Plan
Plan
Plan
Step 1: Deploy your identity infrastructure and access protection for Microsoft
365
Decide which identity model is best for your environment
Select an authentication method
Implement and manage external identities
Protecting Privileged and User Accounts
Step 2: Manage Endpoints with Intune and Microsoft 365
Configure and manage Microsoft Defender Application Guard
Add Applications
Implement application protection policies
Set up compliance policies
Configure device configuration policies
Enrol devices
Step 3: Deploy Microsoft 365 Defender
Secure identity by using Microsoft Defender for Identity
Secure collaboration by using Microsoft Defender for Office 365
Secure endpoints by using Microsoft Defender for Endpoint
Microsoft Defender for Cloud Apps
Detect and respond to threats in Microsoft 365 by using Microsoft Sentinel
Step 4: Protect and govern sensitive data
Deploy a Microsoft Information Protection Solution
Manage Data Privacy and Data Protection
Step 1: Deploy your identity infrastructure and access protection for
Microsoft 365
PHS PTA
Security Synchronizes password hashes to Azure More secure since passwords are not
AD, which could potentially be attacked stored in Azure AD.
Instead, the authentication takes place
on-premises, and only the result is
passed to Azure AD
Infrastructure Requires less infrastructure since it only Requires an additional server to be
requires a synchronization agent to be installed and configured in the on-
installed on a domain controller premises environment
Latency Requires a round-trip to Azure AD to Has lower latency since authentication
check the password hash takes place on-premises
High Provides better high availability since Requires a connection to the on-
availability password hashes are synchronized to premises environment to authenticate
Azure AD. users
If the on-premises Active Directory
becomes unavailable, users can still
authenticate against Azure AD using
their synchronized password hash
Deployment Requires an additional server to be Easier to deploy and configure since it
complexity installed and configured, which can add only requires a synchronization agent
complexity to the deployment to be installed on a domain controller
Overall, the choice between PHS and PTA depends on the specific needs and requirements of
your organization. PTA provides better security but requires additional infrastructure and
configuration, while PHS provides better high availability and is easier to deploy but may be
less secure.
2. Federated authentication
When you choose this authentication method, Azure AD hands off the authentication
process to a separate trusted authentication system, such as on-premises Active Directory
Federation Services (AD FS), to validate the user’s password.
Azure AD B2B Collaboration enables you to securely share your organization's applications
and services with external users, while maintaining control over your own corporate data.
Collaborate securely with external partners from small to large enterprises, even if they don't
use Azure AD or don't have an IT department.
IV. Protecting Privileged and User Accounts
Microsoft Defender Application Guard (Application Guard) is designed to help prevent old
and newly emerging attacks to help keep employees productive. Using our unique hardware
isolation approach, our goal is to destroy the playbook that attackers use by making current
attack methods obsolete.
▪ Install Application Guard
▪ Configure Microsoft Defender Application Guard policy settings
You can use App protection policies to prevent company data from saving to the local
storage of the device (see the image below). You can also restrict data movement to other
apps that aren't protected by App protection policies. App protection policy settings include:
• Data relocation policies like Save copies of org data, and Restrict cut, copy, and
paste.
• Access policy settings like Require simple PIN for access and block managed apps
from running on jailbroken or rooted devices.
Device compliance policies are a key feature when using Intune to protect your
organization's resources. In Intune, you can create rules and settings that devices must meet
to be considered compliant, such as a minimum OS version. If the device isn't compliant, you
can then block access to data and resources using Conditional Access. You can also take
actions for non-compliance, such as sending a notification email to the user.
V. Configure device configuration policies
Microsoft Intune includes settings and features you can enable or disable on different
devices within your organization. These settings and features are added to "configuration
profiles". You can create profiles for different devices and different platforms, including
iOS/iPadOS, Android device administrator, Android Enterprise, and Windows. Then, use
Intune to apply or "assign" the profile to the devices.
Microsoft Intune, in conjunction with Azure Active Directory (Azure AD), facilitates a secure,
streamlined process for registering and enrolling devices that want access to your internal
resources. Once users and devices are registered within your Azure AD (also called a tenant),
then you can utilize Intune for its endpoint management capabilities.
Step 3: Deploy Microsoft 365 Defender
Deploying Microsoft 365 Defender represents the next level of Zero Trust security, providing
enhanced protection against threats. This extended detection and response (XDR) solution
automatically gathers, correlates, and analyzes signal, threat, and alert data from various
sources within your Microsoft 365 environment, including endpoints, email, applications, and
identities.
1.1 Anti-Phishing Policies : Protect users from phishing attacks and set up safety tips on
suspicious messages.
▪ Add users, groups, and domains to include or exclude in this policy
▪ Threshold value and anti-phishing protection
▪ Define what actions this policy should take on messages
1.2 Anti-Spam Policies : Protect your organization's messages from spam, including
actions to take if spam is detected
▪ Inbound anti-spam policy
▪ Anti-spam outbound policy
1.3 Anti-malware Policies : Protect your organization's messages from malware (actions
to take and who to notify if detected)
1.4 Safe Attachments : Protect your organization against malicious content in
attachments and files in SharePoint, OneDrive and Teams
1.5 Safe Links : Prevent users from opening and sharing malicious links in messages and
Office apps
2. Configure Rules
2.1 Customer Green/Red Lists : Block external email addresses or domains to prevent
communication with users in your organization (sending or receiving emails)
2.2 Quarantine policies
3. Configuration Analyzer
Help you identify issues in your current configuration and improve your policies to
strengthen your security (Recommendations).
4. Investigations
Automated investigation and response features let you run automated investigation
processes in response to well-known threats.
5. Threat tracking
Informative widgets and views that provide you with intelligence on different cybersecurity
issues that might impact your company.
6. Attack simulation
Allows you to run simulations of mild cyberattacks on your organization to test your security
strategies and practices.
7. Threat Explorer
Can help you investigate and respond to various threats that might exist coming in via email.
III. Secure endpoints by using Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is a platform designed to help enterprise networks prevent,
detect, investigate, and respond to advanced threats on their endpoints.
2. Onboard Devices
3. Configure Permissions
Create and manage roles for role-based access control
Configure device groups
4. Configure capabilities
• Inventories: Lists software and apps currently in use in your organization. You'll see
browsers, operating systems, and other software on devices, along with identified
weaknesses and threats.
• Weaknesses: Lists vulnerabilities along with the number of exposed devices in your
organization.
If you see "0" in the Exposed devices column, you do not have to take any immediate
action. However, you can learn more about each vulnerability listed on this page.
Select an item to learn more about it and what you can do to mitigate the potential
threat to your company.
• Event timeline: Lists vulnerabilities that affect your organization in a timeline view.
4.2 Endpoint Detection and Response (EDR)
Les fonctionnalités de protection évolutive des points de terminaison Microsoft Defender
pour point de terminaison fournissent des détections d’attaques avancées qui sont en quasi-
temps réel et actionnables. Les analystes de sécurité peuvent définir des priorités de manière
efficace, améliorer la visibilité de l’ensemble des violations et prendre des mesures
correctives pour corriger les menaces.
2. Shadow IT Discovery
Once you have data flowing into Defender for Cloud Apps, you’ll start getting Cloud Discovery
reports. This will tell you what service categories are most used, which apps are most used
by your users and if there’s the usage of high/medium and low-risk apps.
Based on this data you can start digging into the riskiest apps with high usage and identify
why they’re being used and what the risks are. Each app/cloud service in the catalog has an
overall score from 1-10, based on four categories, General, Security, Compliance and Legal.
Defender for Cloud Apps catalog listing
The point of the catalog is to give you instant visibility into the security stance (perhaps of a
service you’ve just found out is used by the entire finance department) and regulatory
compliance of an app, without having to spend hours digging through their website or
requesting more information from them.
Anomaly detection uses User and Entity Behavioral Analytics (UEBA) and Machine Learning
and for most detections, it takes seven days to establish a baseline so it can identify what’s
unusual. Signals used in these policies include risky IP addresses, inactive accounts, location,
device, user agent etc. Malware detection across Box, Dropbox, Google Workspace and
Office 365 (when used with Defender for Office 365) are one of these policies.
OAuth app policies keep an eye on apps that are granted permissions in Azure AD, either by
end-users (if you allow this) or by administrators.
File policies bring a built-in DLP engine to inspect content across 100+ file types and allow
you to take automated action when the content matches your criteria. You can create
policies for publicly shared files, files shared with a specific domain or with a specific set of
unauthorized users, and even for specific high-risk file extensions.
Defender for Cloud Apps cloud discovery anomaly detection policy
Finally, App discovery policies alert you to new cloud services that are being used (to
continue the fight against Shadow IT) and cloud discovery anomaly detection policies alert
you to unusual activity in cloud apps.
Alerts from these policies can be sent as emails, or text messages or you can use a Power
Automate playbook to notify the right people. You can also automatically disable a user
account, require the user to sign in again or confirm them as compromised to automatically
contain a potential attack.
V. Detect and respond to threats in Microsoft 365 by using Microsoft
Sentinel
Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the
enterprise. With Microsoft Sentinel, you get a single solution for attack detection, threat
visibility, proactive hunting, and threat response.
Microsoft Sentinel is your bird's-eye view across the enterprise alleviating the stress of
increasingly sophisticated attacks, increasing volumes of alerts, and long resolution time
frames
Azure Sentinel has built-in connectors that help collect data across all sources in an
organization easily.
Data connectors are used to configure connections with different Microsoft services, partner
solutions, and other resources.
Azure Sentinel provided support for the following Microsoft services:
• Azure AD, Office 365, Cloud App Security, Azure Activity Log, Azure AD Identity Protection,
Azure Information Protection, Azure ATP, Azure Security Center, Domain Name Server,
Microsoft Defender ATP, Microsoft Web Application Firewall, Windows Firewall, Windows
Security Events
The following external connectors were available:
▪ Amazon Web Services (AWS), Barracuda, Check Point, Palo Alto Networks, Fortinet, F5,
Symantec ICDX
2. Use overview dashboard and workbooks to get visibility across
enterprise
By connecting data sources to Azure Sentinel, we can instantly visualize and analyze data
from all connected sources. This allows us to stay informed about what's happening and
customize interactive dashboards as needed.
5. Investigate incidents
With Azure Sentinel we can easily investigate the detected threats and the entire incident.
we can quickly view the status of each incidents and manage the full lifecycle of this event.
6. Automate and orchestrate security operations
Azure Sentinel has built-in automation and orchestration, including pre-defined or custom
playbooks, to automate repetitive tasks and respond to threats quickly.
Step 4: Protect and govern sensitive data
I. Deploy a Microsoft Information Protection Solution
Sensitivity labels from Microsoft Purview Information Protection let you classify and protect
your organization's data, while making sure that user productivity and their ability to
collaborate isn't hindered.
You can use sensitivity labels to:
• Provide protection settings that include encryption and content markings. For
example, apply a "Confidential" label to a document or email, and that label encrypts
the content and applies a "Confidential" watermark. Content markings include
headers and footers as well as watermarks, and encryption can also restrict what
actions authorized people can take on the content.
• Protect content in Office apps across different platforms and devices. Supported by
Word, Excel, PowerPoint, and Outlook on the Office desktop apps and Office on the
web. Supported on Windows, macOS, iOS, and Android.
• Protect meetings and chat by labeling (and optionally, encrypting) meeting invites
and any responses, and enforce Teams-specific options for the meeting and chat.
In all these cases, sensitivity labels from Microsoft Purview can help you take the right
actions on the right content. With sensitivity labels, you can identify the sensitivity of data
across your organization, and the label can enforce protection settings that are appropriate
for the sensitivity of that data. That protection then stays with the content.
3.1 Create and manage DLP policies for Microsoft 365 workloads
In Microsoft Purview, you implement data loss prevention by defining and applying DLP
policies. With a DLP policy, you can identify, monitor, and automatically protect sensitive
items across:
After you create your Microsoft Purview data loss prevention (DLP) policies, you'll want to
verify that they're working as you intended and helping you to stay compliant. With the DLP
reports in the Microsoft Purview compliance portal, you can quickly view:
DLP policy matches This report shows the count of DLP policy matches over time.
DLP false positives and overrides If your DLP policy allows users to override it or report a
false positive, this report shows a count of such instances over time.
When a DLP policy alert notifies you of a DLP policy violation, it could mean several
things. Not all alerts mean that data loss is imminent or has been prevented.
DLP policies don't make decisions about why you're trying to share protected data, but they
notify you if a violation is observed.
Responding to policy violations can include escalating issues to your security team and
working closely with other business stakeholders. You should know the process for
contacting other teams and security before they are needed.
Configure DLP rule exclusions: This helps reduce the number of false positives from your
policy
By using Microsoft Purview and Microsoft Priva, you can take your Zero Trust security to the
next level and implement advanced data protection measures.
With Microsoft Purview Information Protection, you can easily discover, classify, and protect
sensitive information and govern sensitive data
The steps for this solution are as follows:
1. Assess your organization's data and risk : Start your journey by understanding your
data and possible risks.
2. Protect and govern your data : Identify, categorize and manage the data you need to
protect.
3. Follow privacy regulations : Monitor your progress in running assessments and stay
up to date as regulations change.
4. Respond to data privacy incidents and subject requests : Set up alerts so you can
respond to privacy risks and automate your handling of data subject request