SlideShare a Scribd company logo
1 of 22
MICROSOFT 365
Virtual MARATHON
May 27 & 28, 2020
36 hours / 2 days
MICROSOFT 365 VIRTUAL MARATHON
Securing IT Against Modern Threats with Microsoft 365 Security Tools
Michael Noel
Partner, CCO
@MichaelTNoel
Broughtto youby:
TheGlobalMicrosoft Community&
M365Conf.com | #M365CONF
#M365VM
M365VirtualMarathon.com
MICROSOFT 365
Virtual MARATHON
May 27 & 28, 2020
36 hours / 2 days
Mark Your Calendars:
March 23-25, 2021, MGM Grand Resort
Las Vegas, Nevada, USA
M365Conf.com
#M365CONF
TheSharePoint Conferenceis nowTheMicrosoft 365 CollaborationConference
#M365VM
M365VirtualMarathon.com
Broughtto youby:
TheGlobalMicrosoft Community&
M365Conf.com | #M365CONF
THANK YOU TO ALL OUR GENEROUS SPONSORS
Michael Noel
@MichaelTNoel
• Authored/Co-authored 20 books including the best-selling
SharePoint, Exchange, and Windows Unleashed series
• Presented at over 230 events in over 85 unique countries
around the world
• Partner at Convergent Computing in the San Francisco Bay
Area (cco.com)
 Visit the Vendors Booth, Sessions and Watch the Videos
 Submit Your Answers to Pair up Items to Sponsor Enter the Raffle
 You need at least 5 correct answers then submit for a chance to win!
(One in each Americas, APAC, EMEA)
ARE YOU READY FOR A RAFFLE?
WE ARE GIVING AWAY 3 OCULUS QUEST ALL IN ONE!
https://bit.ly/m365raffle
CONSIDER DONATING TO THE FOLLOWING CHARITY RELIEF FUNDS:
UNITED WAY: https://give.uwkc.org/m365vm
INTERNATIONAL MEDICAL CORPS: https://bit.ly/MedicalCorpsFund
10% OF FUNDS FROMSPONSORS GOTO SUPPORT COMMUNITY RELIEF.
FOR MORE INFORMATION WRITE TO: info@m365virtualmarathon.com
May 27 & 28, 2020
Michael Noel | EN
#M365VM
 Targeted Attacks
 Spear Phishing (Exec/Finance targeting)
 State-sponsored Attacks (Sony hack, Sea Turtle, etc.)
 IP Theft/Loss (Mass downloads, disgruntled offboards, ‘oversharing.’)
 Data IntegrityChallenges
 Ransomware/Cryptojacking
 “Permanent” deletion of cloud data
 Device Security
 Theft/Compromise
 Malware/Keyboard Loggers/Rootkits
 Information Overload
 Firewall/Syslog log overload
 Audit log overload
 Noise vs signal ratio in IT
 Trying to stay one step ahead of attackers
IT Security: A Vastly Changed Landscape
May 27 & 28, 2020
Michael Noel | EN
#M365VM
 Key to password security is not necessarily length, complexity, or
even age; but global uniqueness
 Hackers have access to databases of ‘pwned’ passwords and can
run password hashes against these databases in a matter of
milliseconds
 ‘Passphrases’ that consist of unique seed words are infinitely more
complex and much harder to crack (i.e. “Yellow birdseed hat
pumpkin”)
 Test your password at https://haveibeenpwned.com
Passwords are Not as Secure as You Think
May 27 & 28, 2020
Michael Noel | EN
#M365VM
 Exploiting Cached credentials on workstations are a common attack vector
 Any user with local admin rights to a workstation (obtained legitimately or via phishing) can
access the cached credentials of any other user who logged in at some point. If the
passwords are not sufficiently complex or match any darknet database entries, they are
EASILY cracked.
 “Golden Ticket” attacks using hacking tools such as Mimikatz can then leverage elevated
domain rights (i.e. Domain Admin) to hack the krbst account and create non-expiring ‘Golden
Tickets’ that give unfettered rights to all domain resources
Lateral Attacks are Common and Easy to Exploit
 Examining Microsoft Security Tools
What’s the Solution?
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Microsoft Security in Relation to the NIST Cyber Security
Framework
Identify
• Azure
Active
Directory
• Microsoft
Intune
• SCCM
• Windows
Defender
ATP
Protect
• Azure MFA
• Azure AD
Privileged Identity
Management
• Microsoft Identity
Manager /
Privileged Access
Management
• Azure Information
Protection
• Azure AD
Password
Protection
Detect
• Azure Sentinel
• Microsoft Cloud
App Security
• Azure Advanced
Threat Protection
• Windows
Defender ATP
• Azure Security
Center
• Azure AD
Identity
Protection
Respond
• Azure
Sentinel
• Azure ATP
Recover
• Azure
Security
Center
• Azure Backup
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Microsoft Cloud App Security
May 27 & 28, 2020
Michael Noel | EN
#M365VM
 ATA is an on-prem version of Azure ATP
 ATA/Azure ATP deploys sensors to domain controllers to look for
behaviors associated with compromised internal systems
 ATA/ATP Sensors perform their calculations locally and then forward their
alerts to the cloud
 Microsoft Advanced Threat Protection (ATP) is a cloud-based version of
ATA that extends the capabilities of ATA to include the following:
 Azure Advanced Threat Protection (Azure ATP)
 Microsoft Defender Advanced Threat Protection (ATP)
 Office 365 Advanced Threat Protection (Office 365 ATP)
Advanced Threat Analytics (ATA) &
Azure Advanced Threat Protection (ATP)
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Azure Sentinel
Azure Sentinel builds on the
proven Azure Monitor log
monitoring platform
Azure Sentinel provides for
centralized SIEM capabilities
for logs, alerting and
providing for reporting
trends
Firewall, switch, Windows,
and Linux logs can all be
forwarded to Sentinel to
allow for retroactive
forensics or real-time alerts
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Azure AD Password Protection
Azure AD Password Protection runs
as agents on all internal domain
controllers that restrict how a
password is constructed.
Azure AD Password Protection
allows for complexity beyond the
default options in an AD
environment, disallowing passwords
that are known to be compromised
and/or include key words
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Azure Multi-Factor Authentication
Azure Multi-factor Authentication
(MFA) integrates with MFA apps
(Google Authenticator, Microsoft
Authentication) and SMS based MFA
to provide for an additional layer of
auth required for traffic.
Deployment of MFA alone can
reduce your exposure to modern
threats by an exponential amount
Runs on a dedicated server or the
Azure AD Connect server
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Azure AD Privileged Identity Management (PIM)
Azure AD Privileged Identity
Management (PIM) allows accounts
to be ‘privileged by request’ and not
by default.
Users can initiate requests to raise
their privileged roles, and these
requests can be moderated by
admins and/or monitored.
In the event of a compromise, admin
users will have no special rights until
they have been elevated, which
greatly reduces exposure.
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Microsoft Identity Manager / PAM
The On-Prem version of PIM is
integrated into the Microsoft
Identity Manager (MIM) suite in
the form of Privileged Access
Management (PAM.)
PAM works similarly to PIM, with
the exception being that a
Bastion forest is used for
accounts with elevated
privileges.
A Bastion forest exists across a
one-way trust and accounts are
only elevated as needed. This
leaves membership in privileged
groups such as ‘Domain Admins’
to very few active accounts.
May 27 & 28, 2020
Michael Noel | EN
#M365VM
 Azure Information Protection provides for the ability to control what
happens to data AFTER it has been accessed.
 Azure IP assigns Information Protection tags to content either manually
or via automatic processes.
 The existing Azure Rights Management Services (Azure RMS) service is
now integrated into Azure RMS.
 Hold Your Own Key (HYOK) allows organizations to secure and encrypt
content using their own private key, removing Microsoft from data
custody.
Azure Information Protection
May 27 & 28, 2020
Michael Noel | EN
#M365VM
Azure Security Center
The Azure Security Center
monitors and alerts against hybrid
security scenarios
Alerts are generated from virtual
machines both in the Azure cloud
an in supported on-prem
workloads.
Microsoft prices based on a ‘Free’
tier and a ‘Standard’ tier that
includes advanced automation.
Pricing is determined by the
number and complexity of systems
managed by the platform
Licensing SKU
USD /
user /
month
BasicApps
EntApps
RMS
FCI
HYOK/Auto
Class
AADC
MFA
Password
Protection
ATA
ATP
MCAS
PIM/MIM/
PAM
Security
Center
Sentinel
Azure AD – Free Free X
Azure AD – Office 365 Apps *O365 X X
Azure AD Premium P1 $6.00 X X X X
Azure AD Premium P2 $9.00 X X X X X X X
Azure Information Protection - Free Free X
Azure Information Protection – Office 365 Apps *O365 X X
Azure Information Protection Premium P1 $2.00 X X X X
Azure Information Protection Premium P2 $5.00 X X X X X
Enterprise Mobility + Security E3 $8.74 X X X X X X X X
Enterprise Mobility + Security E5 $14.80 X X X X X X X X X X X X
Microsoft 365 E3 $35.00 X X X X X X X X
Microsoft 365 E5 $63.00 X X X X X X X X X X X X
Pay as You Go (Storage and/or Usage) Varies X* X*
Michael Noel
CCO.com
@MichaelTNoel
Facebook.com/michaelnoel
Linkedin.com/in/michaeltnoel
SharingTheGlobe.com
Slideshare.net/michaeltnoel
Thank you!
Questions? Speaker feedback
https://bit.ly/M365VMSpeakerFeedback
Event feedback
https://bit.ly/M365VMFeedback

More Related Content

More from Michael Noel

SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Michael Noel
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Michael Noel
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Michael Noel
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Michael Noel
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Michael Noel
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...Michael Noel
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Michael Noel
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Michael Noel
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Michael Noel
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014Michael Noel
 
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...Michael Noel
 
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...Michael Noel
 
SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...
SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...
SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...Michael Noel
 
IberianSPC - SharePoint 2013 Upgrade
IberianSPC - SharePoint 2013 UpgradeIberianSPC - SharePoint 2013 Upgrade
IberianSPC - SharePoint 2013 UpgradeMichael Noel
 
SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...
SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...
SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...Michael Noel
 
Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...
Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...
Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...Michael Noel
 
Ultimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPS
Ultimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPSUltimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPS
Ultimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPSMichael Noel
 
SPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices Session
SPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices SessionSPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices Session
SPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices SessionMichael Noel
 

More from Michael Noel (20)

SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
 
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPSBaku - Mic...
 
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...
SharePoint Сегодня; Как мы докатились сюда и куда идем дальше - SPCUA - Micha...
 
SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...
SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...
SPSSac2014 - SharePoint Infrastructure Tips and Tricks for On-Premises and Hy...
 
IberianSPC - SharePoint 2013 Upgrade
IberianSPC - SharePoint 2013 UpgradeIberianSPC - SharePoint 2013 Upgrade
IberianSPC - SharePoint 2013 Upgrade
 
SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...
SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...
SPSAD - Ultimate SharePoint Infrastructure Best Practices Session - SharePoin...
 
Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...
Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...
Sharing the Point South America 2013 (STPSA) - Ultimate SharePoint Infrastruc...
 
Ultimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPS
Ultimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPSUltimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPS
Ultimate SharePoint Infrastructure Best Practices - Japanese Version - #JPSPS
 
SPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices Session
SPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices SessionSPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices Session
SPSSV 2013 - Ultimate SharePoint Infrastructure Best Practices Session
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Securing IT Against Modern Threats with Microsoft Cloud Security Tools

  • 1. MICROSOFT 365 Virtual MARATHON May 27 & 28, 2020 36 hours / 2 days MICROSOFT 365 VIRTUAL MARATHON Securing IT Against Modern Threats with Microsoft 365 Security Tools Michael Noel Partner, CCO @MichaelTNoel Broughtto youby: TheGlobalMicrosoft Community& M365Conf.com | #M365CONF #M365VM M365VirtualMarathon.com
  • 2. MICROSOFT 365 Virtual MARATHON May 27 & 28, 2020 36 hours / 2 days Mark Your Calendars: March 23-25, 2021, MGM Grand Resort Las Vegas, Nevada, USA M365Conf.com #M365CONF TheSharePoint Conferenceis nowTheMicrosoft 365 CollaborationConference #M365VM M365VirtualMarathon.com Broughtto youby: TheGlobalMicrosoft Community& M365Conf.com | #M365CONF
  • 3. THANK YOU TO ALL OUR GENEROUS SPONSORS
  • 4. Michael Noel @MichaelTNoel • Authored/Co-authored 20 books including the best-selling SharePoint, Exchange, and Windows Unleashed series • Presented at over 230 events in over 85 unique countries around the world • Partner at Convergent Computing in the San Francisco Bay Area (cco.com)
  • 5.  Visit the Vendors Booth, Sessions and Watch the Videos  Submit Your Answers to Pair up Items to Sponsor Enter the Raffle  You need at least 5 correct answers then submit for a chance to win! (One in each Americas, APAC, EMEA) ARE YOU READY FOR A RAFFLE? WE ARE GIVING AWAY 3 OCULUS QUEST ALL IN ONE! https://bit.ly/m365raffle
  • 6. CONSIDER DONATING TO THE FOLLOWING CHARITY RELIEF FUNDS: UNITED WAY: https://give.uwkc.org/m365vm INTERNATIONAL MEDICAL CORPS: https://bit.ly/MedicalCorpsFund 10% OF FUNDS FROMSPONSORS GOTO SUPPORT COMMUNITY RELIEF. FOR MORE INFORMATION WRITE TO: info@m365virtualmarathon.com
  • 7. May 27 & 28, 2020 Michael Noel | EN #M365VM  Targeted Attacks  Spear Phishing (Exec/Finance targeting)  State-sponsored Attacks (Sony hack, Sea Turtle, etc.)  IP Theft/Loss (Mass downloads, disgruntled offboards, ‘oversharing.’)  Data IntegrityChallenges  Ransomware/Cryptojacking  “Permanent” deletion of cloud data  Device Security  Theft/Compromise  Malware/Keyboard Loggers/Rootkits  Information Overload  Firewall/Syslog log overload  Audit log overload  Noise vs signal ratio in IT  Trying to stay one step ahead of attackers IT Security: A Vastly Changed Landscape
  • 8. May 27 & 28, 2020 Michael Noel | EN #M365VM  Key to password security is not necessarily length, complexity, or even age; but global uniqueness  Hackers have access to databases of ‘pwned’ passwords and can run password hashes against these databases in a matter of milliseconds  ‘Passphrases’ that consist of unique seed words are infinitely more complex and much harder to crack (i.e. “Yellow birdseed hat pumpkin”)  Test your password at https://haveibeenpwned.com Passwords are Not as Secure as You Think
  • 9. May 27 & 28, 2020 Michael Noel | EN #M365VM  Exploiting Cached credentials on workstations are a common attack vector  Any user with local admin rights to a workstation (obtained legitimately or via phishing) can access the cached credentials of any other user who logged in at some point. If the passwords are not sufficiently complex or match any darknet database entries, they are EASILY cracked.  “Golden Ticket” attacks using hacking tools such as Mimikatz can then leverage elevated domain rights (i.e. Domain Admin) to hack the krbst account and create non-expiring ‘Golden Tickets’ that give unfettered rights to all domain resources Lateral Attacks are Common and Easy to Exploit
  • 10.  Examining Microsoft Security Tools What’s the Solution?
  • 11. May 27 & 28, 2020 Michael Noel | EN #M365VM Microsoft Security in Relation to the NIST Cyber Security Framework Identify • Azure Active Directory • Microsoft Intune • SCCM • Windows Defender ATP Protect • Azure MFA • Azure AD Privileged Identity Management • Microsoft Identity Manager / Privileged Access Management • Azure Information Protection • Azure AD Password Protection Detect • Azure Sentinel • Microsoft Cloud App Security • Azure Advanced Threat Protection • Windows Defender ATP • Azure Security Center • Azure AD Identity Protection Respond • Azure Sentinel • Azure ATP Recover • Azure Security Center • Azure Backup
  • 12. May 27 & 28, 2020 Michael Noel | EN #M365VM Microsoft Cloud App Security
  • 13. May 27 & 28, 2020 Michael Noel | EN #M365VM  ATA is an on-prem version of Azure ATP  ATA/Azure ATP deploys sensors to domain controllers to look for behaviors associated with compromised internal systems  ATA/ATP Sensors perform their calculations locally and then forward their alerts to the cloud  Microsoft Advanced Threat Protection (ATP) is a cloud-based version of ATA that extends the capabilities of ATA to include the following:  Azure Advanced Threat Protection (Azure ATP)  Microsoft Defender Advanced Threat Protection (ATP)  Office 365 Advanced Threat Protection (Office 365 ATP) Advanced Threat Analytics (ATA) & Azure Advanced Threat Protection (ATP)
  • 14. May 27 & 28, 2020 Michael Noel | EN #M365VM Azure Sentinel Azure Sentinel builds on the proven Azure Monitor log monitoring platform Azure Sentinel provides for centralized SIEM capabilities for logs, alerting and providing for reporting trends Firewall, switch, Windows, and Linux logs can all be forwarded to Sentinel to allow for retroactive forensics or real-time alerts
  • 15. May 27 & 28, 2020 Michael Noel | EN #M365VM Azure AD Password Protection Azure AD Password Protection runs as agents on all internal domain controllers that restrict how a password is constructed. Azure AD Password Protection allows for complexity beyond the default options in an AD environment, disallowing passwords that are known to be compromised and/or include key words
  • 16. May 27 & 28, 2020 Michael Noel | EN #M365VM Azure Multi-Factor Authentication Azure Multi-factor Authentication (MFA) integrates with MFA apps (Google Authenticator, Microsoft Authentication) and SMS based MFA to provide for an additional layer of auth required for traffic. Deployment of MFA alone can reduce your exposure to modern threats by an exponential amount Runs on a dedicated server or the Azure AD Connect server
  • 17. May 27 & 28, 2020 Michael Noel | EN #M365VM Azure AD Privileged Identity Management (PIM) Azure AD Privileged Identity Management (PIM) allows accounts to be ‘privileged by request’ and not by default. Users can initiate requests to raise their privileged roles, and these requests can be moderated by admins and/or monitored. In the event of a compromise, admin users will have no special rights until they have been elevated, which greatly reduces exposure.
  • 18. May 27 & 28, 2020 Michael Noel | EN #M365VM Microsoft Identity Manager / PAM The On-Prem version of PIM is integrated into the Microsoft Identity Manager (MIM) suite in the form of Privileged Access Management (PAM.) PAM works similarly to PIM, with the exception being that a Bastion forest is used for accounts with elevated privileges. A Bastion forest exists across a one-way trust and accounts are only elevated as needed. This leaves membership in privileged groups such as ‘Domain Admins’ to very few active accounts.
  • 19. May 27 & 28, 2020 Michael Noel | EN #M365VM  Azure Information Protection provides for the ability to control what happens to data AFTER it has been accessed.  Azure IP assigns Information Protection tags to content either manually or via automatic processes.  The existing Azure Rights Management Services (Azure RMS) service is now integrated into Azure RMS.  Hold Your Own Key (HYOK) allows organizations to secure and encrypt content using their own private key, removing Microsoft from data custody. Azure Information Protection
  • 20. May 27 & 28, 2020 Michael Noel | EN #M365VM Azure Security Center The Azure Security Center monitors and alerts against hybrid security scenarios Alerts are generated from virtual machines both in the Azure cloud an in supported on-prem workloads. Microsoft prices based on a ‘Free’ tier and a ‘Standard’ tier that includes advanced automation. Pricing is determined by the number and complexity of systems managed by the platform
  • 21. Licensing SKU USD / user / month BasicApps EntApps RMS FCI HYOK/Auto Class AADC MFA Password Protection ATA ATP MCAS PIM/MIM/ PAM Security Center Sentinel Azure AD – Free Free X Azure AD – Office 365 Apps *O365 X X Azure AD Premium P1 $6.00 X X X X Azure AD Premium P2 $9.00 X X X X X X X Azure Information Protection - Free Free X Azure Information Protection – Office 365 Apps *O365 X X Azure Information Protection Premium P1 $2.00 X X X X Azure Information Protection Premium P2 $5.00 X X X X X Enterprise Mobility + Security E3 $8.74 X X X X X X X X Enterprise Mobility + Security E5 $14.80 X X X X X X X X X X X X Microsoft 365 E3 $35.00 X X X X X X X X Microsoft 365 E5 $63.00 X X X X X X X X X X X X Pay as You Go (Storage and/or Usage) Varies X* X*