Module 02 - Security
Module 02 - Security
Technical training
Name
Date
Technical Training – Day 1
Time Session Description
9.45-10.00 Break
Agenda Day 1 10.00-11.45 Module 2 : Security Security, Microsoft Lighthouse, Azure AD P1,
Zero Trust, etc.
Technical training 11.45-12.15 Module 2 : Hands-on Lab Lab Security
12.15-1.00 Lunch
9.30-10.30 Module 4 : Hands-on Labs Labs (Microsoft Intune, Windows Autopilot etc)
10.30-10.45 Break
• • Teams Phone
Partner opportunity with M365 for SMB
• • Teams Rooms
Partner GTM best practices
• • Teams Platform & Apps
Lifecycle management with Microsoft tools
• Hybrid work, Next gen Windows Experiences and Security
sessions Next gen Windows
Keep timings
Your name
Intro: Let’s go
around the room Your role
Tell us in less than 30
seconds… What you hope to learn today
Security
Security foundation
Identity security
Email protection
Security Information governance
Endpoint / Device security
Bringing it all together
Security Summary
Security foundations
Cyberthreats– overview
Phishing Fraud in which an attacker masquerades as a reputable person. It’s often easier to
trick someone than to hack in.
Ransomware Malicious encryption software that blocks access to systems and demands a sum
of money to unlock. An infected PC can spread the ransomware to other computers on your
network.
Fileless attacks use malicious scripts that hijack legitimate software and load malware into
memory, without saving to the file system. This makes the malware harder to detect.
Live off the land attacks use trusted software and system tools to carry out their work.
Examples are administrative shells, antivirus programs, RMM software, etc. This makes it
difficult to detect and/or determine who is behind the activity.
Perception
I am too small a business for hackers
to attack me…only large enterprises
need to worry about security…
Reality
Why should SMB “Someone was fooled by the email from the CEO and
used his Corp card to send the iTunes gift cards. We
customers care? lost about $5,000.”
—Adam A., equipment rentals, 150 employees
85%
of partners see security as biggest area of growth1
Name: Bob D
Role: Technical Consultant
Company: Partner
Attack surface is expanding due
to hybrid work
The increasingly
complex state of Rapid acceleration and increasing
sophistication of cybercrime
cybersecurity
1. “This World Password Day consider ditching passwords altogether”. May 5, 2022, Microsoft Security
Zero Trust starts with secure identities and endpoints
Data
Policy optimization
Identities
Endpoints
Threat Protection
Infrastructure
Policy optimization
of breaches involve
Identities
80% the use of lost
or stolen passwords.¹
Zero Trust policy
Endpoints
Threat Protection
60% of BYO devices are
not secured by IT.²
• User directory
• Single sign-on to any app
• User self service
Azure AD P1
• Multifactor and passwordless authentication
• Conditional Access and Identity Protection
• Hybrid identity management
Secure access for a
• Core identity governance
connected world. • External and frontline identities
Endpoint security for Zero Trust is a team sport
• Visibility and control with continuous health, • Monitor and gain visibility into configuration
compliance, and security signaling profiles while exposing security anomalies
• Set policies and manage company and employee- • Evaluate every endpoint for risks and employ
owned device compliance granular access controls to devices
• Zero touch deployment, and non-intrusive app • Discover unmanaged and unauthorized
management supports seamless user experiences endpoints and network devices
Overview: Microsoft 365 Security offers
Two key offers for SMBs
01 02
Business Premium Microsoft Defender for Business
Comprehensive Security with device Standalone endpoint Security to protect
management and productivity customers devices and endpoints
$22 pupm $3 pupm
Microsoft Defender for Business
What is Microsoft Defender for
Business?
Name: Angela A
Role: Partner Resource
Company: Partner
Opportunity Product Reviews
Global Cross platform Microsoft 365 ….– Alex Fields, MSP Influencer,
Introducing Microsoft Defender for Business: you heard that ri
ght… it’s *included* with Business Premium – ITProMentor
181markets/ Windows, IOS,
53 languages Android, Mac1 Lighthouse, RMM .
integration
1
iOS, and Android requires Microsoft Intune. Intune is included in Microsoft 365 Business Premium. Please see Documentation for more detail.
Microsoft Defender for Business
Elevate your security
Endpoint protection specially designed for businesses with up to 300 employees.
Threat & Vulnerability Attack Surface Next Generation Endpoint Detection Auto Investigation
Management Reduction Protection & Response & Remediation
Simplified Onboarding
APIs and Integration
and Administration
Delivering endpoint security across platforms
1
iOS, and Android requires Microsoft Intune. Intune is included in Microsoft 365 Business Premium. 2Add-on server support now available in preview. Please see Documentation for more detail.
Microsoft Defender
for Business is
Microsoft 365 Business Premium ($22pupm)1
Comprehensive productivity and security solution
1. As standalone SKU, up to
300 users
Entitlement for use on up
Microsoft Defender Business Microsoft Defender for Business to 5 devices
($3pupm)1
Microsoft Defender for Office 365 Plan 1
Enterprise-grade 2. Included as part of
endpoint security Intune Microsoft 365 Business
Per user license Premium, up to 300 users.
Azure AD Premium Plan 1
Next generation protection Azure Information Protection Premium P1
3. Add-on Server offering
Cross-Platform support (iOS,
Exchange Online Archiving now available in preview.
Android, Windows, MacOS)2
Endpoint Detection and Response Autopilot
Threat and Vulnerability
Azure Virtual Desktop license
Management
…and more Windows 10/11 Business
Shared Computer Activation
1
price is subject to change based on subscription term, currency and region
2
iOS, and Android requires Microsoft Intune. Intune is included in Microsoft 365 Business Premium. Please see Documentation for more detail.
Product comparison – Endpoint security
Cross platform and enterprise grade Available as a standalone Defender for Supports multi-customer
protection with next-gen protection, endpoint security and as Business servers add- viewing of security incidents
endpoint detection and response, and part of Microsoft 365 on is now in preview with Microsoft 365 Lighthouse
threat and vulnerability management Business Premium for partners
Defender
365 365 Defender for
Business Business Business
Premium3 Premium3 (MDB)3
*Gartner “Magic Quadrant for Access Management,” by Henrique Teixeira, Abhyuday Data, Michael
Kelley, November 2021
*Gartner “Magic Quadrant for Cloud Access Security Brokers,” by Craig Lawson, Steve Riley, October
2020
*Gartner “Magic Quadrant for Enterprise Information Archiving,” by Michael Hoech, Jeff Vogel, October
2020
*Gartner “Magic Quadrant for Endpoint Protection Platforms,” by Paul Webber, Rob Smith, Prateek
Bhajanka, Mark Harris, Peter Firstbrook, May 2021
*Gartner “Magic Quadrant for Unified Endpoint Management,” by Dan Wilson, Chris Silva, Tom Cipolla,
August 2021
These graphics were published by Gartner, Inc. as part of larger research documents and should be
evaluated in the context of the entire documents. The Gartner documents are available upon request from
Microsoft. Gartner does not endorse any vendor, product or service depicted in its research publications,
and does not advise technology users to select only those vendors with the highest ratings or other
designation. Gartner research publications consist of the opinions of Gartner’s research organization and
should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with Endpoint Unified Endpoint
respect to this research, including any warranties of merchantability or fitness for a particular purpose.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and Protection Platforms Management
internationally, and is used herein with permission. All rights reserved.
Microsoft the only
Leader in IDC
MarketScape
for Modern Endpoint
Security for Enterprise
and Small and Midsize
Businesses
IDC MarketScape: Worldwide Modern Endpoint Security for Small and Midsize
Businesses 2021 Vendor Assessmenthttps://idcdocserv.com/US48304721
IDC MarketScape vendor analysis model is designed to provide an overview of the
competitive fitness of information and communication technology (ICT) suppliers in
a given market. The research methodology utilizes a rigorous scoring methodology
based on both qualitative and quantitative criteria that results in a single graphical
illustration of each vendor’s position within a given market. The Capabilities score
measures vendor product, go-to-market, and business execution in the short term.
The Strategy score measures alignment of vendor strategies with customer
requirements in a three to five-year timeframe. Vendor market share is represented
by the size of the icons.
2 Context-aware prioritization
Easiest to exploit
OS kernel vulnerabilities
Becoming more and more popular in recent years due to OS exploit mitigation controls.
For example: Win32 elevation of privilege (CVE-2018-8233)
Hardest to discover
Broad secure configuration assessment
Continuous real-time discovery
Threat Landscape
10 Breach Likelihood
Business Value
Attack Surface
Isolate access to untrusted Office files
Exploit protection
Host intrusion prevention
Reduction Network protection
Exploit mitigation
Controlled folder
Resist attacks and exploitations access Ransomware protection for your files
• Block only Office communication applications from Lateral movement & credential theft
creating child processes
• Block process creations originating from PSExec and
WMI commands
• Block credential stealing from the Windows local security
authority subsystem (lsass.exe)
• Block persistence through WMI event subscription
Web content filtering configuration
Next Generation Protection
Cloud
Client
MALWARE
Big data
Detonation
Automatically
Sample Suspicious files classify threats
are executed in based on signals
Cloud Suspicious files a sandbox for across Microsoft
metadata uploaded for dynamic analysis
Client inspection by
ML-powered multiclass, deep
Heuristics, cloud rules
behavior, and neural network
local ML models classifier
Dynamic: behavior monitoring
1 Behavioral-based detection
Incident scope
IT Admins receive better perspective on the
purview of complex threats containing
multiple entities.
Full audit
Extendable (write your own command, build
your own tool)
RBAC+ Permissions
Git-Repo (share your tools)
Threat Analytics
Delivering insight on major threats to your organization
Get guidance
Provides recommended actions to increase
security resilience, to prevention, or contain
the threat.
Auto Investigation &
Remediation
1 2 3 4
Determining Performing Deciding what Repeating this as many
whether the threat necessary additional investigations times as necessary
requires action remediation actions should be next for every alert
Auto investigation queue
Investigation graph
Partner APIs - Connecting with the platform
Microsoft Defender for Business
Elevate your security
Threat & Vulnerability Attack Surface Next Generation Endpoint Detection Auto Investigation
Management Reduction Protection & Response & Remediation
IDC names Microsoft a Leader for Microsoft won six security awards with
Modern Endpoint Security for Enterprise Cyber Defense Magazine at RSAC 2021:
and Small and Midsize Businesses
Best Product Hardware Security
Market Leader Endpoint Security
Our antimalware capabilities Editor's Choice Extended Detection and Response (XDR)
consistently achieve high scores Most Innovative Malware Detection
in independent tests. Cutting Edge Email Security
Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization
and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Gartner content described herein (the “Gartner Content”) represent(s) research opinion or
viewpoints published, as part of a syndicated subscription service, by Gartner, Inc. ("Gartner"), and are not representations of fact. Gartner Content speaks as of its original publication date (and not as of the date of this [type of filing]), and the opinions expressed in the Gartner Content are subject to change
without notice. GARTNER and MAGIC QUADRANT are registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved
The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave™. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
IDC MarketScape: Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment, Doc #US48306021. November 2021
Microsoft Defender
consistently rated top AV
https://docs.microsoft.com/en-us/window
Name: Adele V
Role: Partner Resource
Company: Partner
Microsoft 365 Business Premium
One solution to run your business securely, from anywhere
10 Pro
Azure AD features like MFA Full Centralized Management of Restrict copy/paste/save corp data Azure Information Protection
Mobile and Laptops with Intune to personal apps using Intune App protects, classifies Documents for
Self Service Password Reset Protection Policies secure sharing including in Teams
Remote wipe of data of lost &
Conditional Access stolen devices Defender for Office 365 for Revoke access to Documents
protection against malware and
Dynamic Groups BitLocker Encryption zero day attacks Track Sensitive documents
The problem:
You want to improve your customer’s
security, but don’t know where to start
The solution:
Check Microsoft Secure Score
What it is:
Microsoft Secure Score analyzes your
Microsoft 365 overall security and assigns a
score. Secure Score also recommends next
steps to consider in order to improve security.
How to access:
http://securescore.microsoft.com
Exercise: Complete the setup wizard & check
O365 SecureScore
Pop quiz
01
As we progress through the lab
exercises our Secure Score
should go up. When should we
expect to see changes reflected
in Secure Score?
YES NO
Immediately Tomorrow
M365 Security at a glance
Set up tenant
Configure identity protection
Configure endpoint protection
Configure email protection
Corporate data containment
Advanced Security
Device management & security
Secure remote access
Checklist: https://aka.ms/smbchecklist
How to use the checklist
Checklist: https://aka.ms/smbchecklist
Securing identities with Azure AD P1
How can I secure identities with Azure
AD P1?
Name: Bob D
Role: Partner Resource
Company: Partner
Azure Active Directory
Protect your users, apps, workloads, and devices.
• User directory
• Single sign-on to any app
• User self service
Azure AD P1
• Multifactor and passwordless authentication
• Conditional Access and Identity Protection
• Hybrid identity management
Secure access for a
• Core identity governance
connected world. • External and frontline identities
Enforce Multi-factor authentication
Verify user identities with strong authentication
Multi-factor
We support a broad authentication
Push Soft Hard SMS,
range of multi-factor Notification Tokens OTP Tokens OTP Voice prevents 99.9%
authentication options of identity attacks¹
1. “Your Password Doesn’t Matter” July 2019, Microsoft Tech Community Research Article
Secure access to work apps – with Azure Active Directory
Azure AD Premium P1 is now included with Microsoft 365 Business Premium
1
https://secureswissdata.com/two-factor-authentication-importance/
Protect resources with Conditional Access
Configure adaptive access policies based on context and risk
Require MFA
Limit access
Application
Real-time risk Password reset
Monitor access
Enable remote access to apps
Google ID
Employee and partner Allow/block
users and roles access
02
Can I use Security Defaults to
enable MFA if my customer
also requires Conditional
Access policies?
YES NO
Use Conditional Access for MFA
Do not enable MFA on a per user basis
Always exclude an admin account from the policies to ensure
Best practices you can correct a mistake
Start with one target group of users
Ensure your users know what to expect
Test your policies before rolling out
Enable SSPR in Azure AD
Create an Conditional Access Exclusion group
Enable common conditional access policies
• Block Legacy Authentication
• Require MFA for admins
Common tasks • Require MFA for all users
• Secure security info registration
• Block access by location
• Require compliant devices
Password hash sync
Sync Agent
Microsoft
Azure AD Active
Directory
SaaS apps
Transport Rules
Block auto-forward
Add warnings
The problem:
Sensitive information is sometimes sent via email
The open nature of email systems means this information is
at risk of being read by unauthorized people
The solution:
Encrypt email sent from Microsoft 365 Business, so only
the intended recipient can access it.
Email encryption
What it is:
Azure Information Protection helps an
organization to classify protect its
documents and emails, either by
restricting the ability to forward and print,
or by applying labels.
Protect and control your data and documents
The problem:
It is difficult and unrealistic to expect employees to
manually check every email or document shared for
sensitive information before sharing files outside the
company.
The solution:
Enable Data Loss Prevention (DLP) policies to automatically
identify sensitive information and inform users before
sharing this data externally.
Data Loss Prevention
The problem:
After an employee leaves, you may need to access to
emails they sent or received.
Or, your company may have a policy of retaining email for
a period of time, such as 7 years, to meet regulatory
requirements
The solution:
Utilize the capabilities of Exchange Online Archiving to
archive and preserve email and other relevant information.
Archiving
(In-place hold) How it works:
You can use In-Place Hold to accomplish the following
What it is: goals:
In-Place Hold and Litigation Hold, • Enable users to be placed on hold and preserve mailbox
part of Exchange Online Archiving, items immutably
can help companies preserve • Preserve mailbox items deleted by users or automatic
electronically stored information deletion processes
that could be relevant to a pending
• Protect mailbox items from tampering, changes by a user,
or current legal case. or automatic processes
• Preserve items indefinitely or for a specific duration
Additionally, you can:
• Preserve the entire mailbox of an employee who leaves or
is terminated
• Use In-Place eDiscovery to search mailbox items, including
items placed on hold
Security summary
Resources
All content that is linked through out this document can be found at these sites.