INTEGRATED THREAT MANAGEMENT BROUGHT TO YOU BY WINDOWS 10 & OFFICE 365

Slides:



Advertisements
Similar presentations
Ensure a smooth transition to office 365 proplus
Advertisements

11/19/2017 9:41 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Partner for Superior Cybersecurity
Microsoft 365 Security and Compliance: Training and Resources
The time to address enterprise mobility is now
Deployment Planning Services
3 Do you monitor for unauthorized intrusion activity?
Protect your organization against external threats (Security)
Proactive Attack Prevention and Detection
Now, let’s implement/trial Windows Defender Advanced Threat Protection
“Introduction to Azure Security Center”
Secure Windows 10 with Intune, Azure AD and Configuration Manager
Accelerate GDPR compliance with Microsoft 365
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Simplifying Hybrid Cloud Protection with Azure Security Center
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Azure Information Protection Strategy and Roadmap
Configure and Manage Your Hybrid Cloud Environment at Scale
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Mapping NIST CSF and GDPR Frameworks to Microsoft Technologies
Active Cyber Security, OnDemand
Microsoft /1/2018 5:38 PM Send secure to anyone with the power of Office 365 and  Azure Information Protection Gagan Gulati Ian Hameroff.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
8/7/ :28 AM BRK3198 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
The utility belt for managing security and compliance in Office 365
Automated Response with Windows Defender ATP
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Microsoft’s Security Strategy
Office 365 with confidence: security features for Office 365
Jon Peppler, Menlo Security Channels
Microsoft Intune MAM without Device Enrollment
Security for your digital transformation
The Microsoft 365 Powered Device
Windows Defender Antivirus: Next-gen AV
Protect your organization against external threats (Security)
Protect your OneDrive and SharePoint files on mobile devices
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Ignite /20/2018 2:21 PM
SMB practice development: Security play
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Confidential – for internal only use by partners.
12/1/ :04 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Modern Windows 10 device 12/2/2018 E3 E3 P E3 P P P P E3 E3 P P P P P
SMB practice development: Security play
Secure once, run anywhere Simplify your security with Sophos
12/25/2018 5:11 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
12/29/2018 8:46 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Simplifying Security & Compliance in O365
What’s new in the Fall Creators Update for Windows Defender ATP
Healthcare Cloud Security Stack for Microsoft Azure
Create a Modern Workplace with Microsoft 365
Implementing Client Security on Windows 2000 and Windows XP Level 150
Protecting your data with Azure AD
4/3/2019 8:56 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Protection
Microsoft Virtual Academy
3 Do you monitor for unauthorized intrusion activity?
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Protect your organization against external threats (Security)
Microsoft Data Insights Summit
Information Protection
Cybersecurity Simplified: Phishing
3 Do you monitor for unauthorized intrusion activity?
Cybersecurity Simplified: Ransomware
Presentation transcript:

INTEGRATED THREAT MANAGEMENT BROUGHT TO YOU BY WINDOWS 10 & OFFICE 365 Chris Shalda Chris.Shalda@coretekservices.com Microsoft Solutions Architect Coretek Services Chris Barnes Chris.Barnes@coretekservices.com Microsoft Delivery Manager Coretek Services

Chris Shalda Chris Barnes @ShaldaChris @CBarnesConfMgr MCSE MCSE 10 years at Coretek Services 15+ years in IT Food that I cook Big juicy steak

agenda What is a Modern Threat? Anti-Virus Isn’t Sufficient?!? How Can We Protect our Organizations? Bringing All the Intelligence Together

What is a modern threat?

Common threats Phishing Malware APT (Advanced Persistent Threats)

THE ANATOMY OF AN ATTACK :) Healthy Computer User Receives Email User Lured to Malicious Site Device Infected with Malware

:) Healthy Computer User Receives Email User Lured to Malicious Site Device Infected with Malware HelpDesk Logs into Device Identity Stolen, Attacker Has Increased Privs

User Lured to Malicious Site Device Infected with Malware User Receives Email User Lured to Malicious Site Device Infected with Malware HelpDesk Logs into Device Identity Stolen, Attacker Has Increased Privs

Anti-virus isn’t sufficient?!?

Quote about Antivirus In today’s world Robert O’Callahan – Former Mozilla Developer: “Antivirus software vendors are terrible; don't buy antivirus software, and uninstall it if you already have it (except, on Windows, for Microsoft’s).” http://robert.ocallahan.org/2017/01/disable-your-antivirus-software-except.html Key facts: Many bugs with 3rd party antivirus – cause software issues Software companies can’t speak out against AV vendors, they need them to play nice Antivirus is only 1 of many layers of defense for threats today, and a small one Antivirus, by itself, is terrible protection against zero-day and emerging threats

How can we protect our organizations?

Defense in depth + Intelligence Microsoft provides many solutions that work together to provide a tight “net” to protect, detect, respond and remediate Solutions include: Office 365 Advanced Threat Protection (ATP) Windows Defender Advanced Threat Protection (WDATP) Windows 10 Enterprise E5 only! Threat Management Dashboard Microsoft Intelligent Security Graph

Microsoft protecting you 3/10/2018 12:01 AM Microsoft protecting you INTELLIGENT SECURITY GRAPH Industry Partners Antivirus Network CERTs Cyber Defense Operations Center Malware Protection Center Cyber Hunting Teams Security Response Center Digital Crimes Unit Security Center Office 365 Advanced Threat Protection Conditional Access Cloud App Security Event Management Information Protection Key Vault Windows Update Active Protection Service SmartScreen PaaS IaaS Identity Active Directory Azure Active Directory Apps and Data SaaS Infrastructure Device Advanced Threat Analytics © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Reality of end user behavior If an attacker sends emails to 100 people in your company… 23 people will open the email… 11 people will open the attachment… 6 will do this in the first hour! Reference: Verizon 2015 Data Breach Investigations Report

Office 365 atp Safe Attachments Safe Links Sandbox detonation Dynamic delivery ZAP (Zero-hour Auto Purge) Safe Links Rewrite URLs from external recipients Time of click protection New features: URL file detonation Scans links within Office documents!

Live Demo – Office 365 ATP in Action!

Windows defender atp Is meant for post-breach analysis and remediation Requires Windows 10 Enterprise E5 (or SPE E5) Cloud service Works with Windows Defender to block bad files based on hash Windows Defender can run side-by-side with other AV software Allows for quarantine/isolation of breached devices Works better together with Office 365 ATP

Onboarding

Onboarding

Onboarding

Onboarding

Onboarding

Live Demo - WDATP

Bringing all the intelligence together This is the next section

3/10/2018 12:01 AM Threat Intelligence Proactively detect advanced attacks before they reach your organization Gain insights drawn from Microsoft’s broad global presence Systematically protect your organization with dynamic policies Respond to changing malware threats in real time Get an integrated view of security through an intuitive interface © Microsoft Corporation. All rights reserved.

Introducing: Microsoft threat intelligence New portal – brings all the advanced intelligence together Your environment (Office 365 ATP + WDATP) Microsoft Intelligent Security Graph

Live Demo – Threat Intelligence Dashboard

What you can/should do Patch your systems!!! Low hanging fruit: LAPS (free) ATA (part of EM+S E3) Office 365 ATP ($2/user/month retail) Other solutions to consider: Office 365 E5 (for threat intelligence) WDATP (part of Win10 E5 or SPE E5) Credential Guard (Win10 E3/E5) EM+S E5

Resources Ten Immutable Laws Of Security (Version 2.0) WDATP Portal https://technet.microsoft.com/en-us/library/hh278941.aspx WDATP Portal https://securitycenter.windows.com WDATP – Free Trial Sign-up https://www.microsoft.com/en-us/windowsforbusiness/windows-atp WDATP – Ransomware Simulation Playbook https://www.microsoft.com/en-us/download/details.aspx?id=55090&WT.mc_id=rss_alldownloads_all Free eBook: Defending the New Perimeter https://gallery.technet.microsoft.com/eBook-Defending-the-New-dcd58679 Coretek Services Blog – Protect against the next Ransomware Worm http://www.coretekservices.com/how-to-protect-against-the-next-ransomware-worm/

Bonus Resources Office 365 Trust/Compliance Resources: Perform a risk assessment and assess the compliance of Microsoft cloud services https://www.microsoft.com/en-us/trustcenter/guidance/risk-assessment How to assess security, compliance and privacy capabilities in Office 365 https://blogs.office.com/2016/02/03/how-to-assess-security-compliance-and-privacy-capabilities-in-office- 365/ Microsoft Office 365 Mapping of Cloud Security Alliance Cloud Control Matrix 3.0.1 https://www.microsoft.com/en-us/download/details.aspx?id=50726 NIST Cybersecurity Framework: Tools and References from Microsoft – Protect Function https://blogs.technet.microsoft.com/uspartner_learning/2017/03/30/cybersecurity-framework-protect- function-map/

Related MMS Sessions Tuesday (today) Wednesday Thursday 3pm – Conditional Access from A to Z Wednesday 10am – Managing Windows 10 Security: The Changing of the Guard Thursday 8am – Ensure a Smooth Transition to Office 365 ProPlus 10am – Citrix on Azure, Office 365 ProPlus on Citrix 3pm – Securing your Identity and Protecting Against Breaches, No Matter Which Cloud