SlideShare uma empresa Scribd logo
1 de 58
Microsoft Security , Compliance and Identity Webinar Series
Fundamentals of Microsoft Security , Compliance
and Identity
Vignesh Ganesan | MCITP , MCSE , MCP , MCT & ITIL V3
Enterprise Cloud Architect & Technology Strategist
viganes@vigneshganesan.com
www.vigneshsharepointthoughts.com
www.vigneshganesan.com (under construction)
@cloudvignesh
https://www.linkedin.com/in/vignesh-ganesan-mcse-
mcsa-mct-itilv3-9246384a/
• The planned duration for this webinar is 75 minutes, and it might extend based on the questions we get
during the session .
• Questions ? Feel free to type them in the instant message window at any time. Note that any questions
you post will be public .If you want to ask a question verbally then please hold it till the Q&A session.
• This webinar is being recorded. We’ll post the recordings to our YouTube Channel
https://www.youtube.com/c/VigneshGanesan
• Join our Meetup group : https://www.meetup.com/Microsoft-365-and-Power-Platform-User-group-India/
Session Guidelines
About Myself
Introducing India Cloud Security Summit , 2021 | Aug 28th
India Cloud Security Summit , 2021 is a one-day virtual event organized by the Microsoft 365 ,
Power Platform & Cloud Security India User group . This event will completely focus on the Cloud
Security services related to Microsoft 365 , Microsoft Azure ,Microsoft Power Platform security and
Dynamics 365 . This is the first of its kind from the Microsoft Community at India and we’re
planning to cover all the aspects of Microsoft Cloud Security services in this event . In this one-day
virtual event we will deep-dive into Microsoft’s Cloud Security stack with hands-on sessions and
labs, delivered to you by the experts and community leaders.
Event site : https://www.indiacloudsecuritysummit.com/
In today’s session we will be discussing about
Microsoft Security , Compliance and Identity
only from a Microsoft 365 standpoint
Assumptions
Office 365 Administrator
SharePoint Administrator
Office 365 developer
Exchange Administrator
MS Teams Administrator
Cloud Architect
Cloud Solutions Architect
C-Suite
Which one is the hacker?
What to expect from today’s session
Microsoft 365 security
Microsoft Compliance
Building your own
Cybersecurity framework
Understanding
the big picture
and how to get
started
Microsoft Identity
Information
Rights
Management
The market is segmented and confusing
Mobile Device
& Application
Management
Cloud Access
Security
Broker
SIEM
Data Loss
Prevention
User &
Entity
Behavioral
Analytics
Mobile
Data Loss
Prevention
Threat
Detection
Identity
governance
Single-
sign on
Cloud
Data Loss
Prevention
Conditional
access
Discovery
Cloud
visibility
Secure
collaboration
Cloud
anomaly
detection
Identity & Access
Management
The market is segmented and confusing
Three main components that we will be focusing today
Microsoft Security Microsoft Identity Microsoft Compliance
Trends in security landscape
1. BCG remote work study
2. Gartner CXO survey
40%
CIOs indicate that Information
Security is a primary risk from
COVID-192
300M
Global office workers are
expected to be working
from home1
Security pillars for digital era
Data
Users Devices
Information
Protection …
Locations
Default Controls
Customer management of risk
Data classification and data accountability
Shared management of risk
Identity & access management | End point devices
Provider management of risk
Physical | Networking
Cloud customer Cloud provider
Responsibility On-Prem IaaS PaaS SaaS
Data classification
and accountability
Client & end-point
protection
Identity & access
management
Application
level controls
Network controls
Host infrastructure
Physical security
Defense in depth
multi-dimensional approach to customer environment
Physical controls, video surveillance, access control
Edge routers, firewalls, intrusion detection, vulnerability scanning
Dual-factor authentication, intrusion detection, vulnerability scanning
Access control and monitoring, anti-malware, patch and
configuration management
Secure engineering (SDL), access control and monitoring, anti-malware
Account management, training and awareness, screening
Threat and vulnerability management, security monitoring, and response,
access control and monitoring, file/data integrity, encryption
Facility
Network perimeter
Internal network
Host
Application
Admin
Data
Encryption
• Encryption is the process of making data unreadable and
unusable to unauthorized viewers.
• Encryption of data at rest
• Encryption of data in transit
• Two top-level types of encryption:
• Symmetric – uses same key to encrypt and decrypt data
• Asymmetric - uses a public key and private key pair
Hashing
• Hashing uses an algorithm to convert the original text
to a unique fixed-length hash value. Hash functions
are:
• Deterministic, the same input produces the same
output.
• A unique identifier of its associated data.
• Different to encryption in that the hashed value isn't
subsequently decrypted back to the original.
• Used to store passwords. The password is “salted” to
mitigate risk of brute-force dictionary attack.
•
Microsoft Identity
Azure AD
© Copyright Microsoft Corporation. All rights reserved.
Azure Active Directory
• Microsoft’s cloud-based identity and access management service
• Azure AD provides access to both external and internal resources
• Many similarities with Active Directory
• Features include:
• Multi-factor authentication
• Single sign-on
• Conditional Access
• Multiple license options
Comparison between Active Directory , Azure AD and Azure AD
Domain Services
Ref : https://www.ciraltos.com/active-directory-domain-service-azure-active-directory-and-azure-active-
directory-domain-service-explained/
CLOUD APPS AND SAAS SERVICES
On-premises
& web apps
MOBILE AND PERSONAL DEVICES
On-premises
& web apps
ORGANIZATION & SOCIAL IDENTITIES
On-premises
& web apps
On-premises
& web apps
Intelligent Identity Control Plane
On-premises
& web apps
Open Standards
{ JSON }
OData
2,000,000+
active apps
Azure Active Directory
Cornerstone OnDemand
Workplace by Facebook
Canvas
Concur
Salesforce
Clever
SuccessFactors
Google G Suite
Workday
ServiceNow
World’s largest enterprise IDaaS service
based on SaaS app user traffic.
Request additional integrations at aka.ms/AzureADAppRequest
A complete IAM solution
Federation Server
IDP Connector
Provisioning Engine
HR System(s)
App Proxy
Event Logs
Sign-in provider MFA Server
Directory
Database(s)
IAM Today
Authentication&
Authorization
Directory
Management
IdentityGovernance&
Administration
IdentityforIaaS
(VMAccess Management)
IdentityDeveloper
Platform
Customer
IAM
SingleSignon (SSO + Federation)
Identity Governance RBAC
Microsoft Identity Platform
Azure AD B2C / B2B
Multi-Factor
Authentication
HybridIdentity
Passwordless
Conditional Access
Provisioning
Microsoft Graph
Identity Protection
Secure HybridAccess
Group Management
Azure AD DS
Microsoft Compliance
What are your biggest challenges?
Evolving
regulations
Discovering
data
Classifying and
mapping data
Insider
risks
Responding to
audits and DSRs
Securing
data
Preventing
data leaks
Influx of data
Managing the
data lifecycle
Multiple
point solutions
Scaling workflows
and processes
Intelligent compliance and
risk management solutions
Simplify compliance
and reduce risk
Compliance
Management
Quickly investigate and
respond with relevant data
Discover &
Respond
Protect and govern
data wherever it lives
Information Protection
& Governance
Insider
Risk Management
Identify and take
action on critical
insider risks
Information Protection &
Governance
Insider Risk Management Discover & Respond Compliance Management
Solutions
Microsoft Information
protection (MIP)
Capabilities
DLP (Teams, Endpoint)
Microsoft Information
Governance (MIG)
Records Management
Communication Compliance
Core eDiscovery
Content search
Compliance Score
Insider Risk Management
Advanced Message Encryption
Customer Key
Customer Lockbox
Privileged Access Management
Compliance
Protect and govern data wherever it lives Identify and take action on insider risk
Information Barrier
Advanced Auditing
Advanced eDiscovery
Compliance Manager
Building your own Cybersecurity Framework and how to get
started
https://aka.ms/MCRA
S3
Azure Active Directory
Azure Key Vault
Azure Backup
GitHub Advanced Security – Secure development and software supply chain
Endpoint
& Server/VM
Office 365
Email and Apps
Azure
& 3rd party
clouds
Identity
Cloud &
On-Premises
SaaS
Microsoft Cloud
App Security
Azure Security Center – Cross-Platform Cloud Security Posture Management (CSPM)
Other Tools,
Logs, and
Data
Sources
B2B B2C
Azure Sentinel – Cloud Native SIEM, SOAR, and UEBA for IT, OT, and IoT
Azure AD App Proxy
Beyond User VPN
Security Documentation
Microsoft Best Practices
Top 10
Benchmarks CAF WAF
Security & Other Services
Discover
Protect
Classify
Monitor
Security &
Compliance
Policy Engine
Conditional Access App Control
Zero Trust User Access https://aka.ms/MCRA
Capability Equivalent Microsoft Product
MFA & SSO Azure AD , Azure AD SSO & Azure AD
connect
Conditional Access Azure AD Conditional Access
Privileged Identity Management Azure AD PIM
Privileged Access Management MIM PAM
RBAC Azure AD RBAC
B2B & B2C Azure AD B2B & B2C
Identity Governance Azure AD Identity Governance
Identity Protection Azure AD Identity Protection
Audit logging Azure AD Audit logs
SSPR Azure AD SSPR
Threat Protection Microsoft Defender for Identity
Identity and Access Management domain
Other players in this space
 Okta
 Ping Identity
 Oracle Active Directory Authentication
 SailPoint
 Oracle
 IBM
 ForgeRock
 Amazon IAM
 Google IAM
 Thycotic Server
 MicroFocus
 Auth0
Capability Equivalent Microsoft Product
DLP Microsoft Unified DLP
Data Discovery MCAS
Data Classification AIP/MIP
Cloud Access Security Broker MCAS
Email Security & Malware Protection EOP & Microsoft Defender for Office
365
Data Protection AIP
Office 365 Message Encryption
Advanced Message Encryption
BYOK, HYOK
Microsoft Managed key
Customer Key
Data Archive Office 365 Archive
Data Retention Office 365 retention policies and labels
Data Protection domain
Other players in this space
 Symantec
 Proofpoint
 Digital Guardian
 Titus
 Boldon James
 Zix
 Vitru
 Google
 Encase
 McAfee
 Netskope
 Bitglass
 Mimecast
Capability Equivalent Microsoft Product
Mobile Device Management (MDM) Microsoft Intune
Mobile Application Management (MAM) Microsoft Intune
Endpoint Management Microsoft Intune, Microsoft Configuration
Manager & Microsoft Endpoint Manager
Device Enrollment Microsoft Intune
Microsoft Endpoint Configuration Manager
Windows Autopilot
Device Protection Windows Analytics Device Health
Windows Hello for Business, Credential Guard
and Direct Access
Windows Information Protection and Bitlocker
Endpoint Security & Encryption Microsoft Defender for Endpoint
Microsoft Defender Antivirus and Device Guard
Device Protection domain
Other players in this space
 VMware Workspace ONE
 AirWatch
 MobileIron UEM
 Citrix Endpoint Management
 JAMF Pro
 IBM MaaS360
 IBM BigFix
Capability Equivalent Microsoft Product
Audit Logging Audit logs ( M365 Security center)
Discover & Respond ( M365 Compliance center )
SIEM Azure Sentinel
Cloud Security Posture Management Azure Security Center
Cloud Security for IOT Azure Defender
Alerts MCAS
XDR Microsoft XDR
Logging and Monitoring domain
Other players in this space
 Splunk
 IBM
 Exabeam
 Securonix
 FireEye
 McAfee
 Micro Focus
 Fortinet
 Manage Engine
Capability Equivalent Microsoft Product
Information Protection and Governance Microsoft Information Protection
DLP for Teams
Microsoft Endpoint DLP
Microsoft Information Governance
Insider Risk Management Insider Risk Management
Communication Compliance
PAM
Information Barrier
Discover and Respond Advanced eDiscovery
Advanced Audit
Compliance Management Compliance Manager
Compliance domain
Other players in this space
 Broadcom
 Proofpoint
 McAfee
 Titus
 Securonix
 Smarsh
 Dtex
 OPENTEXT
 Xterrc
 Relativity
 Brainspace
Microsoft Security , Compliance & Identity Product Portfolio
Microsoft Identity Microsoft Security Microsoft Compliance
Azure Active Directory
Azure AD Groups
External Identities
Azure AD RBAC
Administrative Units
Enterprise Appln management
Device Management
Azure AD App registrations
Identity Governance
App Proxy
Group based license mgmnt
PIM/PAM
Conditional Access
Identity Protection
Azure AD Connect
Authentication methods
Azure AD MFA
Password Protection
Identity Secure Score
Azure AD B2B/B2C
Microsoft Defender for Office 365
Microsoft Defender for Endpoint
Microsoft Defender for Identity
Microsoft Cloud App Security
Microsoft Endpoint Manager
Microsoft Unified DLP
Microsoft Information Protection
Unified Auditing
EOP
Office 365 Message Encryption
Azure Sentinel
Exchange Transport Rules
Microsoft Secure Score
Information Protection
Information Governance
Records Management
DLP
Advanced Message Encryption
Customer Key
Insider Risk Management
Communication Compliance
Customer Lockbox
Privileged Access Management
Information Barrier
eDiscovery
Advanced eDiscovery
Advanced Auditing
Compliance Manager
Microsoft Compliance Score
Conclusion
 Remote work is here to stay
 Cybersecurity is the top priority for many organizations in the new normal
 You don’t need to have a Cybersecurity background to deal with Cloud Security but understanding Cloud
and other related services is very important
 Your organization may not be a Microsoft shop but if you’re able to identity and build your own
Cybersecurity framework then your chances of becoming a Rockstar security professional is very high.
 There’s no one single person in this planet who has mastered on all cloud services and how they operate ,
so please don’t get caught up in that dogma .
Key Industry References and Resources
https://www.opengroup.org/forum/security
Zero Trust Core Principles - https://publications.opengroup.org/security-library/w210
https://www.nist.gov/cyberframework
Zero Trust Architecture - https://www.nist.gov/publications/zero-trust-architecture
https://www.cisecurity.org/cis-benchmarks/

Mais conteúdo relacionado

Mais procurados

Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...carlitocabana
 
SC-900+2022.pdf
SC-900+2022.pdfSC-900+2022.pdf
SC-900+2022.pdfRitish H
 
Microsoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxMicrosoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxBenAissaTaher1
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)Robert Crane
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionDavid J Rosenthal
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptxChrisaldyChandra
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedAlbert Hoitingh
 

Mais procurados (20)

Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Azure sentinel
Azure sentinelAzure sentinel
Azure sentinel
 
Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
 
SC-900+2022.pdf
SC-900+2022.pdfSC-900+2022.pdf
SC-900+2022.pdf
 
Microsoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxMicrosoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptx
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 

Semelhante a Fundamentals of Microsoft 365 Security , Identity and Compliance

microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMike Brannon
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxMatthew Levy
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosJenniferMete1
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
 
15th December 2016 - Microsoft Paddington Vuzion Partner Event
15th December 2016 - Microsoft Paddington Vuzion Partner Event15th December 2016 - Microsoft Paddington Vuzion Partner Event
15th December 2016 - Microsoft Paddington Vuzion Partner EventVuzion
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementBeyondTrust
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...Morgan Simonsen
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
TechTalksUtah-Sentinel-20191108.pptx
TechTalksUtah-Sentinel-20191108.pptxTechTalksUtah-Sentinel-20191108.pptx
TechTalksUtah-Sentinel-20191108.pptxJustineGarcia32
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security CenterMicrosoft
 
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...itnewsafrica
 

Semelhante a Fundamentals of Microsoft 365 Security , Identity and Compliance (20)

microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Securing your Azure Identity Infrastructure
Securing your Azure Identity InfrastructureSecuring your Azure Identity Infrastructure
Securing your Azure Identity Infrastructure
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptx
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
15th December 2016 - Microsoft Paddington Vuzion Partner Event
15th December 2016 - Microsoft Paddington Vuzion Partner Event15th December 2016 - Microsoft Paddington Vuzion Partner Event
15th December 2016 - Microsoft Paddington Vuzion Partner Event
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
TechTalksUtah-Sentinel-20191108.pptx
TechTalksUtah-Sentinel-20191108.pptxTechTalksUtah-Sentinel-20191108.pptx
TechTalksUtah-Sentinel-20191108.pptx
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security Center
 
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
 

Mais de Vignesh Ganesan I Microsoft MVP

Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceVignesh Ganesan I Microsoft MVP
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Vignesh Ganesan I Microsoft MVP
 
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...Vignesh Ganesan I Microsoft MVP
 
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...Vignesh Ganesan I Microsoft MVP
 
Skype for business to Microsoft Teams- Guidance for a successful upgrade
Skype for business to Microsoft Teams- Guidance for a successful upgradeSkype for business to Microsoft Teams- Guidance for a successful upgrade
Skype for business to Microsoft Teams- Guidance for a successful upgradeVignesh Ganesan I Microsoft MVP
 
Live events in Microsoft Teams , Yammer and Stream- When to use what
Live events in Microsoft Teams , Yammer and Stream- When to use whatLive events in Microsoft Teams , Yammer and Stream- When to use what
Live events in Microsoft Teams , Yammer and Stream- When to use whatVignesh Ganesan I Microsoft MVP
 
What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx Vignesh Ganesan I Microsoft MVP
 
Building solutions with SPFx that work across SharePoint and Teams
Building solutions with SPFx that work across SharePoint and TeamsBuilding solutions with SPFx that work across SharePoint and Teams
Building solutions with SPFx that work across SharePoint and TeamsVignesh Ganesan I Microsoft MVP
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?Vignesh Ganesan I Microsoft MVP
 
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...Vignesh Ganesan I Microsoft MVP
 
How to succesfully drive Office 365 adpotion in your organization ?
How to succesfully drive Office 365 adpotion in your organization ?How to succesfully drive Office 365 adpotion in your organization ?
How to succesfully drive Office 365 adpotion in your organization ?Vignesh Ganesan I Microsoft MVP
 
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019Vignesh Ganesan I Microsoft MVP
 
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...Vignesh Ganesan I Microsoft MVP
 
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...Vignesh Ganesan I Microsoft MVP
 

Mais de Vignesh Ganesan I Microsoft MVP (20)

Getting your enterprise ready for Microsoft 365 Copilot
Getting your enterprise ready for Microsoft 365 CopilotGetting your enterprise ready for Microsoft 365 Copilot
Getting your enterprise ready for Microsoft 365 Copilot
 
How to use Advanced eDiscovery for Microsoft Teams
How to use Advanced eDiscovery for Microsoft TeamsHow to use Advanced eDiscovery for Microsoft Teams
How to use Advanced eDiscovery for Microsoft Teams
 
Advanced eDiscovery with Microsoft Teams
Advanced eDiscovery with  Microsoft TeamsAdvanced eDiscovery with  Microsoft Teams
Advanced eDiscovery with Microsoft Teams
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory
 
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
 
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
 
Skype for business to Microsoft Teams- Guidance for a successful upgrade
Skype for business to Microsoft Teams- Guidance for a successful upgradeSkype for business to Microsoft Teams- Guidance for a successful upgrade
Skype for business to Microsoft Teams- Guidance for a successful upgrade
 
Live events in Microsoft Teams , Yammer and Stream- When to use what
Live events in Microsoft Teams , Yammer and Stream- When to use whatLive events in Microsoft Teams , Yammer and Stream- When to use what
Live events in Microsoft Teams , Yammer and Stream- When to use what
 
What's new in Microsoft Teams
What's new in Microsoft Teams What's new in Microsoft Teams
What's new in Microsoft Teams
 
What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx
 
Building solutions with SPFx that work across SharePoint and Teams
Building solutions with SPFx that work across SharePoint and TeamsBuilding solutions with SPFx that work across SharePoint and Teams
Building solutions with SPFx that work across SharePoint and Teams
 
Getting started with Microsoft Search
Getting started with Microsoft Search Getting started with Microsoft Search
Getting started with Microsoft Search
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?
 
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
 
How to succesfully drive Office 365 adpotion in your organization ?
How to succesfully drive Office 365 adpotion in your organization ?How to succesfully drive Office 365 adpotion in your organization ?
How to succesfully drive Office 365 adpotion in your organization ?
 
Overview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public PreviewOverview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public Preview
 
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
 
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
 
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Fundamentals of Microsoft 365 Security , Identity and Compliance

  • 1. Microsoft Security , Compliance and Identity Webinar Series Fundamentals of Microsoft Security , Compliance and Identity Vignesh Ganesan | MCITP , MCSE , MCP , MCT & ITIL V3 Enterprise Cloud Architect & Technology Strategist viganes@vigneshganesan.com www.vigneshsharepointthoughts.com www.vigneshganesan.com (under construction) @cloudvignesh https://www.linkedin.com/in/vignesh-ganesan-mcse- mcsa-mct-itilv3-9246384a/
  • 2. • The planned duration for this webinar is 75 minutes, and it might extend based on the questions we get during the session . • Questions ? Feel free to type them in the instant message window at any time. Note that any questions you post will be public .If you want to ask a question verbally then please hold it till the Q&A session. • This webinar is being recorded. We’ll post the recordings to our YouTube Channel https://www.youtube.com/c/VigneshGanesan • Join our Meetup group : https://www.meetup.com/Microsoft-365-and-Power-Platform-User-group-India/ Session Guidelines
  • 4. Introducing India Cloud Security Summit , 2021 | Aug 28th India Cloud Security Summit , 2021 is a one-day virtual event organized by the Microsoft 365 , Power Platform & Cloud Security India User group . This event will completely focus on the Cloud Security services related to Microsoft 365 , Microsoft Azure ,Microsoft Power Platform security and Dynamics 365 . This is the first of its kind from the Microsoft Community at India and we’re planning to cover all the aspects of Microsoft Cloud Security services in this event . In this one-day virtual event we will deep-dive into Microsoft’s Cloud Security stack with hands-on sessions and labs, delivered to you by the experts and community leaders. Event site : https://www.indiacloudsecuritysummit.com/
  • 5. In today’s session we will be discussing about Microsoft Security , Compliance and Identity only from a Microsoft 365 standpoint
  • 6. Assumptions Office 365 Administrator SharePoint Administrator Office 365 developer Exchange Administrator MS Teams Administrator Cloud Architect Cloud Solutions Architect C-Suite
  • 7. Which one is the hacker?
  • 8. What to expect from today’s session Microsoft 365 security Microsoft Compliance Building your own Cybersecurity framework Understanding the big picture and how to get started Microsoft Identity
  • 9. Information Rights Management The market is segmented and confusing Mobile Device & Application Management Cloud Access Security Broker SIEM Data Loss Prevention User & Entity Behavioral Analytics Mobile Data Loss Prevention Threat Detection Identity governance Single- sign on Cloud Data Loss Prevention Conditional access Discovery Cloud visibility Secure collaboration Cloud anomaly detection Identity & Access Management The market is segmented and confusing
  • 10. Three main components that we will be focusing today Microsoft Security Microsoft Identity Microsoft Compliance
  • 11.
  • 12. Trends in security landscape
  • 13. 1. BCG remote work study 2. Gartner CXO survey 40% CIOs indicate that Information Security is a primary risk from COVID-192 300M Global office workers are expected to be working from home1
  • 14.
  • 15. Security pillars for digital era Data Users Devices Information Protection … Locations
  • 16.
  • 17.
  • 19. Customer management of risk Data classification and data accountability Shared management of risk Identity & access management | End point devices Provider management of risk Physical | Networking Cloud customer Cloud provider Responsibility On-Prem IaaS PaaS SaaS Data classification and accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security
  • 20. Defense in depth multi-dimensional approach to customer environment Physical controls, video surveillance, access control Edge routers, firewalls, intrusion detection, vulnerability scanning Dual-factor authentication, intrusion detection, vulnerability scanning Access control and monitoring, anti-malware, patch and configuration management Secure engineering (SDL), access control and monitoring, anti-malware Account management, training and awareness, screening Threat and vulnerability management, security monitoring, and response, access control and monitoring, file/data integrity, encryption Facility Network perimeter Internal network Host Application Admin Data
  • 21. Encryption • Encryption is the process of making data unreadable and unusable to unauthorized viewers. • Encryption of data at rest • Encryption of data in transit • Two top-level types of encryption: • Symmetric – uses same key to encrypt and decrypt data • Asymmetric - uses a public key and private key pair
  • 22. Hashing • Hashing uses an algorithm to convert the original text to a unique fixed-length hash value. Hash functions are: • Deterministic, the same input produces the same output. • A unique identifier of its associated data. • Different to encryption in that the hashed value isn't subsequently decrypted back to the original. • Used to store passwords. The password is “salted” to mitigate risk of brute-force dictionary attack. •
  • 24. © Copyright Microsoft Corporation. All rights reserved. Azure Active Directory • Microsoft’s cloud-based identity and access management service • Azure AD provides access to both external and internal resources • Many similarities with Active Directory • Features include: • Multi-factor authentication • Single sign-on • Conditional Access • Multiple license options
  • 25. Comparison between Active Directory , Azure AD and Azure AD Domain Services Ref : https://www.ciraltos.com/active-directory-domain-service-azure-active-directory-and-azure-active- directory-domain-service-explained/
  • 26.
  • 27. CLOUD APPS AND SAAS SERVICES On-premises & web apps
  • 28. MOBILE AND PERSONAL DEVICES On-premises & web apps
  • 29. ORGANIZATION & SOCIAL IDENTITIES On-premises & web apps
  • 31. Intelligent Identity Control Plane On-premises & web apps
  • 33. 2,000,000+ active apps Azure Active Directory Cornerstone OnDemand Workplace by Facebook Canvas Concur Salesforce Clever SuccessFactors Google G Suite Workday ServiceNow World’s largest enterprise IDaaS service based on SaaS app user traffic. Request additional integrations at aka.ms/AzureADAppRequest
  • 34. A complete IAM solution
  • 35. Federation Server IDP Connector Provisioning Engine HR System(s) App Proxy Event Logs Sign-in provider MFA Server Directory Database(s)
  • 36. IAM Today Authentication& Authorization Directory Management IdentityGovernance& Administration IdentityforIaaS (VMAccess Management) IdentityDeveloper Platform Customer IAM SingleSignon (SSO + Federation) Identity Governance RBAC Microsoft Identity Platform Azure AD B2C / B2B Multi-Factor Authentication HybridIdentity Passwordless Conditional Access Provisioning Microsoft Graph Identity Protection Secure HybridAccess Group Management Azure AD DS
  • 38. What are your biggest challenges? Evolving regulations Discovering data Classifying and mapping data Insider risks Responding to audits and DSRs Securing data Preventing data leaks Influx of data Managing the data lifecycle Multiple point solutions Scaling workflows and processes
  • 39.
  • 40. Intelligent compliance and risk management solutions Simplify compliance and reduce risk Compliance Management Quickly investigate and respond with relevant data Discover & Respond Protect and govern data wherever it lives Information Protection & Governance Insider Risk Management Identify and take action on critical insider risks
  • 41. Information Protection & Governance Insider Risk Management Discover & Respond Compliance Management Solutions Microsoft Information protection (MIP) Capabilities DLP (Teams, Endpoint) Microsoft Information Governance (MIG) Records Management Communication Compliance Core eDiscovery Content search Compliance Score Insider Risk Management Advanced Message Encryption Customer Key Customer Lockbox Privileged Access Management Compliance Protect and govern data wherever it lives Identify and take action on insider risk Information Barrier Advanced Auditing Advanced eDiscovery Compliance Manager
  • 42. Building your own Cybersecurity Framework and how to get started
  • 43. https://aka.ms/MCRA S3 Azure Active Directory Azure Key Vault Azure Backup GitHub Advanced Security – Secure development and software supply chain Endpoint & Server/VM Office 365 Email and Apps Azure & 3rd party clouds Identity Cloud & On-Premises SaaS Microsoft Cloud App Security Azure Security Center – Cross-Platform Cloud Security Posture Management (CSPM) Other Tools, Logs, and Data Sources B2B B2C Azure Sentinel – Cloud Native SIEM, SOAR, and UEBA for IT, OT, and IoT Azure AD App Proxy Beyond User VPN Security Documentation Microsoft Best Practices Top 10 Benchmarks CAF WAF Security & Other Services Discover Protect Classify Monitor
  • 44. Security & Compliance Policy Engine Conditional Access App Control Zero Trust User Access https://aka.ms/MCRA
  • 45.
  • 46. Capability Equivalent Microsoft Product MFA & SSO Azure AD , Azure AD SSO & Azure AD connect Conditional Access Azure AD Conditional Access Privileged Identity Management Azure AD PIM Privileged Access Management MIM PAM RBAC Azure AD RBAC B2B & B2C Azure AD B2B & B2C Identity Governance Azure AD Identity Governance Identity Protection Azure AD Identity Protection Audit logging Azure AD Audit logs SSPR Azure AD SSPR Threat Protection Microsoft Defender for Identity Identity and Access Management domain
  • 47. Other players in this space  Okta  Ping Identity  Oracle Active Directory Authentication  SailPoint  Oracle  IBM  ForgeRock  Amazon IAM  Google IAM  Thycotic Server  MicroFocus  Auth0
  • 48. Capability Equivalent Microsoft Product DLP Microsoft Unified DLP Data Discovery MCAS Data Classification AIP/MIP Cloud Access Security Broker MCAS Email Security & Malware Protection EOP & Microsoft Defender for Office 365 Data Protection AIP Office 365 Message Encryption Advanced Message Encryption BYOK, HYOK Microsoft Managed key Customer Key Data Archive Office 365 Archive Data Retention Office 365 retention policies and labels Data Protection domain
  • 49. Other players in this space  Symantec  Proofpoint  Digital Guardian  Titus  Boldon James  Zix  Vitru  Google  Encase  McAfee  Netskope  Bitglass  Mimecast
  • 50. Capability Equivalent Microsoft Product Mobile Device Management (MDM) Microsoft Intune Mobile Application Management (MAM) Microsoft Intune Endpoint Management Microsoft Intune, Microsoft Configuration Manager & Microsoft Endpoint Manager Device Enrollment Microsoft Intune Microsoft Endpoint Configuration Manager Windows Autopilot Device Protection Windows Analytics Device Health Windows Hello for Business, Credential Guard and Direct Access Windows Information Protection and Bitlocker Endpoint Security & Encryption Microsoft Defender for Endpoint Microsoft Defender Antivirus and Device Guard Device Protection domain
  • 51. Other players in this space  VMware Workspace ONE  AirWatch  MobileIron UEM  Citrix Endpoint Management  JAMF Pro  IBM MaaS360  IBM BigFix
  • 52. Capability Equivalent Microsoft Product Audit Logging Audit logs ( M365 Security center) Discover & Respond ( M365 Compliance center ) SIEM Azure Sentinel Cloud Security Posture Management Azure Security Center Cloud Security for IOT Azure Defender Alerts MCAS XDR Microsoft XDR Logging and Monitoring domain
  • 53. Other players in this space  Splunk  IBM  Exabeam  Securonix  FireEye  McAfee  Micro Focus  Fortinet  Manage Engine
  • 54. Capability Equivalent Microsoft Product Information Protection and Governance Microsoft Information Protection DLP for Teams Microsoft Endpoint DLP Microsoft Information Governance Insider Risk Management Insider Risk Management Communication Compliance PAM Information Barrier Discover and Respond Advanced eDiscovery Advanced Audit Compliance Management Compliance Manager Compliance domain
  • 55. Other players in this space  Broadcom  Proofpoint  McAfee  Titus  Securonix  Smarsh  Dtex  OPENTEXT  Xterrc  Relativity  Brainspace
  • 56. Microsoft Security , Compliance & Identity Product Portfolio Microsoft Identity Microsoft Security Microsoft Compliance Azure Active Directory Azure AD Groups External Identities Azure AD RBAC Administrative Units Enterprise Appln management Device Management Azure AD App registrations Identity Governance App Proxy Group based license mgmnt PIM/PAM Conditional Access Identity Protection Azure AD Connect Authentication methods Azure AD MFA Password Protection Identity Secure Score Azure AD B2B/B2C Microsoft Defender for Office 365 Microsoft Defender for Endpoint Microsoft Defender for Identity Microsoft Cloud App Security Microsoft Endpoint Manager Microsoft Unified DLP Microsoft Information Protection Unified Auditing EOP Office 365 Message Encryption Azure Sentinel Exchange Transport Rules Microsoft Secure Score Information Protection Information Governance Records Management DLP Advanced Message Encryption Customer Key Insider Risk Management Communication Compliance Customer Lockbox Privileged Access Management Information Barrier eDiscovery Advanced eDiscovery Advanced Auditing Compliance Manager Microsoft Compliance Score
  • 57. Conclusion  Remote work is here to stay  Cybersecurity is the top priority for many organizations in the new normal  You don’t need to have a Cybersecurity background to deal with Cloud Security but understanding Cloud and other related services is very important  Your organization may not be a Microsoft shop but if you’re able to identity and build your own Cybersecurity framework then your chances of becoming a Rockstar security professional is very high.  There’s no one single person in this planet who has mastered on all cloud services and how they operate , so please don’t get caught up in that dogma .
  • 58. Key Industry References and Resources https://www.opengroup.org/forum/security Zero Trust Core Principles - https://publications.opengroup.org/security-library/w210 https://www.nist.gov/cyberframework Zero Trust Architecture - https://www.nist.gov/publications/zero-trust-architecture https://www.cisecurity.org/cis-benchmarks/