SlideShare a Scribd company logo
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
The Security Dilemma
Defence in Depth
Thr30117 - Securely logging to Microsoft 365
300%
increase in identity attacks
over the past year.
Phishing
23M
high risk enterprise sign-in
attempts detected in March 2018
Password
Spray
350K
compromised accounts
detected in April 2018
lllllllll
Breach
Replay
4.6Battacker-driven sign-ins
detected in May 2018
lllllllll
devices datausers apps
On-premises /
Private cloud
Firewall used to be the
Security Perimeter
Thr30117 - Securely logging to Microsoft 365
$$
Office 365
On-
premises
The challenge of securing your environment
The digital estate offers
a very broad surface
area that is difficult to
secure
Bad actors are using
increasingly creative
and sophisticated
attacks
Intelligent correlation
and action on signals is
difficult, time-consuming,
and expensive
PCs, tablets, mobile
Office 365 Data Loss PreventionWindows Information Protection
& BitLocker for Windows 10
Azure Information Protection
Exchange Online,
SharePoint Online,
Skype for Business &
OneDrive for Business
Highly
regulated
Microsoft Intune MDM & MAM
for Windows, iOS & Android Microsoft Cloud App Security
Office 365 Advanced Data Governance
Azure
Information
Protection
Comprehensive protection of sensitive data across devices, cloud services, and on-premises
Windows 10 Office 365 EM+S & Cloud
Services
Advanced Device
Management
Unique insights, informed by trillions of signals
Where should you start?
Thr30117 - Securely logging to Microsoft 365
Azure AD as the control point
Active Directory
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Tenant branding
✓ Enable Multi-factor authentication
for Office 365 users
✓ Secure your Office 365
environments from leaked
credentials
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
How long does Azure AD store the data?
How long does Azure AD store reporting data? - https://docs.microsoft.com/en-us/azure/active-directory/reports-
monitoring/reference-reports-data-retention
Thr30117 - Securely logging to Microsoft 365
Protection Alerts
https://protection.office.com/alertpolicies
Activity Alerts
https://protection.office.com/managealerts
Microsoft Cloud App
Security
What is Microsoft CAS ?
A multi-mode Cloud Access Security Broker
Insights into threats to identity and data
Raise alerts on user or file behavior anomalies in cloud apps
leveraging their API connectors
In scope for this engagement (with Office 365)
Ability to respond to detected threats, discover shadow IT
usage and configure application monitoring and control
Out of scope for this engagement
Requirements
Available to organizations with an Azure tenant or an Office 365
commercial subscription and who are in the multi-tenant and Office
365 U.S. Government Community cloud
Cloud App Security Alerts
https://portal.cloudappsecurity.com/#/alerts
Unusual file share activity
Unusual file download
Unusual file deletion activity
Ransomware activity
Data exfiltration to unsanctioned apps
Activity by a terminated employee
Indicators of a
compromised session
Malicious use of
an end-user account
Suspicious inbox rules (delete, forward)
Malware implanted in cloud apps
Malicious OAuth application
Multiple failed login attempts to app
Threat delivery
and persistence
!
!
!
Unusual impersonated activity
Unusual administrative activity
Unusual multiple delete VM activity
Malicious use of
a privileged user
Activity from suspicious IP addresses
Activity from anonymous IP addresses
Activity from an infrequent country
Impossible travel between sessions
Logon attempt from a suspicious user agent
Thr30117 - Securely logging to Microsoft 365
Azure Active Directory
Identity Protection
What is Azure Active Directory Identity Protection?
Identity threat detection system with proactive, AI-enhanced
automatic protection capabilities
Insights into threats to identity
Detect threats to user’s identity such as compromised Azure
Active Directory credentials or when someone other than the
account owner is attempting to sign in using their identity
In scope for this engagement
Ability to automatically respond to detected threats
Out of scope for this engagement
Requirements
Available to organizations with an Azure tenant or
an Office 365 commercial subscription and who are in the multi-
tenant and Office 365 U.S. Government Community clouds
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Require MFA
Allow access
Deny access
Force
password reset******
Limit access
Controls
On-premises apps
Web apps
Users
Devices
Location
Apps
Conditions
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
Azure AD Identity Protection + Azure AD conditional access
Maximize Security. Maximize Productivity.
Machine
learning
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
Azure Sentinel
What is Azure Sentinel?
Microsoft Azure Sentinel is a scalable, cloud-native, security
information event management (SIEM) and security
orchestration automated response (SOAR) solution
Insights into threats
Get a birds-eye view across all data ingested and detect threats
using Microsoft's analytics and threat intelligence. Investigate
threats with artificial intelligence and hunt for suspicious activities
In scope for this engagement
Ability to automatically respond to detected threats
Out of scope for this engagement
Requirements
Available to organizations with an Azure tenant
Azure Sentinel
Thr30117 - Securely logging to Microsoft 365
Resources
• Cyber Security: The Small Business Best Practice Guide -
https://www.asbfeo.gov.au/sites/default/files/documents/ASBFEO-cyber-security-research-report.pdf
• Australian Cyber Security Centre - https://www.cyber.gov.au/
• Office 365 Security and Compliance - https://docs.microsoft.com/en-
us/office365/securitycompliance/
• Microsoft Trust Center - https://www.microsoft.com/en-us/trustcenter/security/office365-security
• Microsoft Secure Score - https://docs.microsoft.com/en-us/office365/securitycompliance/microsoft-
secure-score
• Microsoft 365 for Partners Security - https://www.microsoft.com/microsoft-365/partners/security
• What are Security defaults - https://docs.microsoft.com/en-gb/azure/active-
directory/fundamentals/concept-fundamentals-security-defaults
• Introducing conditional access for Office 365 - https://techcommunity.microsoft.com/t5/azure-active-
directory-identity/introducing-conditional-access-for-the-office-365-suite/ba-p/1131979
Email : director@ciaops.com
Twitter : @directorcia
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365

More Related Content

PDF
How to get deeper administration insights into your tenant
PDF
Securely logging to Microsoft 365
PDF
Microsoft Office 365 Security and Compliance
PDF
December 2019 Microsoft 365 Need to Know Webinar
PDF
An introduction to Office 365 Advanced Threat Protection (ATP)
PDF
Microsoft Office 365 Advanced Threat Protection
PPTX
Office 365 Security Best Practices
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
How to get deeper administration insights into your tenant
Securely logging to Microsoft 365
Microsoft Office 365 Security and Compliance
December 2019 Microsoft 365 Need to Know Webinar
An introduction to Office 365 Advanced Threat Protection (ATP)
Microsoft Office 365 Advanced Threat Protection
Office 365 Security Best Practices
Identity and Data protection with Enterprise Mobility Security in ottica GDPR

What's hot (20)

PPTX
Securing Governing and Protecting Your Office 365 Investments
PDF
Management of all the devices using Microsoft 365 Business
PPTX
2 Modern Security - Microsoft Information Protection
PDF
Office 365 smb guidelines for pure bookkeeping (slideshare)
PDF
Azure Information Protection
PDF
Microsoft EMS Enterprise Mobility and Security Architecture Poster
PPTX
1 Modern Security - Keynote
PDF
Microsoft Cloud App Security CASB
PPTX
Security O365 Using AI-based Advanced Threat Protection
PPTX
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
PDF
File Security in Microsoft SharePoint and OneDrive
PPTX
Microsoft Threat Protection
PPTX
Windows Advance Threats - BSides Amman 2019
PPTX
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
PPTX
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
PPTX
4 Modern Security - Integrated SecOps and incident response with MTP
PDF
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
PPTX
cyber-security-reference-architecture
PPTX
Codeless Security for the Apps You Buy & Build on AWS
PPTX
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Securing Governing and Protecting Your Office 365 Investments
Management of all the devices using Microsoft 365 Business
2 Modern Security - Microsoft Information Protection
Office 365 smb guidelines for pure bookkeeping (slideshare)
Azure Information Protection
Microsoft EMS Enterprise Mobility and Security Architecture Poster
1 Modern Security - Keynote
Microsoft Cloud App Security CASB
Security O365 Using AI-based Advanced Threat Protection
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
File Security in Microsoft SharePoint and OneDrive
Microsoft Threat Protection
Windows Advance Threats - BSides Amman 2019
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
4 Modern Security - Integrated SecOps and incident response with MTP
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
cyber-security-reference-architecture
Codeless Security for the Apps You Buy & Build on AWS
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Ad

Similar to Thr30117 - Securely logging to Microsoft 365 (20)

PDF
Cloud App Security Customer Presentation.pdf
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PDF
Secure remote work
PPTX
Securing your Organization with Microsoft 365
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PDF
do you want to know about what is Microsoft Sentinel.pdf
PPTX
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
PDF
Msft cloud architecture_security_commonattacks
PDF
Microsoft threat protection + wdatp+ aatp overview
PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PDF
Microsoft 365 Security Overview
PPTX
20181213 - wazug protecting your data with azure ad
PDF
Turning the tables talk delivered at CCISDA conference
PDF
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
PPTX
Microsoft Cloud Application Security Overview
PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PDF
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
PDF
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
PPTX
Secure Modern Workplace With Microsoft 365 Threat Protection
Cloud App Security Customer Presentation.pdf
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Secure remote work
Securing your Organization with Microsoft 365
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
do you want to know about what is Microsoft Sentinel.pdf
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Msft cloud architecture_security_commonattacks
Microsoft threat protection + wdatp+ aatp overview
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Microsoft 365 Security Overview
20181213 - wazug protecting your data with azure ad
Turning the tables talk delivered at CCISDA conference
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
Microsoft Cloud Application Security Overview
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
3 Modern Security - Secure identities to reach zero trust with AAD
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Secure Modern Workplace With Microsoft 365 Threat Protection
Ad

More from Robert Crane (20)

PDF
202310
PDF
September 2023 CIAOPS Need to Know Webinar
PDF
August 2023 CIAOPS Need to Know Webinar
PDF
July 2023 CIAOPS Need to Know Webinar
PDF
June 2023 CIAOPS Need to Know Webinar
PDF
May 2023 CIAOPS Need to Know Webinar
PDF
April 2023 CIAOPS Need to Know Webinar
PDF
March 2023 CIAOPS Need to Know Webinar
PDF
January 2023 CIAOPS Need to Know Webinar
PDF
December 2022 CIAOPS Need to Know Webinar
PDF
November 2022 CIAOPS Need to Know Webinar
PDF
October 2022 CIAOPS Need to Know Webinar
PDF
September 2022 CIAOPS Need to Know Webinar
PDF
August 2022 CIAOPS Need to Know Webinar
PDF
July 2022 CIAOPS Need to Know Webinar
PDF
June 2022 CIAOPS Need to Know Webinar
PDF
May 2022 CIAOPS Need to Know Webinar
PDF
April 2022 CIAOPS Need to Know Webinar
PDF
An introduction to Defender for Business
PDF
March 2022 CIAOPS Need to Know Webinar
202310
September 2023 CIAOPS Need to Know Webinar
August 2023 CIAOPS Need to Know Webinar
July 2023 CIAOPS Need to Know Webinar
June 2023 CIAOPS Need to Know Webinar
May 2023 CIAOPS Need to Know Webinar
April 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
January 2023 CIAOPS Need to Know Webinar
December 2022 CIAOPS Need to Know Webinar
November 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know Webinar
September 2022 CIAOPS Need to Know Webinar
August 2022 CIAOPS Need to Know Webinar
July 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know Webinar
May 2022 CIAOPS Need to Know Webinar
April 2022 CIAOPS Need to Know Webinar
An introduction to Defender for Business
March 2022 CIAOPS Need to Know Webinar

Recently uploaded (20)

PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Introduction to the IoT system, how the IoT system works
PDF
The Internet -By the Numbers, Sri Lanka Edition
DOCX
Unit-3 cyber security network security of internet system
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Introduction to Information and Communication Technology
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPT
tcp ip networks nd ip layering assotred slides
Introuction about WHO-FIC in ICD-10.pptx
Module 1 - Cyber Law and Ethics 101.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Introduction to the IoT system, how the IoT system works
The Internet -By the Numbers, Sri Lanka Edition
Unit-3 cyber security network security of internet system
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Power Point - Lesson 3_2.pptx grad school presentation
Introduction to Information and Communication Technology
Paper PDF World Game (s) Great Redesign.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
tcp ip networks nd ip layering assotred slides

Thr30117 - Securely logging to Microsoft 365

  • 6. 300% increase in identity attacks over the past year. Phishing 23M high risk enterprise sign-in attempts detected in March 2018 Password Spray 350K compromised accounts detected in April 2018 lllllllll Breach Replay 4.6Battacker-driven sign-ins detected in May 2018 lllllllll
  • 7. devices datausers apps On-premises / Private cloud Firewall used to be the Security Perimeter
  • 10. The challenge of securing your environment The digital estate offers a very broad surface area that is difficult to secure Bad actors are using increasingly creative and sophisticated attacks Intelligent correlation and action on signals is difficult, time-consuming, and expensive
  • 11. PCs, tablets, mobile Office 365 Data Loss PreventionWindows Information Protection & BitLocker for Windows 10 Azure Information Protection Exchange Online, SharePoint Online, Skype for Business & OneDrive for Business Highly regulated Microsoft Intune MDM & MAM for Windows, iOS & Android Microsoft Cloud App Security Office 365 Advanced Data Governance Azure Information Protection Comprehensive protection of sensitive data across devices, cloud services, and on-premises Windows 10 Office 365 EM+S & Cloud Services Advanced Device Management
  • 12. Unique insights, informed by trillions of signals
  • 15. Azure AD as the control point Active Directory
  • 21. ✓ Enable Multi-factor authentication for Office 365 users ✓ Secure your Office 365 environments from leaked credentials
  • 26. How long does Azure AD store the data? How long does Azure AD store reporting data? - https://docs.microsoft.com/en-us/azure/active-directory/reports- monitoring/reference-reports-data-retention
  • 30. Microsoft Cloud App Security What is Microsoft CAS ? A multi-mode Cloud Access Security Broker Insights into threats to identity and data Raise alerts on user or file behavior anomalies in cloud apps leveraging their API connectors In scope for this engagement (with Office 365) Ability to respond to detected threats, discover shadow IT usage and configure application monitoring and control Out of scope for this engagement Requirements Available to organizations with an Azure tenant or an Office 365 commercial subscription and who are in the multi-tenant and Office 365 U.S. Government Community cloud
  • 31. Cloud App Security Alerts https://portal.cloudappsecurity.com/#/alerts
  • 32. Unusual file share activity Unusual file download Unusual file deletion activity Ransomware activity Data exfiltration to unsanctioned apps Activity by a terminated employee Indicators of a compromised session Malicious use of an end-user account Suspicious inbox rules (delete, forward) Malware implanted in cloud apps Malicious OAuth application Multiple failed login attempts to app Threat delivery and persistence ! ! ! Unusual impersonated activity Unusual administrative activity Unusual multiple delete VM activity Malicious use of a privileged user Activity from suspicious IP addresses Activity from anonymous IP addresses Activity from an infrequent country Impossible travel between sessions Logon attempt from a suspicious user agent
  • 34. Azure Active Directory Identity Protection What is Azure Active Directory Identity Protection? Identity threat detection system with proactive, AI-enhanced automatic protection capabilities Insights into threats to identity Detect threats to user’s identity such as compromised Azure Active Directory credentials or when someone other than the account owner is attempting to sign in using their identity In scope for this engagement Ability to automatically respond to detected threats Out of scope for this engagement Requirements Available to organizations with an Azure tenant or an Office 365 commercial subscription and who are in the multi- tenant and Office 365 U.S. Government Community clouds
  • 38. Require MFA Allow access Deny access Force password reset****** Limit access Controls On-premises apps Web apps Users Devices Location Apps Conditions Policies Real time Evaluation Engine Session Risk 3 40TB Effective policy Azure AD Identity Protection + Azure AD conditional access Maximize Security. Maximize Productivity. Machine learning
  • 41. Azure Sentinel What is Azure Sentinel? Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution Insights into threats Get a birds-eye view across all data ingested and detect threats using Microsoft's analytics and threat intelligence. Investigate threats with artificial intelligence and hunt for suspicious activities In scope for this engagement Ability to automatically respond to detected threats Out of scope for this engagement Requirements Available to organizations with an Azure tenant
  • 44. Resources • Cyber Security: The Small Business Best Practice Guide - https://www.asbfeo.gov.au/sites/default/files/documents/ASBFEO-cyber-security-research-report.pdf • Australian Cyber Security Centre - https://www.cyber.gov.au/ • Office 365 Security and Compliance - https://docs.microsoft.com/en- us/office365/securitycompliance/ • Microsoft Trust Center - https://www.microsoft.com/en-us/trustcenter/security/office365-security • Microsoft Secure Score - https://docs.microsoft.com/en-us/office365/securitycompliance/microsoft- secure-score • Microsoft 365 for Partners Security - https://www.microsoft.com/microsoft-365/partners/security • What are Security defaults - https://docs.microsoft.com/en-gb/azure/active- directory/fundamentals/concept-fundamentals-security-defaults • Introducing conditional access for Office 365 - https://techcommunity.microsoft.com/t5/azure-active- directory-identity/introducing-conditional-access-for-the-office-365-suite/ba-p/1131979