Module 3&6 Security Fundamentals&Advanced SecurityCompliance
Module 3&6 Security Fundamentals&Advanced SecurityCompliance
Technical Fundamentals
Module 3: Security Fundamentals
Module 6: Advanced Security & Compliance
Pedro F. Pereira
[email protected]
Data de revisão: 22/11/2019
Module: After this module you should know
and understand:
Introduction
• Microsoft 365 Powered Device Security
• Protect against threats in Office 365
• Multi-Factor Authentication
• Conditional Access
• Microsoft Intune
• Where to Start
Module: After this module you should know
and understand:
Introduction
• Secure Score
• Compliance and security features in
Office 365
• Data Loss Prevention
• Configuring archive mailboxes
• Azure Information Protection (Azure
Rights Management)
Breach detection
Device Threat Identity Information investigation &
protection resistance protection protection
response
Microsoft 365 security areas
Cloud
Windows Defender Azure RMS / Azure
Azure Active Directory
Advanced Threat Protection Information Protection
Device SmartScreen
Windows User
Guard Windows Hello for Business Bitlocker EFS Account
Defender
Windows 10 KMCI Control Windows
Defender
Enterprise Application
Device Health Credential Windows
Conditional Device Guard
Attestation Guard Information Guard
Access
Protection UMCI
AppLocker
BitLocker UEFI & TPM 2.0 Windows Hello for Device Guard
Trusted Boot Business Credential Guard
Early Launched Armored Kerberos Standard User Right with UAC enabled
MBAM
Antimalware Compound Windows Defender
Authentication Windows Defender Application Guard
Windows Device Configuration Manager Software Updates
Health Registration Password Brute
Force Protection ConfigMgr Desired Configuration Manager
Windows Defender ATP
BitLocker recovery
Account Lockout
BitLocker recovery Microsoft Edge Micro Windows Firewall
TPM Lockout Virtualization Windows Networking
Windows Defender BitLocker To Go
cloud based protection Dynamic Access Control
Windows SmartScreen
Windows Firewall Windows Information
Device Restriction GPOs Protection
• Strong passwords can be difficult to remember, and users often reuse passwords
on multiple sites.
Problems with
• Server breaches can expose symmetric network credentials (passwords).
Passwords
• Passwords are subject to replay attacks.
• Users can inadvertently expose their passwords due to phishing attacks.
• Microsoft account
• Active Directory account
Authentication is
• Microsoft Azure Active Directory (Azure AD) account
performed to
• Identity Provider Services or Relying Party Services that support Fast ID Online
(FIDO) v2.0 authentication (in progress)
• Facial recognition
Biometric sign-in
• Fingerprint recognition
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification
• Replace passwords with a private key made available solely through a “user
gesture” (PIN, Biometric, remote device, etc.).
• Can use certificate-based architecture instead of a private key.
Goals • Support both local and remote credentials (phone, USB dongle, etc.).
• Introduce Hello for Business because of its convenience and security first, and
that its UX is at least as good as with passwords.
• Align with goal to mainstream two-factor authentication.
• Keys are ideally generated in hardware (TPM) first, with software as a last resort.
• Hardware-bound keys can be attested.
Usage
• Single “unlock gesture” provides access to multiple credentials and the origin is
isolated.
• Browser support is available through JS/W3C WebAuthn APIs.
https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-requirements
Trustlet #2
Trustlet #3
Credential
Credential Guard uses VBS to isolate
Guard
•
Device Hardware
Hypervisor
• Credential Guard helps to mitigate threats by using Hyper-V powered secure
execution environment to protect NTLM tokens.
• Prevents pass-the-hash attacks and enterprise credential theft that happens by
Overview reading and dumping the content of LSASS memory.
• You can place items under Credential Guard, but they cannot be removed.
• Decouples NTLM hash from logon secret.
• Fully randomizes and manages full length NTLM hash to prevent brute force
attack.
• Enabled without lock (if you want to turn off remotely by using Group Policy).
Configuration Options • Enabled with UEFI lock (Administrator must be physically present at a machine
and disable Credential Guard).
Threat
Mitigation
Improvements
Configuration
Options
• Windows 10 x64 Edition
• UEFI 2.3.1 or higher firmware and Secure Boot
• TPM 2.0 (Note: TPM 1.2 can be used but is not recommended.)
Requirements • Virtualization capable hardware
• Physical device
• The firmware is updated for Secure MOR implementation.
• Optionally, A VT-d or AMD-Vi IOMMU (Input/output memory management unit)
• Credential Guard does not allow:
• Unconstrained Kerberos delegation
• NTLMv1, MS-CHAPv2, Digest, CredSSP, Kerberos DES encryption
Impacts • Saved password in remote desktop
• Some hardware and drivers may not work—The investigation and the tests
should be conducted.
Registry
System
Information
LsaIso
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
Overview
Features
Requirements
Considerations
• Remote Credential Guard helps to mitigate threats by blocking NTLM allowing
Overview only
• Kerberos, preventing Pass the Hash and previous usage of a credential after
disconnection.
Protects the device from advanced attacks
launched against Microsoft Edge
Malware and vulnerability exploits targeting
the browser, including zero days, unable to
impact the operating system, apps, data and
network
Application Guard uses virtualization based
security to hardware isolate Microsoft Edge
from the rest of the system
Closing Microsoft Edge wipes all traces of
attacks that may have been encountered
while online
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview
Overview
Requirements
Benefits
Application
Signing Options
Code Integrity
Policy
Overview of
KMCI
KMCI vs UCMI
Microsoft Defender consistently rated top AV
https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/top-scoring-industry-
antivirus-tests
Protect your PCs against advanced
malware with Windows Defender
The problem:
Bad actors can avoid traditional AV by executing
ransomware attacks without ever needing to write
anything to the disk.
These fileless attacks, which compose over 50% of all
threats, are extremely dangerous and constantly
changing.
The solution:
Windows Defender Exploit Guard helps protect
users against advanced forms of ransomware.
Microsoft Defender
Exploit Guard
What it is: How it works:
Microsoft Defender Exploit Guard Microsoft Defender Exploit Guard utilizes the capabilities of the
extends Defender to protect Microsoft Intelligent Security Graph and the security research
Windows devices from a broad range team at Microsoft to identify & block active exploits and
of cyber threats. common behaviors
• Controlled folder access – Prevents untrusted processes
from crawling into protected folders like My Documents
• Attack Surface Reduction - Blocks executable payloads in
Office macros, email, downloaded js/vbs etc.
• Network protection – Blocks outbound connections to low
reputation IP (command & control)
https://docs.microsoft.com/en-
us/windows/security/threat-protection/microsoft-
defender-atp/enable-exploit-protection
Enforce Microsoft Defender
on all your PCs
• MSFT - https://www.microsoft.com/en-us/wdsi/filesubmission
• VirusTotal - https://www.virustotal.com/gui/home
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/enable-the-report-message-add-in
https://docs.microsoft.com/en-
us/microsoft-365/security/office-365-
security/view-reports-for-atp
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/how-atp-safe-attachments-works
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-for-spo-odb-and-teams
Turn on Office 365 ATP for SharePoint, OneDrive, and Microsoft Teams
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/turn-on-atp-for-spo-odb-and-teams
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-for-spo-odb-and-teams#keep-these-points-in-mind
Quarantine in ATP for SharePoint Online, OneDrive for Business, and Microsoft Teams
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-for-spo-odb-and-teams#quarantine-in-atp-for-sharepoint-online-onedrive-for-business-and-microsoft-teams
Set up Office 365 ATP Safe Attachments policies
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-attachments-policies
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-safe-links
Set up Office 365 ATP Safe Links policies
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-links-policies
Set up a custom blocked URLs list using Office 365 ATP Safe Links
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-a-custom-blocked-urls-list-wtih-atp
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-safe-links#example-scenarios
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/how-atp-safe-links-works#how-atp-safe-links-works-with-urls-in-email
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/how-atp-safe-links-works#how-atp-safe-links-works-with-urls-in-office-documents
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-anti-phishing
Set up Office 365 ATP anti-phishing and anti-phishing policies
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-anti-phishing-policies
How to get ATP anti-phishing
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-anti-phishing
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/zero-hour-auto-purge
Additional reports to view
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/view-reports-for-atp#additional-reports-to-view
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/automated-investigation-response-office
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/threat-trackers#what-are-threat-trackers
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/threat-trackers#what-are-threat-trackers
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/threat-trackers#what-are-threat-trackers
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/threat-trackers#what-are-threat-trackers
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/attack-simulator
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/automated-investigation-response-office
For more investigations
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-
security/automated-investigation-response-office#investigation-graph
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp#get-office-365-atp
https://docs.microsoft.com/pt-pt/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#feature-availability-across-advanced-threat-protection-atp-plans
Multi-Factor Authentication
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfaserver-deploy
https://docs.microsoft.com/en-us/azure/active-
directory/conditional-access/overview
Conditional Access
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-baseline-protection
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-baseline-protection
What are baseline policies?
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-baseline-protection
Quickstart: Require MFA for specific apps with Azure Active Directory Conditional Access
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/app-based-mfa
How to: Require MFA for access from untrusted networks with Conditional Access
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/untrusted-networks
Quickstart: Block access when a session risk is detected with Azure Active Directory Conditional Access
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/app-sign-in-risk
Require managed devices
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/require-managed-devices
Require approved client apps
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access#test-your-policy
Block legacy authentication
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/block-legacy-authentication
Test your policy
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access#test-your-policy
What are baseline policies?
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-baseline-protection
Microsoft Intune is an MDM and
MAM provider for your devices
https://docs.microsoft.com/en-us/intune/fundamentals/what-is-intune
https://docs.microsoft.com/en-us/intune/fundamentals/media/what-is-intune/intunearchitecture.svg
QuickStart: Create a user in Intune and assign them a license
https://docs.microsoft.com/en-us/intune/fundamentals/quickstart-create-user
https://docs.microsoft.com/en-us/office365/admin/security-and-
compliance/secure-your-business-data
1. Set up multifactor authentication
1 https://secureswissdata.com/two-factor-authentication-importance/
Enable MFA w/Baseline Policies
To set up Conditional Access Baseline Policies:
1. In the Microsoft Admin Center, choose Azure Active Directory in
the left-hand navigation under Admin Centers. This will open the
Azure Active Directory admin center in a new tab
2. In the Azure Active Directory admin center, click Azure Active
Directory in the left-hand navigation
3. Click Security near the top of the left menu in the Azure Active
Directory blade.
4. Click Conditional Access under the Protect heading near the top of
the left menu.
5. Select Baseline policy: Require MFA for admins (Preview)
6. Under Enable Policy select the radio button next to Use policy
immediately and then click Save
7. Select Baseline policy: Block legacy authentication (Preview)
8. Set Enable Policy to On and then click Save
To learn more, see Baseline policy: Require MFA for admins (preview) &
Baseline policy: Block legacy authentication (preview)
Enable MFA for users by using
Conditional Access
To set up MFA for a subset of users:
1. In the Microsoft Admin Center, choose Azure Active Directory in
the left-hand navigation under Admin Centers. This will open the
Azure Active Directory admin center in a new tab
2. In the Azure Active Directory admin center, click Azure Active
Directory -> Security -> Conditional Access in the left-hand
navigation
3. Click +New Policy and name the policy Require MFA for Marketing
Users
4. Assignments | Users and Groups: Include the Marketing group,
exclude your admin account
5. Assignments | Cloud apps or actions: Office 365 Exchange
Online and Office 365 SharePoint Online, and Microsoft Teams
6. Access Controls | Grant | Require multi-factor authentication:
Checked
To learn more, see Quickstart: Require MFA for specific apps with Azure
Active Directory Conditional Access
2. Train your users
The problem:
“Our users are the
Cybersecurity is fundamentally a
human problem, not a technical one. biggest threat to this
network, bar none”
The solution: —Aaron S. IT director
User training to help establish a at 65 person law firm in Portland
culture of security awareness
2. Train your users
Tips:
• Admin only accounts do not require a license in
Microsoft 365 Business
• Configure all admin accounts for MFA
• Before using admin accounts, close all unrelated
browser sessions and apps, including personal
email accounts.
• After completing admin tasks, log out of the
browser session.
4. Raise the level of protection
against malware in email by
blocking risky attachments
The problem:
Malware is often introduced to a computer via
macros or other executables.
The solution:
Block attachments containing filetypes that are
commonly used for malware.
4. Raise the level of protection
against malware in mail by
blocking risky file types
Provide message text Do not open these type of files from people you do not know
because they might contain macros with malicious code.
• Click Save
5. Protect against ransomware
Restore files using OneDrive ransomware recovery:
• Go to the user’s Onedrive For Business
• If you're signed in with a work or school account, select
Settings > Restore your OneDrive.
• On the Restore page, select a date from the dropdown list,
such as Yesterday, or you can select Custom date and time.
If you're restoring your files after automatic ransomware
detection, a suggested restore date will be filled in for you
• If you're selecting a custom date and time, select the earliest
activity that you want to undo. When you select an activity,
all other activities that occurred after that are selected
automatically.
• When you’re ready to restore your OneDrive, click Restore to
undo all the activities you selected.
6. Stop auto-forwarding for email
The problem:
Hackers can access an email account and configure the
mailbox to automatically forward to another email account,
giving the hacker access to all info in these emails
The solution:
Turn off auto-forwarding for email; by creating a mail
transport rule
6. Stop auto-forwarding for email
Stop auto-forwarding for email, by creating a mail
transport rule:
• In the Microsoft 365 admin center, click Admin
centers > Exchange
• In the mail flow category, click rules
• Click +, and then click Create a new rule
• Click More options at the bottom of the dialog box to see
the full set of options
• Apply the settings in the following table for each rule. Leave
the rest of the settings at the default, unless you want to
change these
Name Prevent auto forwarding of email to external domains
Apply this rule if . . . The sender . . . is external/internal . . . Inside the organization
Add condition The message properties . . . include the message type . . . Auto-
forward
Do the following . . . Block the message . . . reject the message and include an explanation
Provide message text Auto-forwarding email outside this organization is prevented for
security reasons
• Click Save
Secure Score
Compliance and security features in
Office 365
Data Loss Prevention
Configuring archive mailboxes
Azure Information Protection (Azure
Rights Management)
Introducing the Office 365 Secure Score
https://securescore.office.com
https://support.office.com/en-us/article/Introducing-the-Office-
365-Secure-Score-c9e7160f-2c34-4bd0-a548-5ddcc862eaef
Introducing the Office 365 Secure Score
Office 365 provides features to comply with the following compliance
standards:
• HIPAA
• Data processing agreements
• FISMA
• ISO/IEC 27001:2013
• EU Model Clauses
• The U.S.‒EU Safe Harbor Framework
• FERPA
• SSAE 16
• PIPEDA
• GLBA
• GDPR
The Protection Center features:
• Home
• Permissions
• Security policies
• Data management
• Search & Investigation
• Reports
• Service Assurance
Introducing the Office 365 Security & Compliance
Data Loss Prevention
• Detect
• Protect
• Monitor
• https://support.office.com/en-us/article/Overview-
of-data-loss-prevention-policies-1966b2a7-d1e2-
4d92-ab61-42efbb137f5e
• https://support.office.com/en-ie/article/Prevent-
data-loss-in-Office-365-6a888faa-c114-4395-b20d-
a5b8ebd1ac0c
Introducing the Office 365 Secure Score Security & Compliance
Data Loss Prevention
Introducing the Office 365 Secure Score Security & Compliance
Data Loss Prevention
You can use the Exchange Online admin center to manage DLP policies:
• Create a DLP policy
• Create a custom DLP policy
• View DLP policy detection reports
You use Security & Complinace Center to create DLP policies for content
on Exchange server, Sharepoint server, and OneDrive
Enable a DLP policy
To enable a DLP policy
• Go to https://protection.office.com.
• Sign in to Office 365. You're now in the Office 365 Security & Compliance Center.
In the Security & Compliance Center > left navigation > Data loss prevention > Policy > + Create a policy.
• Choose the DLP policy template that protects the types of sensitive information that you need > Next.
In this example, you'll select Financial>PCI Data Security Standard (PCI DSS).
• Name the policy > Next.
• On the Choose locations page:
• Choose All locations in Office 365 > Next.
• On the Customize the type of content you want to protect page:
• Click Find content that contains: Credit Card Number, and select Detect
when this content is shared … with people outside my organization
• Click Next
On the What do you want to do if we detect sensitive info page:
• Select Show policy tips…
• Select Detect when content that’s being shared contains: … change to 1
instance
• Select Send incident reports…
• Click Next
On the Do you want to turn on the policy… page:
• Select Yes, turn it on right away
• Click Next
On the Review your setting page, click Create
Send sensitive data in an email
To send an email to see DLP policies from user perspective
• Go to http://outlook.office365.com (or access Outlook on the web via the app launcher if
already logged)
• Compose an email:
• To: [any external email address]
• Subject: Info you asked for
• Body:
[the credit card number above is cancelled; but valid from a digits and checksum perspective]
• Wait a few moments. A DLP Policy Tip will appear
• Click the DLP Policy tip to learn more about why it appeared
Configuring archive mailboxes
Use Archive Management in the Protection Center to:
• Enable an In-Place Archive
• Disable an In-Place Archive
Configuring retention tags and policies in Exchange Online
Configuring retention in Security & Compliance Center
You use a retention policy to preserve or delete content on various
locations
AZURE INFORMATION PROTECTION (AZURE RMS)
• A cloud-based solution that helps an organization to classify, label, and protect its documents and emails
• This can be done:
• Done automatically by administrators who define rules and conditions
• Manually by users, or a combination where users are given recommendations
• Compare Azure Information Protection plans
• https://www.microsoft.com/en-us/cloud-platform/azure-information-protection-features
AZURE INFORMATION PROTECTION (AZURE RMS)
AZURE INFORMATION PROTECTION (AZURE RMS)
An example of Azure Information Protection in action
1. The administrator has configured rules to detect sensitive data (in this case, credit card information)
2. When a user saves a Word document that contains credit card information
3. The user sees a custom tooltip that recommends to apply a specific label that the administrator
configured
4. Which classifies and optionally protects the document
Protection rules:
• Outlook clients that an administrator configures to automatically apply Rights Management
templates to email messages for specified recipients
• For example:
• When internal emails are sent to your legal department
• They can only be read by members of the legal department and cannot be forwarded
• Users see the protection applied to the email message before sending it
• Emails are encrypted before they are sent
AZURE INFORMATION PROTECTION (AZURE RMS)
Azure Rights Management - Exchange Online and Exchange Server
Transport rules:
• An administrator configures to automatically apply Rights Management templates to email messages based on
properties - Sender/ Recipient/ Message Subject/ Content
• Can be applied to Outlook Web Access and emails sent by mobile devices
• Not let users remove the protection
Data loss prevention (DLP) policies:
• Contain sets of conditions to filter email messages
• Take actions to help prevent data loss for confidential or sensitive content (for example, personal information or
credit card information)
• Policy Tips can be used when sensitive data is detected
• To alert users that they might need to apply Information Protection
• Based on the information in the email message
AZURE INFORMATION PROTECTION (AZURE RMS)
Thank you