SlideShare a Scribd company logo
Microsoft 365
Training Series:
Security and Compliance
Secure identities to reach Zero
Trust with Azure AD
Matt Fooks
Clouds in ReachMatt@cloudsinreach.com
Infrastructure Cloud Architect
Matt@cloudsinreach.com
Andrew Bettany MVP
IT Masterclasses Ltd
andrew@itmasterclasses.com
Employees
Customers
Partners
Distributors
Suppliers
Devices
Things
3   Modern Security - Secure identities to reach zero trust with AAD
653K1.1B17.5M
Every Office 365 and Microsoft Azure customer uses Azure Active Directory
Sep 2018
90%90K 450B
Azure Active
Directory
Windows
MacOS
iOS
Android
3   Modern Security - Secure identities to reach zero trust with AAD
Conditional access Identity protectionSecure authentication
3   Modern Security - Secure identities to reach zero trust with AAD
Password-less
authentication
Password guidanceMFA
Password-less authenticationUser-friendly experienceEnterprise-grade security
Hello
47M
enterprises have deployed
Windows Hello for Business
active Windows
Hello users
6.5K
growth in biometric
capable computers
350%
Prevents identity attacks99.9%
9M+
32M+
Password-less
phone sign-in
with Microsoft
Authenticator
http://aka.ms/passwordless
3   Modern Security - Secure identities to reach zero trust with AAD
Azure AD Password Protection
Dynamic banning of passwords based on
known bad patterns and those you define.
Smart Lockout to thwart bad actors trying
to guess passwords.
Built for hybrid environments.
Unified admin experience for on-premises
and cloud.
Cloud intelligence to ensure strong passwords
3   Modern Security - Secure identities to reach zero trust with AAD
Azure AD
Conditional Access
User and location Device
Application Real time risk
Conditional
access
Corporate
Network
Geo-location
Microsoft
Cloud App SecurityMacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Require
MFA
Allow/block
access
Block legacy
authentication
Force
password
reset
******
Limited
access
Controls
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Physical &
Virtual Location
Client apps &
Auth Method
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
Productivity
Security
Timely access to the
right resources
The right people have the
right access to resources
Identity lifecycle
facilities collaboration
Access lifecycle
provides seamless and
efficient access
Privileged access
lifecycle addresses
risks inherent in
administration
Productivity
Security
Timely access to the
right resources
The right people have
the right access to
resources
The right controls that
ensure secure
productivity
Identity Access Admin rights
Identity lifecycle
facilities collaboration
Access lifecycle
provides seamless and
efficient access
Privileged access
lifecycle addresses
risks inherent in
administration
Productivity
Security
Timely access to the
right resources
The right people have
the right access to
resources
The right controls that
ensure secure
productivity
Identity Access Admin rights
Azure Active Directory access reviews
Manage risk and compliance for
employees, guests, business partners,
and contractors
Audit and recertify users’ access to
applications, resources, and roles
Configure programs to automatically
repeat complex review sequences
Review current
memberships
Confirm which
memberships to keep
Remove stale
memberships
Request sent to
users and resource owners
Report status
to admin
Access
Reviews
Azure AD Privileged Identity Management (PIM)
See which users are assigned privileged roles.
Enable on-demand, "just in time"
administrative access.
Set up approval flows for privilege activation.
Get alerts and view a history of administrator
activation and actions.
Review administrative roles and require users
to provide justification to retain membership.
Manage built-in Azure Resource roles,
as well as custom (RBAC) roles
IntuneRoleAdministrator
DevTestLabsUser
SecurityReader
VirtualMachineUserLogin
ContosoExpensesAppModerator
Management and auditing of admin roles across Azure and Office clouds
3   Modern Security - Secure identities to reach zero trust with AAD
First account
Compromised
Domain Admin
Compromised
Attack
Discovered
Research & Preparation Attacker Undetected (Data Exfiltration)
Attack Sophistication
Target Active Directory
(AD) & Identities
Attacks not detected.
Assume breach
Response and Recovery
• Attack operators exploit any
weakness
• Target information on any
device or service
• Attacks get automated and are
industrialized
• Active Directory controls access
to business assets
• Attackers commonly target AD
and IT Admins
• Time to detect an attack is very
short as attacks can occur out of
nowhere and might be
automated
• You may be under attack (or
compromised)
• Response requires advanced
expertise and tools
• Expensive and challenging to
successfully recover
24-48
Hours
101+
Days
User browses to a
website
Phishing
mail
Opens
attachment
Clicks on a URL
+
Exploitation
& Installation
Command
& Control
Brute force account or
use stolen account credentials
User account
compromise &
persistence
Attacker
attempts lateral
movement
Privileged
account
compromised
Domain
compromise &
persistence
Attacker accesses
sensitive data
Exfiltrate data
Azure AD Identity Protection
Identity protection &
conditional access
Microsoft Cloud App Security
Extends protection & conditional
access to other cloud apps
Azure ATP
Azure AD Identity Protection
Identity protection &
conditional access
Identity forensics
Attacker collects
reconnaissance and
configuration data
Office ATP
Azure AD Privileged Identity Management
Advanced Email Threat Protection
Privileged Access Management
Microsoft Threat Protection
Identities Endpoints User Data Cloud Apps Infrastructure
Users and Admins Devices and Sensors Email messages and
documents
SaaS Applications
and Data Stores
Servers, Virtual
Machines, Databases,
Networks
Intelligent Security Graph
6.5 TRILLION signals per day
Get comprehensive Identity protection
An integral component of Microsoft Threat Protection
Azure AD
Identity
Protection
Azure
ATP
Microsoft
Cloud App
Security
Azure AD Identity Protection
Connected intelligence
Continuous detection
Actionable insights
Observe trillions of signals
and risk events from cloud
systems
Apply artificial intelligence and human
expertise to derive accurate insights
Send alerts, self-mitigate,
and automatically remediate
threats
Protects against 99.6% of identity attacks
A comprehensive, intelligent security solution that brings the visibility, real-time
control, and security you have in your on-premises network to your cloud applications.
ControlDiscover Protect
Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions
Azure Advanced Threat Protection
Detect threats fast
with Behavioral
Analytics
Focus on what is
important using
attack timeline
Reduce the
fatigue of false
positives
Protect at scale
with the power of
the cloud
Reconnaissance
!
!
!
Compromised
Credentials
Lateral
Movement
Domain
Dominance
Conditional access Identity protectionSecure authentication
Protecting against threats
can be simple
Strengthen your credentials
Reduce your attack surface
Automate threat response
Increase your awareness with
auditing and monitor security alerts
Enable self-help for more predictable
and complete end user security
https://aka.ms/securitysteps
3   Modern Security - Secure identities to reach zero trust with AAD

More Related Content

What's hot (20)

PPTX
Azure Active Directory - An Introduction
Venkatesh Narayanan
 
PPTX
Azure Security Center- Zero to Hero
Kasun Rajapakse
 
PPTX
Azure active directory
Raju Kumar
 
PPTX
The Zero Trust Model of Information Security
Tripwire
 
PPTX
cyber-security-reference-architecture
Birendra Negi ☁️
 
PDF
Zero trust in a hybrid architecture
Hybrid IT Europe
 
PDF
Microsoft Office 365 Advanced Threat Protection
David J Rosenthal
 
PPTX
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Vignesh Ganesan I Microsoft MVP
 
PDF
Identity and Access Management 101
Jerod Brennen
 
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
PPTX
Preparing your enteprise for Hybrid AD Join and Conditional Access
Jason Condo
 
PPTX
SC-900 Concepts of Security, Compliance, and Identity
FredBrandonAuthorMCP
 
PPTX
External collaboration with Azure B2B
Sjoukje Zaal
 
PPTX
What is Zero Trust
Okta-Inc
 
PDF
Secure Your Cloud Environment with Azure Active Directory (AD)
WinWire Technologies Inc
 
PDF
Microsoft 365 Security Overview
Robert Crane
 
PPTX
Microsoft Purview Overview Deck.pptx is for Microsoft Purview
ahsanf1
 
PDF
Azure Information Protection
Robert Crane
 
PPTX
Microsoft Defender for Endpoint
Cheah Eng Soon
 
PPTX
Zero trust deck 2020
Guido Marchetti
 
Azure Active Directory - An Introduction
Venkatesh Narayanan
 
Azure Security Center- Zero to Hero
Kasun Rajapakse
 
Azure active directory
Raju Kumar
 
The Zero Trust Model of Information Security
Tripwire
 
cyber-security-reference-architecture
Birendra Negi ☁️
 
Zero trust in a hybrid architecture
Hybrid IT Europe
 
Microsoft Office 365 Advanced Threat Protection
David J Rosenthal
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Vignesh Ganesan I Microsoft MVP
 
Identity and Access Management 101
Jerod Brennen
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Jason Condo
 
SC-900 Concepts of Security, Compliance, and Identity
FredBrandonAuthorMCP
 
External collaboration with Azure B2B
Sjoukje Zaal
 
What is Zero Trust
Okta-Inc
 
Secure Your Cloud Environment with Azure Active Directory (AD)
WinWire Technologies Inc
 
Microsoft 365 Security Overview
Robert Crane
 
Microsoft Purview Overview Deck.pptx is for Microsoft Purview
ahsanf1
 
Azure Information Protection
Robert Crane
 
Microsoft Defender for Endpoint
Cheah Eng Soon
 
Zero trust deck 2020
Guido Marchetti
 

Similar to 3 Modern Security - Secure identities to reach zero trust with AAD (20)

PPTX
20181213 - wazug protecting your data with azure ad
Arjan Cornelissen
 
PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Morgan Simonsen
 
PPTX
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
FredBrandonAuthorMCP
 
PPTX
Securing your Azure Identity Infrastructure
Vignesh Ganesan I Microsoft MVP
 
PPTX
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Forsyte I.T. Solutions
 
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 
PPTX
5 steps to securing your identity infrastructure.pptx
MCont1
 
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
PDF
December 2019 Microsoft 365 Need to Know Webinar
Robert Crane
 
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
 
PPTX
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
Scott Hoag
 
PPTX
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
Rencore
 
PDF
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
PDF
Protect your data in / with the Cloud
GWAVA
 
PPTX
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
SPS Paris
 
PDF
Securely logging to Microsoft 365
Robert Crane
 
PDF
Softwerx Microsoft 365 Security Webinar Presentation
Patrick Leckie
 
PDF
Thr30117 - Securely logging to Microsoft 365
Robert Crane
 
PPTX
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
 
PPTX
Secure Modern Workplace With Microsoft 365 Threat Protection
Ammar Hasayen
 
20181213 - wazug protecting your data with azure ad
Arjan Cornelissen
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Morgan Simonsen
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
FredBrandonAuthorMCP
 
Securing your Azure Identity Infrastructure
Vignesh Ganesan I Microsoft MVP
 
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Forsyte I.T. Solutions
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 
5 steps to securing your identity infrastructure.pptx
MCont1
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
December 2019 Microsoft 365 Need to Know Webinar
Robert Crane
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
Scott Hoag
 
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
Rencore
 
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
Protect your data in / with the Cloud
GWAVA
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
SPS Paris
 
Securely logging to Microsoft 365
Robert Crane
 
Softwerx Microsoft 365 Security Webinar Presentation
Patrick Leckie
 
Thr30117 - Securely logging to Microsoft 365
Robert Crane
 
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Ammar Hasayen
 
Ad

More from Andrew Bettany (13)

PPTX
Modernise your Windows 10 deployment with Windows Autopilot
Andrew Bettany
 
PPTX
SpiceWorks All Access IT 2019 Windows Autopilot
Andrew Bettany
 
PPTX
4 Modern Security - Integrated SecOps and incident response with MTP
Andrew Bettany
 
PPTX
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
PPTX
1 Modern Security - Keynote
Andrew Bettany
 
PPTX
4 Modern Desktop - Planning a Modern Desktop Deployment
Andrew Bettany
 
PPTX
5 modern desktop - windows autopilot
Andrew Bettany
 
PPTX
3 modern desktop - office 365 pro plus deployment + servicing
Andrew Bettany
 
PPTX
2 modern desktop - windows deployment & servicing
Andrew Bettany
 
PPTX
1 modern desktop - shift to a modern desktop
Andrew Bettany
 
PPTX
Microsoft 365 UG Windows Autopilot 1st May 2019
Andrew Bettany
 
PDF
Windows User Group June 2016 Windows 10
Andrew Bettany
 
PPTX
Threescore years and ten
Andrew Bettany
 
Modernise your Windows 10 deployment with Windows Autopilot
Andrew Bettany
 
SpiceWorks All Access IT 2019 Windows Autopilot
Andrew Bettany
 
4 Modern Security - Integrated SecOps and incident response with MTP
Andrew Bettany
 
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
1 Modern Security - Keynote
Andrew Bettany
 
4 Modern Desktop - Planning a Modern Desktop Deployment
Andrew Bettany
 
5 modern desktop - windows autopilot
Andrew Bettany
 
3 modern desktop - office 365 pro plus deployment + servicing
Andrew Bettany
 
2 modern desktop - windows deployment & servicing
Andrew Bettany
 
1 modern desktop - shift to a modern desktop
Andrew Bettany
 
Microsoft 365 UG Windows Autopilot 1st May 2019
Andrew Bettany
 
Windows User Group June 2016 Windows 10
Andrew Bettany
 
Threescore years and ten
Andrew Bettany
 
Ad

Recently uploaded (20)

PPTX
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PPTX
python advanced data structure dictionary with examples python advanced data ...
sprasanna11
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
PDF
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
python advanced data structure dictionary with examples python advanced data ...
sprasanna11
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 

3 Modern Security - Secure identities to reach zero trust with AAD

  • 2. Secure identities to reach Zero Trust with Azure AD Matt Fooks Clouds in [email protected] Infrastructure Cloud Architect [email protected] Andrew Bettany MVP IT Masterclasses Ltd [email protected]
  • 5. 653K1.1B17.5M Every Office 365 and Microsoft Azure customer uses Azure Active Directory Sep 2018 90%90K 450B
  • 8. Conditional access Identity protectionSecure authentication
  • 11. Password-less authenticationUser-friendly experienceEnterprise-grade security Hello 47M enterprises have deployed Windows Hello for Business active Windows Hello users 6.5K growth in biometric capable computers 350%
  • 16. Azure AD Password Protection Dynamic banning of passwords based on known bad patterns and those you define. Smart Lockout to thwart bad actors trying to guess passwords. Built for hybrid environments. Unified admin experience for on-premises and cloud. Cloud intelligence to ensure strong passwords
  • 18. Azure AD Conditional Access User and location Device Application Real time risk Conditional access
  • 19. Corporate Network Geo-location Microsoft Cloud App SecurityMacOS Android iOS Windows Windows Defender ATP Client apps Browser apps Google ID MSA Azure AD ADFS Require MFA Allow/block access Block legacy authentication Force password reset ****** Limited access Controls Employee & Partner Users and Roles Trusted & Compliant Devices Physical & Virtual Location Client apps & Auth Method Conditions Machine learning Policies Real time Evaluation Engine Session Risk 3 40TB Effective policy
  • 20. Productivity Security Timely access to the right resources The right people have the right access to resources
  • 21. Identity lifecycle facilities collaboration Access lifecycle provides seamless and efficient access Privileged access lifecycle addresses risks inherent in administration Productivity Security Timely access to the right resources The right people have the right access to resources The right controls that ensure secure productivity Identity Access Admin rights
  • 22. Identity lifecycle facilities collaboration Access lifecycle provides seamless and efficient access Privileged access lifecycle addresses risks inherent in administration Productivity Security Timely access to the right resources The right people have the right access to resources The right controls that ensure secure productivity Identity Access Admin rights
  • 23. Azure Active Directory access reviews Manage risk and compliance for employees, guests, business partners, and contractors Audit and recertify users’ access to applications, resources, and roles Configure programs to automatically repeat complex review sequences Review current memberships Confirm which memberships to keep Remove stale memberships Request sent to users and resource owners Report status to admin Access Reviews
  • 24. Azure AD Privileged Identity Management (PIM) See which users are assigned privileged roles. Enable on-demand, "just in time" administrative access. Set up approval flows for privilege activation. Get alerts and view a history of administrator activation and actions. Review administrative roles and require users to provide justification to retain membership. Manage built-in Azure Resource roles, as well as custom (RBAC) roles IntuneRoleAdministrator DevTestLabsUser SecurityReader VirtualMachineUserLogin ContosoExpensesAppModerator Management and auditing of admin roles across Azure and Office clouds
  • 26. First account Compromised Domain Admin Compromised Attack Discovered Research & Preparation Attacker Undetected (Data Exfiltration) Attack Sophistication Target Active Directory (AD) & Identities Attacks not detected. Assume breach Response and Recovery • Attack operators exploit any weakness • Target information on any device or service • Attacks get automated and are industrialized • Active Directory controls access to business assets • Attackers commonly target AD and IT Admins • Time to detect an attack is very short as attacks can occur out of nowhere and might be automated • You may be under attack (or compromised) • Response requires advanced expertise and tools • Expensive and challenging to successfully recover 24-48 Hours 101+ Days
  • 27. User browses to a website Phishing mail Opens attachment Clicks on a URL + Exploitation & Installation Command & Control Brute force account or use stolen account credentials User account compromise & persistence Attacker attempts lateral movement Privileged account compromised Domain compromise & persistence Attacker accesses sensitive data Exfiltrate data Azure AD Identity Protection Identity protection & conditional access Microsoft Cloud App Security Extends protection & conditional access to other cloud apps Azure ATP Azure AD Identity Protection Identity protection & conditional access Identity forensics Attacker collects reconnaissance and configuration data Office ATP Azure AD Privileged Identity Management Advanced Email Threat Protection Privileged Access Management
  • 28. Microsoft Threat Protection Identities Endpoints User Data Cloud Apps Infrastructure Users and Admins Devices and Sensors Email messages and documents SaaS Applications and Data Stores Servers, Virtual Machines, Databases, Networks Intelligent Security Graph 6.5 TRILLION signals per day
  • 29. Get comprehensive Identity protection An integral component of Microsoft Threat Protection Azure AD Identity Protection Azure ATP Microsoft Cloud App Security
  • 30. Azure AD Identity Protection Connected intelligence Continuous detection Actionable insights Observe trillions of signals and risk events from cloud systems Apply artificial intelligence and human expertise to derive accurate insights Send alerts, self-mitigate, and automatically remediate threats Protects against 99.6% of identity attacks
  • 31. A comprehensive, intelligent security solution that brings the visibility, real-time control, and security you have in your on-premises network to your cloud applications. ControlDiscover Protect Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions
  • 32. Azure Advanced Threat Protection Detect threats fast with Behavioral Analytics Focus on what is important using attack timeline Reduce the fatigue of false positives Protect at scale with the power of the cloud Reconnaissance ! ! ! Compromised Credentials Lateral Movement Domain Dominance
  • 33. Conditional access Identity protectionSecure authentication
  • 34. Protecting against threats can be simple Strengthen your credentials Reduce your attack surface Automate threat response Increase your awareness with auditing and monitor security alerts Enable self-help for more predictable and complete end user security https://aka.ms/securitysteps