
Windows E5
Advanced Endpoint Security
Windows Defender
Advanced Threat Protection
Microsoft 365 E3
Office 365 Enterprise E3 Enterprise Mobility+ Security E3
Identity & Access Management: Azure Active Directory Premium P1
Microsoft Mobile Productivity: Microsoft Intune
Information Protection: Azure Information Protection Premium P1
Identity Driven Security: Microsoft Advanced Threat Analytics
Windows 10Enterprise E3
Advanced Endpoint Security: Credential Guard, Device Guard
Designed for Modern IT: Azure AD Join, Dynamic Management
More Productive: Windows Ink, Cortana at Work
Powerful, Modern Devices: Innovative designs, new in class devices
Chat-centric workspace: Teams
Email & Calendar: Outlook
Voice, Video & Meetings:
Skype for Business
Co-creating content: Office
Pro-Plus
Sites & Content Management:
SharePoint & OneDrive
Analytics: Delve
Security & Compliance: Basic
eDiscovery & Data Governance +
Data Loss Prevention
Microsoft 365 F1 for Frontline Workers
Office Applications: Office Online
Collaboration Services: Email, ‘SharePoint’, Yammer, Groups, IM,
Presence, Meetings, 1:1 HD Video/Audio
Schedule & Task Management: Microsoft StaffHub, PowerApps, Flow2
Content Storage & Consumption: Storage, Enterprise Video Services,
Portals
Device & App Management: Microsoft Intune
Identity & Access Management: Azure Active Directory P1
Threat Protection: Microsoft Advanced Threat Analytics
Device & App Management: Windows AutoPilot, Fine Tuned User
Experience, Windows Analytics Device Health
Identity & Access Management: Windows Hello, Credential Guard,
Direct Access3
Threat Protection: Windows Defender Antivirus, Device Guard3
Information Protection: Windows Info Protection, BitLocker
EMS E5
6. Technology Benefit E3 E5
AzureActiveDirectory
PremiumP1
Secure singlesign-on to cloudand on-premises app
MFA, conditional access, and advanced security reporting
● ●
AzureActiveDirectory
PremiumP2
Identity and access management with advanced protection
forusers and privileged identities
●
MicrosoftIntune
Mobiledeviceand app management to protect corporate
apps and data onany device
● ●
AzureInformationProtectionP1
Encryption forall filesand storage locations
Cloud-based filetracking
● ●
AzureInformationProtectionP2
Intelligent classification and encryption forfilesshared
insideand outsideyourorganization
●
MicrosoftCloudAppSecurity
Enterprise-grade visibility,control, and protection foryour
cloudapplications
●
MicrosoftAdvancedThreat
Analytics
Protection fromadvanced targeted attacks leveraging user
and entity behavioral analytics
● ●
Identity and access
management
Managed mobile
productivity
Information
protection
Threat protection
MICROSOFT ENTERPRISE MOBILITY &
SECURITY
7. Mobile device & app
management
Information
protection
Identity and access
management
Threat
protection
MICROSOFT ENTERPRISE MOBILITY &
SECURITY
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Holistic and innovative solutions for protection across users, devices, apps
and data.
8. • Reduce threats with identity and access management
• Manage mobile device and apps
• Leverage conditional access
• Increase enterprise data protection
• Prevent data loss
• Enable secured collaboration
• Reduce malware exposure
IMPROVING YOUR SECURITY POSTURE
9. NCSC Warns of Rising Office 365 Account Compromises
What is happening?
NCSC recently published an advisory regarding several incidents involving compromise of Office 365 user accounts within the UK and using them
in targeted supply chain attacks.
To be clear, this is not a vulnerability in Office 365. NCSC are highlighting that O365 users are being increasingly targeted by attackers given its
widespread use and the tendency for users to authenticate with just username and password credentials only.
This advisory highlights that username and password credentials alone do not provide adequate protection against attackers who can obtain
credentials from victims via common methods such as Spear Phishing and password guessing.
OFFICE 365 COMPROMISED OFTEN
10. • Turn on MFA
• Stop users from changing passwords regularly
as per NCSC guidance.
PREVENT THE MOST COMMON TYPE OF
ACCESS BREACH TO OFFICE 365
Next:
• Differences between Office 365 MFA and Azure MFA
11. OFFICE 365 MFA
How Can I Authenticate?
• Azure Authenticator App
• Text Message
• Phone Call + PIN
Limitations
• Too many prompts
• No intelligence
12. • Conditional Access Scenario’s supported.
• Why prompt for MFA when a user is connecting from a corporate network and is
using a corporate device?
• Why prompt for MFA when a user is connecting to their apps the same way you
would if they were connecting to the corporate account line of business
application?
• Why MFA everyone all the time, can we target specific users when they are
accessing sensitive information?
AZURE MFA: EMS E3, MICROSOFT 365 E3
AND AZURE PLAN1
13. • Who’s managing your services?
• Dedicated Admin accounts.
IDENTITY AND ACCESS MANAGEMENT
15. PRIVILEGEDIDENTITYMANAGEMENT
MFA is enforced during the activation process
Alerts inform administrators about out-of-band changes
Users need to activate their privileges to perform a task
Users will retain their privileges for a pre-configured
amount of time
Security admins can discover all privileged identities,
view audit reports and review everyone who has is
eligible to activate via access reviews
Audit
SECURITY
ADMIN
Configure Privileged
Identity Management
USER
PRIVILEGED IDENTITY MANAGEMENT
Identity
verification
Monitor
Access reports
MFA
ALERT
Read only
ADMIN PROFILES
Billing Admin
Global Admin
Service Admin
How time-limited activation of privileged roles works
16. Mobile Device
Management (MDM)
Mobile Application
Management (MAM)
Conditional Access: Restrict access to managed & compliant devices Conditional Access: Restrict which apps can be used to access email or files
Secure your data on any device with Intune
r
Company-Managed Employee-Managed 3rd-Party-Managed
n
Enroll devicesfor
Management
Provisionsettings,
certs,profiles
Report & measure
device compliance
Remove corporate
data from devices
Publish mobile
apps to users
Configure and
update apps
Report app
inventory & usage
Secure & remove
corporate data
within mobile apps
IN A COMPLEXLANDSCAPEYOUNEED CHOICES
MDM VS MAM
17. PROTECT OFFICE 365 DATA EVEN ON
UNMANAGED DEVICES
Compliance
Employeesexpectaccesstothe best tools,whereverthey
are—evenontheir owndevices.IT needs confidencethatcritical
datais secure.Intunedeliversboth.
Set up a PIN
for mobile apps
Data loss prevention
Require encryption
for managed app
local storage
Only allow Save As to
secure locations
Only allow copy and paste
between managed applications
Identity-driven protection
Protect data at the app level,
rather than requiring the
entire device to be secured.
Employees can use their work
and personal accounts with
the same app
Personal
Identity
Corporate
Identity
Corporate identity and data
can be removed without
affecting users’ apps or
personal data.
Natural user prompts
guide users to compliance
20. MICROSOFT CLOUD APP SECURITY
Visibility into 15k+ cloud apps, data access & usage,
potential abuse
AZURE SECURITY CENTER INFORMATION PROTECTION
Classify & label sensitive structured data in Azure SQL, SQL
Server and other Azure repositories
OFFICE 365 APPS
Protect sensitive information while working in Excel, Word,
PowerPoint, Outlook
AZURE INFORMATION PROTECTION
Classify, label & protect files – beyond Office 365, including
on-premises & hybrid
OFFICE 365 DATA LOSS PREVENTION
Prevent data loss across Exchange Online, SharePoint Online,
OneDrive for Business SHAREPOINT & GROUPS
Protect files in libraries and lists
OFFICE 365 ADVANCED DATA GOVERNANCE
Apply retention and deletion policies to sensitive and
important data in Office 365
ADOBE PDFs
Natively view and protect PDFs on Adobe Acrobat
WINDOWS INFORMATION PROTECTION
Separate personal vs. work data on Windows 10 devices,
prevent work data from traveling to non-work locations
OFFICE 365 MESSAGE ENCRYPTION
Send encrypted emails in Office 365 to anyone
inside or outside of the company
CONDITIONAL ACCESS
Control access to files based on policy, such as identity, machine
configuration, geo location
SDK FOR PARTNER ECOSYSTEM & ISVs
Enable ISVs to consume labels, apply protection
MICROSOFT
INFORMATION
PROTECTION
Discover | Classify | Protect | Monitor
MICROSOFT INFORMATION PROTECTION
SOLUTIONS
21. INFORMATION
PROTECTION & GOVERNANCE
Comprehensive policies to protect and govern
your most important data – throughout its
lifecycle
Unified approach to discover, classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations
Sensitivity Retention
Encryption
Restrict Access
Watermark
Header/Footer
Retention
Deletion
Records Management
Archiving
Sensitive data discovery
Data at risk
Policy violations
Policy recommendations
Proactive alerts
Apply Label
Monitor
LabelDiscover Classify
Unified Approach
Data growing at exponential rate
27. OPTIONS FOR HELP AND SUPPORT…
Microsoft 365
Security Audit
Detailed technical security audit
of your Microsoft 365 and Azure
Environment, with Executive
Report and On-Site Workshop.
From £1,995
Microsoft 365
Knowledge Share
Qualified and experienced
Microsoft consultants, to help
you with complex security &
infrastructure projects.
From £950 (per day)
Microsoft 365
Specialist Support
Third-line expert Microsoft 365
infrastructure and engineering
knowledge, to supplement and
support your own technical team.
From £100 (per hour)