This Article Is For Customers, Partners, and Colleagues
This Article Is For Customers, Partners, and Colleagues
An example of a realistic deployment but not a blanket for all as each customer is different
from small to large to using internal to external resources to deploy the products. Obviously
having a larger enterprise you may need a longer test and pilot stages and more people
involved testing applications.
This is a blog style guide, which is not intended to replace our Microsoft public doc guides or
our Advanced Deployment Guide in M365 Admin Portal rather giving customers an option
with a personalised touch.
Emphasise that this is a high-level guide to give you direction. The nitty gritty details of
configuration are found in the links I’ve included in each section.
Just like any project plan, our security products should be tested against your environment
and applications before you deploy it in bulk. Kindly reminder that some products require a
learning period from MDI to MDO and MDE. You can apply the same approach we did in the
Purview Deployment guide, Walk, Jog and Run.
Let’s define these 3 phases:
Walk– This phase is to test the technology, usually only involving IT. To test the start to end
finish of the deployment process, resolve technical issues before bringing in people from the
business and resolve any outstanding issues.
Jog – This is when you bring the people from the business, power users of business-critical
apps and add them to this phase to ensure testing of the apps are done appropriately. The
Pilot users should feedback on your Change Management (comms, training, adoption plan).
In my former years of being a Project Manager, this is phase takes the longest cause you’re
in that grey area of polishing all your test, ticking off all the issue list, potentially educating
your IT on how to support the product
Supporting Features
• Advanced Hunting
• App Governance
Trailer
• Sentinel
• Copilot for Security
Scenario
The story we will follow for this guide is a customer that is migrating to our Defender stack
or XDR (of course you can also use this guide if you’re completely evergreen). The customer
is currently using some 3rd party protection in all pillars like endpoint, email protection, let’s
assume they also have identity on-prem but don’t have any on-prem identity protection, lets
also assume they have a tonne of internal and 3rd party application but no governance and
ways to confirm that configuration is done probably. Lastly, they have MFA and some
Conditional Access enabled but haven’t leveraged P2 capabilities in Entra even though
they’re license for it.
Customer ‘We’ve just subscribed to E5, we know it has some very cool security
products, but which one do we deploy first’?
In many of my customer scenarios, they may have various vendors that protect different
pillars like email protection, endpoint protection, identity, saas and all have a different license
expiration. Therefore, in many cases, they will use the license expiration to make a decision
which pillar needs to migrate first which makes sense from a cost perspective. That approach
doesn’t mess the whole XDR component, as long as we eventually all enable all the products
to get that full enrich XDR experience.
Important note: Keep a fresh mindset. What customers tend to do is try to feature match their
current protection against the Microsoft Defender XDR, we just do things slightly differently, we
detect differently, we process logs differently, we can engineer our detection fasters or enable
them in the OS (we own windows so things do get engineered fast) and, features might be
different.
Another key takeaway and one I often experience with customers, it’s how the migration is
‘urgent’ so the deployment timeline is‘aggressive’ migration. The downside is, there is no time
for change management, no time for machine learning to kick in, no time for a ‘phase’
deployment, no time for pilot users to feedback issues or report false positives or assess reports.
So if you’re a customer who’s reading this, plan way this like a normal business project, have a
project manager involved, resource it properly, give some time for testing and fine tuning.
Don’t make this an urgent migration and blame the product. Just like any project you rush,
you’re putting it at risk. So keep that in mind.
IF we look at a common Attack Kill Chain. The most common initial access to an environment
is through Phishing emails. There is a tonne of various techniques from your credential
harvesting technique to more sophisticated ones like QR Code
Phase 1 - Microsoft Defender for Office 365
• Get your users involved early, provide some instructions on how they can assist with
change management, feedback on false positives, how to submit FP.
• As part of the project, ensure there is a phase for Attack Simulation Training. Using
email protection is one thing but your best protection are your users
• Have confidence using Config Analyzer to enable the recommended settings
In the scenario we are following, we will assume you already have mailboxes in M365, you
need to retire your current 3rd party email protection service, which means we need to point
the MX records for your email domains to M365. When you're done, mail from the internet
flows directly into Microsoft 365 and is protected exclusively by Exchange Online Protection
(EOP) and Defender for Office 365.
If you’re coming from a 3rd party protection, we have a comprehensive guide in migration in
our public docs Migrate from a third-party protection service to Microsoft Defender for Office
365 | Microsoft Learn
But before we get into the nitty gritty of configuration, there are few key things you need to
know and understand
How our protection stack works,. It’s layered in 4 phases, and highlighting that these are a
mixture of EOP, P1 and P2 subscription features, but if you’re an E5 customer, nee bother.
Essentially, the incoming mail passes through all of these phases before delivery, but the
actual path email takes depends on how you configure MDO.
• Edge Protection – still a crucial part of the stack, this phase is design to block
automatically tho bad actors are now overcoming this layer much easier
• Features in sender intelligence are critical for catching spam, bulk, impersonation, and
unauthorized spoof messages, and also factor into phish detection. Most of these
features are individually configurable.
• In this phase the filtering stack begins to handle the specific contents of the mail,
including its hyperlinks and attachments.
• The last stage takes place after mail or file delivery, acting on mail that is in various
mailboxes and files and links that appear in clients like Microsoft Teams.
Another way to look at the MDO structure is through the phases from EOP to MDO P2
There are two major factors that determine which policy is applied to a message:
• The order of processing for the email protection type: This order isn't
configurable
• The priority order of policies:
For more information - Order and precedence of email protection | Microsoft Learn
It's important to understand how user allows and blocks, tenant allows and blocks, and
filtering stack verdicts in EOP and Defender for Office 365 complement or contradict each
other.
• After the filtering stack determines a verdict, only then are tenant policies and their
configured actions evaluated.
• If the same email address or domain exists in a user's Safe Senders list and Blocked
Senders list, the Safe Senders list takes precedence.
• If the same entity (email address, domain, spoofed sending infrastructure, file, or URL)
exists in an allow entry and a block entry in the Tenant Allow/Block List, the block
entry takes precedence.
EOP – Email Office 365 Protection or we sometimes call it, Secure by default.
In EOP, we have by default policies already in place to keep your email secured. This is our
high recommendation from the moment you create email accounts in Office 365 so you can
be confident that you’re secured straight away, this includes
• Email identified as high confidence phishing will be handled according to the anti-
spam policy action. See Configure anti-spam policies in EOP.
Ok let’s Migrate
All sections are important, this first part is all about just cleaning the wardrobe in preparation
for some new clothes. From removing old customisation, email subject and body tags to
deciding on what to do with spam emails whether to put them in junk folder or quarantine, In
this section, its important you take a snapshot of your existing protection settings but don’t try
to re-create it in MDO. Think of this as a fresh reset, in most of my customers, they find this a
good reset of removing legacy settings that they inherited from previous engineer.
Some customers with 3rd party email also have phishing simulation tools. You need to
configure the advanced delivery policy so m365 doesn’t pick this up. Don’t worry, we got you
with our Attack Simulation tool, definitely that best in the market today, even with Attack
simulation in Teams.
This section emphasises on pilot users, will suggest to create some DL groups so we can use
them to for exemption and include them in the the SCL=-1 mail flow rule which the instruction
is actually on the onboard section. Also, to configure on reported settings, on how you want
your users to report on false positives and false negatives
We need to also check that our buttons are working so users can report on these.
o A pilot group for Standard anti-spam and anti-phishing policy settings: For
example, MDOPilot_SpamPhish_Standard
o A pilot group for Strict anti-spam and anti-phishing policy settings: For
example, MDOPilot_SpamPhish_Strict
So the focus is to ensure that we configure settings that will exempt your pilot users from your
existing protection so that M365 can fully be tested by your pilot.
When building your pilot policies for the above you can use our config-analyzer which is our
best practice configuration recommendation which will be your best friend going forward
The goal of config analyzer is to find and fix security policies where the settings are less secure
than the Standard protection and Strict protection
Important note: when deploying policies, our recommendation is to use users or groups for
your pilot phase and domains when you’re ready for general deployment. We don’t
recommend mixing all 3.
There are a couple of ways to tackle policies in EOP and MDO, you can either manually do
this or chose using our Preset Security Policies. There are 3 different preset policies, there is
the built-in which is done automatically. Then you have the standard and strict preset
policies.
Preset security policies - Microsoft Defender for Office 365 | Microsoft Learn
Under Email & Collaboration in the Defender XDR Portal. Under Policies, you will find all the
settings you need under Threat Policies.
By default both Safe attachments and Safe links are enabled. However, you can still customised
users or groups for granular or more specific use case policy
Set up Safe Attachments policies in Microsoft Defender for Office 365 - Microsoft Defender for
Office 365 | Microsoft Learn
Complete Safe Links overview for Microsoft Defender for Office 365 - Microsoft Defender for
Office 365 | Microsoft Learn
Onboard MDO – Steps 1-8 –
In this section, we will do a lot of fine tuning, make a decision to add more users to your
pilot group but first things first, ensure that the right folks have the right permission. Just like
with all of our Defender stack, each one has certain roles you can assign, for the simple
reason that you may have various people looking after each product.
Leverage the Role Based Permission Microsoft Defender for Office 365 permissions in the
Microsoft Defender portal - Microsoft Defender for Office 365 | Microsoft Learn
The goal of this section is to be basically complete your migration. So the first few steps is
fine tuning the last pieces of settings, continue going through the list of recommendation via
Config Analyzer. As you continue to feel comfortable, continue adding more and more users
to the Pilot group. The more users you have reporting any potential false positives, the more
that machine learning will pick this up and fine tune your alerts.
As your users report false positives, there’s a few features you can leverage to confirm the
validity of their concern, these are a mixture of P1 and P2 features so look carefully. As an
example. Threat explorer is a great feature to dive deeper on emails that could be malicious
and the validity of it.
• Quarantine
• Threat Explorer (Explorer)
• Email security reports
• Defender for Office 365 reports
• Mail flow insights
• Mail flow reports
Let’s fine tune some features before we start adding more pilot users
The next two steps are crucial, we’re close to completing the migration.
Once you’re happy with your Pilot, you’ve met with your pilot group and they’ve given you
the go ahead that all blockers have been resolve and they’re happy with the change
management including adoption, communication etc. Then you are ready to remove that
Pilot policy and apply it to all org
Essentially you have two steps in this section, apply the policy to all and then Turn off the
mail flow so it can now point to M365…. Turn off the SCL = 1 mailflow rule
The last step is switching your MX Record, I’ve copied the link here as this is quite a detail
steps to follow. Once you’ve done this, then you are completely Migrated. Well done!
We highly recommend for SOC team to triage alerts in the Incidents page. Incidents are a
correlation of alerts which our ML will build a story from the alerts that is calculated to be
part of a specific attack. You can view summary of the attack, see all the alerts it correlated,
view devices that are impacted, more important the recommendation on how to resolve this
incident. All of alerts from MDO, MDE, MDI, MDA, Entra (if diverted) will come into this
incidents page, so its def worth getting to know this quite well
Be Proactive
Security is a team sport and we all need to be procactive. I’ve divided each player for MDO
SOC Team. If you don’t have a playbook, use this to reference and create your own.
Security Operations Guide for Defender for Office 365 - Microsoft Defender for Office 365 |
Microsoft Learn
USERS
Microsoft Ninja Training Defender for Office 365 Ninja Training (microsoft.com)
Get started using Attack simulation training - Microsoft Defender for Office 365 | Microsoft
Learn
Once the dust settles from your MDO migration. Attack Sim needs to be part of your MDO
adoption or Phase 2 of your MDO migration. One of the coolest and critical feature of MDO.
User Education. You can have the best security tools out but if you don’t have a change -
program to adopt security, then you still have a huge gap in your security posture. Attack
Simulation is an amazing way to educate your users. We use real life phishing emails (payloads)
that users submit to Microsoft, so we use real life phishing emails to educate users. We use the
most common phishing technique to newly trending technique. The tool is integrated with your
M365, so we can leverage pulling information from M365 to simulate phishing emails.
Phase 2 - Microsoft Defender for Identity + Microsoft Entra ID
Protection (Identity, Threat, Detection and Responds (ITDR)
‘A security discipline that encompasses threat intelligence, best practices, knowledge base, tools
and processes to protect identity systems. It works by implementing detection mechanisms like
logins and access, investigating suspect posture changes and activities, and responding to
attacks to restore the integrity of the identity infrastructure’
-‘ Gartner’
In this part, we will be deploying Identity not just from an on-prem perspective with
Defender for Identity but also Entra’s Risk Based Conditional Access. ITDR isn’t new from a
solution perspective, we’ve always had solutions to cover on-prem, our cloud and 3rd party
identies, but you can safely say it’s new from a Gartner perspective in terms of classification.
Identity has been at the forefront of initial access to a company’s environment for decades,
hackers intelligently scripting new malicious actors from mimikats to solorigates to
printanightmare to the new modern attacks of human operated ransomware.
So from a Microsoft Perspective we have two key products that protects On-prem identities
and Cloud identities, so on this article we will take a look at deploying MDI from a high level
approach and Entra P2 Risk Based Policies which is the most important security feature I
believe in Entra that you can deploy…
MDI Deployment
The time deploying this product depends on how large your organisation is based on the
number of DCs, ADFS, ADCS and where I often see customers hit some delays are upgrading
some of the servers that require more specs, and the back and forth change request can slow
things down in the beginning. One of key pre-reqs we suggest is to run the sizing tool
against all your servers that you will be planning to install the sensor.
So you don’t get lost, lets take a look at how MDI architecture looks like.
We have a sensor install that you install on your DC or ADFS or ADCS. The `Sensor is a light
weight bit of code.
In the domain controller, we collect and parsed network data from the Domain Controller,
and sending that telemetry to the cloud services…. In the Domain Controller, what we’re
looking at, we have a network capture driver, which is parsing the network traffic to and from
the domain controller, looking for various authentication protocols like the Kerberos packets,
NTLM packets
Additionally, we will also parsed from Event Tracing and events - Event Tracing for Windows
(ETW) provides a mechanism to trace and log events that are raised by user-mode
applications and kernel-mode drivers. ETW is implemented in the Windows operating system
and provides developers a fast, reliable, and versatile set of event tracing features.
So Step 1…We need to ensure we have the appropriate ports opened so that cross over signals
will work from signals from DC to cloud service and resolution of any IP to name will be easier to
resolve. We only need one of these ports, more info here Prerequisites - Microsoft Defender for
Identity | Microsoft Learn
Step 2. Run that sizing tool, grab the sizing tool on this doc and also follow the instructions on
how to run it Plan capacity for deployment - Microsoft Defender for Identity | Microsoft Learn
The sizing tool determines whether your server is supported based on the Busy
Packets/Second value, which is calculated based on the 15 busiest minutes over a 24 hour
perio
Step 4. Once if you’ve confirmed that the sensor is installed and is healthy, its time to enable
the windows event collection so we can start collecting this logs to Defender. The good news is
that in the past we had to do this manually and a few months ago we’ve recently released the
NEW Powershell MDI Module, which is a god send!
The way we’ve designed and think about collecting events is we follow an Attack Kill chain flow,
which is also aligned to the MITRE Att&ck framework.
A few months ago we’ve also released some new detection for ADCS, if ADCS is prominent in
your environment, highly recommend you turn this on. ADCS has the ability to generate
password-equivalent digital certificates, AD CS servers are classified as tier-0 assets whose
compromise can be as catastrophic as a compromise to a Domain Controller itself. Despite
being a prime target, AD CS security has been largely overlooked by security products and
professionals over the years allowing cyber-criminals to continue exploiting gaps in
protection to escalate privileges, steal credentials and gain domain persistence.
To configure the MDI Windows Collection using the new Powershell Module, watch this clip
Introducing the new PowerShell Module for Microsoft Defender for Identity
• DefenderForIdentity Module
For example, the following command defines all settings for the domain, creates group policy
objects, and links them.
Once we’ve configured and run PS modules, there are few key features to go through
First one to know,e is the learning periods. It’s important to know that with MDI, there is a
learning period where some Defender for Identity alerts rely on learning periods to build a
profile of patterns, and then distinguish between legitimate and suspicious activities. Each alert
also has specific conditions within the detection logic to help distinguish between legitimate
and suspicious activities, such as alert thresholds and filtering for popular activities. You can
also switch alert into Test Mode if this is something you really want to consider switching
thresholds
Adjust alert thresholds (Preview) - Microsoft Defender for Identity | Microsoft Learn
To get a sense that your sensitive accounts are truly set as a priority for alerts, you can tag them
here to get priority on alerts. There is already a list of accounts that are automatically tag such
as Domain Admins, Admins, Power Users..
So once we’ve done our On-Prem side of protection and detection. Let’s assume you have
Entra P1-P2 Subscription
As an FYI, lets look at both P1 and P2 Features. But today we will focus on the Risk Based
Conditional Access that is featured in P2 capabilities
Identity Protection is simple to implement you just need to understand what is Risk…. We have
Risky sign-ins and Risky User. Both has mostly P2 capabilities that you need to implement
What are risks in Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn
One of the key benefits besides the o
Auto-remediate risky users and sign-ins to reduce the burden on IT admins.
Premium (P2) tenants who use RBCA remediate user risk 140X faster than P2 tenants
who don't use RBCA. And the time to remediation is 2.5 minutes for tenants using RBCA vs.
5.9 hours for tenants that don’t.
Enabling Risk Based Conditional Access can be found in entra.microsoft.com
With all Conditional Access, you can enable the policy on Report Mode first
1. Check the Users at risk widget on the Home page or the Entra ID users at risk on
the Identities > Dashboard page.
• Select View all users to review high risk identities in Microsoft Entra.
• Go to the Identities page and sort the grid to view users with
high Investigation priority scores at the top. Select an identity to view the
identity details page, including more details in the Investigation
priority widget.
The investigation priority widget includes the calculated investigation priority score
breakdown and a two-week trend for an identity, including whether the identity score is on
the high percentile for that tenant.
As an example, if Allan’s investigation priority score is high and you get an alert, you can dive
deeper in Allan’s User’s Page in Assets / Identities and look at a possible LMP
As an example, we’ve created a possible Lateral Movement story that could be a high
confidence chance that an identity has been compromised
If you have identified Allan has been compromised, we have a bunch of native response
actions we can take. This is when on-prem and cloud has that integration where if you click
on compromised this can increase Allan’s score in Entra and in turn puts his account at high
risk which will force him to reset his password if the RBCA policies have been enabled.
In order to see alerts in Defender XDR Portal from Entra activities. Ensure you have the right
settings
New ITDR Dashboard
• Intune is our recommended device management tool, SCCM is not going anywhere but
managing policies through SCCM does take a little bit more work. Not all policies are in
SCCM, in fact most advanced policies still need to be deployed via GPO
• We recommend at least 30 days to put your ASR in audit mode to help you fine tune your
policies and create exclusion where you need to.
• Passive Mode in Servers doesn’t work the same as your standard Windows 10/11. You need
to edit a registry key to manually set it in passive
• Plan your Server migration carefully, ensure capacity planning is one of your key focus to
ensure that you don’t run into issues like CPU spiking up cause you haven’t done your
capacity planning and excluding certain files or folders
Again, emphasis that this doesn’t need to be 3rd option to deploy but what we’re doing here
is following the Attack Kill Chain approach of Left to Right to protect
When we talk about MDE P2 features, we talk about these pillars below. Our bread and
butter, they’re the finest features known to any endpoint protection and I’ve managed and
deployed plenty of endpoint protection over the course of my career Security roles and I’m
not even in sales or marketing, just calling it out. Maybe because when it comes to endpoint,
Microsoft knows how to protect their own Operating System, our Security Engineers and our
Windows engineers sit next to each other to create magic. That just make sense right?
But before we jump talking about what these P2 features mean we need to onboard the
devices first to MDE
Keeping with our scenario, we are assuming that we have a customer that is migrating from
a 3rd party protection. Focusing on Windows 10/11 devices only on this document. You have
a current 3rd party, onboarding the devices to MDE doesn’t mean it will switch automatically
as your primary protection. This will run in passive mode. Only when you uninstall your 3 rd
party protection that this will automatically switch to your primary.
The Migration Process
Preparing Phase
In this phase, we simply call out it’s important that you have all your devices up to date with
windows updates/ patches and including your current 3rd party protection. Setup your
custom permissions who will get access for MDE. Depending on where you’re deploying your
policies, folks in the end user space may need to get involved.
Setup Phase
Depending on how you plan your migration, whether you do your server migration in
parallel to the end user. This is the phase you may want to consider changing the reg key so
you can set AV in passive mode.
Onboarding Phase
This Phase and the next (building new policies) are commonly where most of my customers
spend a lot of time, in some cases is due to the fact they have a mixture of Intune and SCCM
device management or they’re in a transitioning to moving everything to Intune. So
onboarding and deploying policies will need to be done in two areas. It’s important to know
the various infrastructure, what we recommend and what’s to expect. In our scenario we will
only focus on Windows Client devices but as you can see in the screenshot below, these are
the OS / mobile OS we support
Methods of Onboarding user devices - Migrate to Microsoft Defender for Endpoint - Onboard -
Microsoft Defender for Endpoint | Microsoft Learn
Onboarding Servers Onboard Windows servers to the Microsoft Defender for Endpoint service -
Microsoft Defender for Endpoint | Microsoft Learn
Onboarding Mac OS Microsoft Defender for Endpoint on Mac - Microsoft Defender for Endpoint
| Microsoft Learn
Onboarding Linux Servers Microsoft Defender for Endpoint plug-in for Windows Subsystem for
Linux (WSL) - Microsoft Defender for Endpoint | Microsoft Learn
Ok so lets dive a little deeper on onboarding and configuring MDE with Intune, as this is the our
recommendation approach and also the most common approach most of my customers are
taking. Some even using this to progress their device management migration ahead of schedule
from SCCM to Intune
Confirm the connection has been established in Intune. The sync happens once everyday
Now go back to Intune, Endpoint Security – and create a policy under Endpoint detection and
response.
Once you’ve established the pilot devices you’re testing is done, we can now start creating
our policies. Because you’re coming from a 3rd party protection you may have some idea on
what settings you want to re-create in MDE.
Our recommendation, and I personally like this approach is to reference our Microsoft
Defender for Endpoint Baseline. This baseline has been created by our top Security Experts
within Microsoft. Now, bear in mind every environment is different, so create your settings
out of this baseline may have some conflicts against your environment. So test, test and test.
Use a test group to test this against
How to create a profile and using the MDE Baseline
You will see all the settings that has been recommended, enabled. When you’re testing, it’s a
good idea to put the settings in audit mode, this will give you a chance to see what will be
affected or has been blocked. This is a stage where a lot of fine tuning happens from creating
exclusions, talking to the business to see if irrelevant macros are still running etc.
This is also a great time to study what features and settings have been recommended to turn
on, this will give you a good sense what is covered from ASR, AV, Firewall settings.
At first, it’s a good idea to use a test group (preferably your IT), this is your walk phase, then add
a little more to your pilot. Increase the numbers over time across your business. Chose your
pilot users wisely so you get a good sense that everything is being tested and being feedback to
you
Reporting. When you’re in the early stages you will be visiting the reports quite a bit. As an
example if we look at the ASR rules. This is to see what is being detected and being blocked.
Some may be relevant to your business and you will need to create exclusions.
Relevant apps are being blocked. To create a exclusion, ensure to get the path and add it toe
the exclusion list.
You can get the location you need on the bottom right.
Attack Surface Reduction - Understand and use attack surface reduction - Microsoft Defender
for Endpoint | Microsoft Learn
Endpoint Detection and Response (EDR) Overview of endpoint detection and response
capabilities - Microsoft Defender for Endpoint | Microsoft Learn
With our EDR, we have a bunch of components that make up our EDR solution, from our alerts
to incidents page where we can triage an attack, from learning about each alerts that was
correlated to this story. We can collect 6 months of data if we want to go that far
We also have a bunch of built-in native responses from scanning to isolating a device to running
a Live Response which is a remote shell to a device and you can run a bunch of commands
investigation
Auto Investigation and Remediation (AIR) Feature is one of the coolest feature and it will be one
of your SOC’s best friend. You’ll find this under Endpoint Settings.
As you may have guessed, this feature essentially remediates alerts/Incidents automatically
when an alert is triggered. You can also run AIR manually from the native respond buttons. Our
recommendation is to use the Full – remediation which gives us a higher confidence to resolve
malware and free up your SOC’s time. You can see all that’s been remediated in the Action
Center in the history tab
On the left pane under Vulnerability Management we see a number of features. Each one
highlights some sort of recommendation or update that a device or devices that are affected
by vulnerability or patch is gathered together.
Once you’ve done your last group for your pilot phase, you can assess that all the
recommendation has been actioned or at least be aware there’s still items being
recommended. You can go to Secure Score.
Defender for Endpoint onboarding Windows Server - Microsoft Defender for Endpoint |
Microsoft Learn
To onboard Windows servers to Microsoft Defender for Endpoint (MDE), you’ll need to set
specific registry keys. Here’s a general overview of the process:
1. Verify that the Windows Defender AV component is installed and running on the
server, as it’s required for MDE onboarding
2. Set the registry key for passive mode if another antivirus solution is in place. The
key is ForceDefenderPassiveMode and you should set it to 1
3. Onboard the server to MDE using the onboarding script from the MDE portal. This
script will modify the necessary registry entries, start the sensor service, and generate
event logs
4. Check the registry entries and event logs to verify successful onboarding
It’s important to note that the registry key should be set before onboarding. If you try to
change it afterward, tamper protection may prevent the modification
Here’s an example of how you might set the registry key using PowerShell:
Remember to replace the path and key name with the actual ones required for your specific
server version and scenario. Always ensure you have a backup of your registry before making
changes, and if possible, test the changes in a non-production environment first
Microsoft Defender for Endpoint demonstration scenarios - Microsoft Defender for Endpoint |
Microsoft Learn
To get a deeper understanding of how MDE works is to look at the architecture
My personal favourite out of the core Defender products. I’d say it’s the first XDR pillar out of
the Defender stack, MDA integrates with MDE, Entra, Purview, Defender XDR, and whole lot of
3rd party saas apps
Our MDA isn’t your ordinary CASB, as it does so many cool things, we’d like to call it a holistic
SAAS security. We have 5 main components that make up MDA, which we will use to adopt
and deploy MDA
In our docs, we have a tick list deployment but not necessarily in order. Which I will highlight
some key ones to get you started
Let’s dive in the Settings under Cloud Apps in Defender XDR. We will focus on a few key
must enable and consider.
Score Metric is important to set your criteria of what is acceptable for your organisation
regarding the overall Security, Compliance and Legal that applications adhere to. Say your
organisation needs to be ISO compliant, you can set the criteria for ISO to High or Very High.
With this change, you can typically sanction or unsanctioned any apps that’s got lower than
High (this is just an example). Just like Security + MFA. If an app isn’t MFA enabled, this is
something your company might feel very strongly in and increase that to a high. Just bear in
mind that putting metrics into high may rule out a lot of apps.
One very cool metric is Data Ownership which I don’t see any other CASBs (at least me). This
metric allows you to unsanctioned any apps that basically starts to own your data if you
upload data into their cloud service. Which is very important to most, if not all organisation
as they want to own their data no matter what.
Snapshot reports is simply that, it’s a sample report based on what source you may be thinking
of using to digest the data from and the point of this is to give you what results it can digest.
Again, our recommended log collector is MDE which is our native built-in agent which doesn’t
require much work to do especially if you have devices already onboarded to MDE (which at this
point, I hope you do )
So with your devices already onboarded to MDE, it’s a simple toggle. Integrate Microsoft
Defender for Endpoint - Microsoft Defender for Cloud Apps | Microsoft Learn
Once you’ve enabled MDE, the data being absorb will slowly start to be interpreted in MDA
and Cloud Discovery will start to fill up. MDA absorbs the network traffic, so as soon as users
starts to access websites, you’ll absorb all that traffic. You’ll be able to see all sorts of
information from apps, traffic of uploads
One of the first key steps you can take when rolling out MDA is to view your Saas landscape.
This is sometimes a scary moment when discovering you have 1000s of apps that are
unknown to anyone, but they’re installed on user’s devices.
You can filter your search based on acceptable score metric, what isn’t compliant etc. You
can go to the Discovered Apps and do an advanced filter to search for your criteria. You can
build a Policy out of this search and you can also create a custom action. So potentially
anything below the score of 4, you can potential unsanctioned.
On the right side of the app, you have some native response, whether sanctioning the app or
un-sanctioning it or creating a Conditional Access for it.
Another the key feature in MDA is Connected Apps. We recommend connecting at minimum
your M365 and Azure to get a deeper visibility on those platform and integrate products like
Purview and Conditional Access from Entra ID
Using an app connector, we’re able to get deeper visibility on apps, user list, data scan,
governance, app permission etc. not all apps is able to give the same visibility. Here is the full
doc on how this works
Connect apps to get visibility and control - Microsoft Defender for Cloud Apps | Microsoft
Learn
By working closely with 3rd party apps and building integration with our platform and theirs, we
need to be able to detect and respond to mis-configuration. SSPM allows us to recommend at a
deepest level when 3rd party apps are not configured correctly.
Turn on and manage SaaS security posture management (SSPM) - Microsoft Defender for Cloud
Apps | Microsoft Learn
Information Protection
I love this section of crossover platforms.
To learn more about how to deploy DLP and all the Purview stack – here’s another article
You can find all the policy templates under Cloud Apps – Policies – Policy Template
You can switch categories to see any templates that could be useful or you can also create your
own – All the template policies Control cloud apps with policies - Microsoft Defender for Cloud
Apps | Microsoft Learn
• What’s being shared publicly so you can see what’s been shared outside the business
• Apply Sensitive Info types on content throughout apps that is relevant to your
organisation, in this scenario it would be ones that we’ve used to connectors for
Applying labels across the connected apps is easy to apply. The integration with Purview would
be clear when you click on the data classification. This will showcase your label taxonomy
you’ve created when deploying Purview
Threat Protection
We have a bunch of policy template for Threat Protection. If a policy has been triggered, the
alert/s will be correlated in our alert/incidents page in Defender XDR and you can triage this
like any other incident and be able to trace the attack story.
Last of the policy templates is the integration with our very own Entra’s Conditional Access.
Conditional access app control - Microsoft Defender for Cloud Apps | Microsoft Learn
Microsoft Defender for Cloud Apps integrates with any identity provider (IdP) to deliver this
protection with access and session policies.
For example:
Use access policies to:
• Block access to Salesforce for users coming from unmanaged devices
• Block access to Dropbox for native clients.
Use session policies to:
• Block downloads of sensitive files from OneDrive to unmanaged devices
• Block uploads of malware files to SharePoint Online
Any web apps can work with access and session control. Two steps you need to do 1. Pre-
onboard the app in the Settings under Defender for Cloud Apps in Defender XDR. 2. Create a
Conditional Access session in Entra.
Creating the CA Policy in entra is very much like all the other Conditional Access.
Our last component to highlight on Defender for Cloud Apps is App Governance. Previously
an add-on to MDA, this is now included as part of your MDA subscription. Designed
specifically for oauth-enabled apps registered in Entra, Google and Salesforce. App
governance delivers visibility, remediation, and governance into how these apps and their
users access, use, and share sensitive data in Microsoft 365 and other cloud platforms
through actionable insights and automated policy alerts and actions.
By opening an app you can dig deeper if an app is compliant or you have random
permissions in this app. One for the SOC is known to have attackers apply malware onto
apps and unidentified accounts can be seen with full rights to the application. If this is a
business critical app, is something to investigate.
You can also create custom policies you feel will help govern your applications further
We have some crossover policies and policy templates turned on by default
Investigate incidents in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn
When you get an alert that is then correlated into an incident, an alert that was generated from
multiple instances from email, endpoint, to identity, you can see the whole attack story. You
can trace it back from the source and potentially run some of our native responses, isolate a
device, disable a user. You’ll be able to see all the alerts relating to the incident, the assets
impacted, investigations and evidence and resources related to the incident.
Automatic Attack Disruption (AAD)
A hero feature when all the defender products are deployed. A disruptorr when Human-
Operated Ransomware is being applied
You can see when AAD enabled by the yellow bar across the incident or see all the work in
action center if AAD is being triggered
• It uses Defender XDR's ability to correlate signals from many different sources into a
single, high-confidence incident through insights from endpoints, identities, email and
collaboration tools, and SaaS apps.
• It identifies assets controlled by the attacker and used to spread the attack.
• It automatically takes response actions across relevant Microsoft Defender products to
contain the attack in real-time by isolating affected assets.
Deployment requirements for AAD
Deployment across Defender products (e.g., Defender for Endpoint, Defender for Office 365,
Defender for Identity, and Defender for Cloud Apps)
The wider the deployment, the greater the protection coverage is. For example, if a Microsoft
Defender for Cloud Apps signal is used in a certain detection, then this product is required to
detect the relevant specific attack scenario.
Similarly, the relevant product should be deployed to execute an automated response action.
For example, Microsoft Defender for Endpoint is required to automatically contain a device.
If you’re new to KQL, we have two ways to query our schema, guided and advanced (writing
KQL from scratch). Guided query is we have a bunch of template already located in our
tables. If you want to hunt and probs threats in email or identity, you can simple go into tha
table and find the closest query. If the query you are looking for is not there, you can also go
into the queries tab and community queries which potentially could have queries that the
community has uploaded to share.
Overview - Advanced hunting - Microsoft Defender XDR | Microsoft Learn
Community Queries
Sample Queries
IdentityLogonEvents Identity
| where Timestamp > ago(7d)
| sort by Timestamp desc
IdentityLogonEvents Identity
| where Protocol == @"Kerberos“
| where isnotempty(AccountUpn)
| extend UPN_Account = split(AccountUpn,'@')[0]
| project Protocol, AccountUpn, UPN_Account
DeviceFileEvents MDE
| where FileName == 'Invoice.pdf.exe'
DeviceEvents MDE
| where ActionType =~ "ExploitGuardNetworkProtectionBlocked"
| summarize count(RemoteUrl)
by InitiatingProcessFileName, RemoteUrl,Audit_Only=tostring(parse_json(AdditionalFields).IsAudit)
| sort by count_RemoteUrl desc
Customer Detection
You can further take advantage of advance hunting queries by creating custom detection. You
can run these queries regularly, if you find matches you can then set responses like below. This
is one of those features I guess you rarely hear but I would say this is another great feature I’m
comfortable to include as part of an additional auto-remediation in
Defender XDR
This is just an FYI as I will be writing a separate article all about Sentinel. With Sentinel being
such a beast of a product, it needs to have it’s own article.
• Collect data at cloud scale across all users, devices, applications, and infrastructure,
both on-premises and in multiple clouds.
• Investigate threats with artificial intelligence, and hunt for suspicious activities at
scale, tapping into years of cyber security work at Microsoft.
We have now brought in Sentinel as part of the unified defender XDR Portal. By doing so, we
have unified the capabilities of incident management and advanced hunting. This also
reduces to switch portals for quicker responses and triaging.
Migrating to Sentinel.
We have a very comprehensive guide if you’re moving your SIEM to sentinel from Splunk to
QRadar
Again, just highlighting this product but I am looking forward to updating this document
with Sentinel and Copilot for Security at some point
Showcasing some of what copilot for security can help with triaging attacks. More CFS
prompt demos
I hope his article helps you understand Defender XDR a little more, why it’s beneficial, how
easy it is to deploy our products