Mastering Configuration in Defender for Office 365 - Part Three

Published Nov 01 2021 09:00 AM 5,571 Views
Microsoft

This blog is the final installment of a three-part series detailing the journey we’re on to simplify configuration of threat protection capabilities in Office 365 to enable best-in class protection for our customers.

 

In the previous blog in this series, we took a closer look at capabilities we have enabled to keep customers secure by addressing the legacy override problem. In this blog, we will share additional measures we are taking to prevent inadvertent gaps in protection coverage for your organization.


The Motivation: Inadvertent Configuration Gaps

As the threat landscape continues to evolve, Microsoft is focused on innovating and developing solutions to ensure users are protected. In email security, we regularly release new security controls and update existing controls that customers can enable, to keep their users secure.

 

However, we often find gaps in protection coverage within organizations. Some security controls are inadvertently overlooked, and as a result some or all users are left with incomplete protection. We have lots of great protection features available to customers in Microsoft Defender for Office 365 that we don’t want customers to miss out on. Not turning on these key protection features can lead to unintentionally allowing malicious messages, such as phishing messages, to be delivered to their inbox. And that in turn puts the organization at greater risk for breaches.

 

For this reason, we’ve been hard at work to help customers get and stay secure with maximal ease.


Introducing Built-In-Protection

A few months ago, we released preset security policies to make it easy for customers to get and stay secure on the latest policy recommendations for Defender for Office 365. To learn more about preset security policies, please check out our blog: Mastering Configuration Part One (microsoft.com). All customers had to do was specify the users to associate with the right template, and the users would be protected with current and new protection layers.

 

Today, we’re making things even easier by introducing a powerful default security preset: Built-In-Protection in Defender for Office 365.

 

Built-In-Protection is a third preset security policy (like the Standard and Strict preset policies), but it’s enabled by default for all new and existing customers and requires no security admin action. It will implement a version of Safe Links and Safe Attachments that results in low impact on the end-user. The goal is to provide organizations with an immediate bump in protection across their tenants and to ensure all Defender for Office 365 customers have the protection they need without having to think about it.

 

Sundeep_Saini_0-1635745002803.png

 

Maximizing default protections, with low impact risk

Built-In-Protection enables time-of-delivery detonation of files and URLs as well as time-of-click protections. Given our goal to be low impact to end users while enabling these key protections, Safe Links URL wrapping will be disabled. We are also enabling Safe Links protections for Teams in Built-In-Protection. To learn more about Safe Links for Teams, please check out our blog: Announcing General Availability of Safe Links for Microsoft Teams. Built-In-Protection does not impact users who already have a Safe Links or Safe Attachments policy in place. This means that if a user is already covered under the standard or strict preset; or under an explicit custom policy, the built-in preset will not have an impact on her, because this policy has the lowest priority.

 

Policies will be applied in the following order of precedence:

  1. Strict
  2. Standard
  3. Custom
  4. Built-in-Protection or default

This also means that if additional domains are added to your tenant, they will be automatically protected through Built-In-Protection with a base level of Safe Links and Safe Attachment. This reduces the administrative burden and time involved in getting around to protecting these users, as they get instant protection under the Built-in preset.

 

The role of Built-In-Protection

Built-In-Protection is intended to address gaps in protection coverage. It also gives an immediate uplift in the default level of protection for unprotected users, by automatically turning on some powerful low-impact features. And that’s a great step in improving the overall security posture of the organization, while reducing the potential of a breach.

 

That said, we definitely want administrators to proceed (hopefully quickly) to adopt one of the other security presets. These other presets (standard and strict) include coverage of other security features that bolster the level of protection even more.


Rollout of Built-In-Protection

We will gradually roll out Built-In-Protection worldwide starting in November and through the end of this year. We will also release the option to configure exceptions in the Microsoft 365 Defender portal ahead of enabling the Built-In-Protection policy. Although we do not recommend it, we recognize the need for some organizations to exclude certain users or groups from Built-In-Protection and admins will have the opportunity to configure these exceptions. We will communicate specific rollout dates for your tenant via Microsoft Admin Message Center Posts. Stay tuned!

 

Learn more:

Do you have questions or feedback about Microsoft Defender for Office 365? Engage with the community and Microsoft experts in the Defender for Office 365 forum.

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2906990%22%20slang%3D%22en-US%22%3EMastering%20Configuration%20in%20Defender%20for%20Office%20365%20-%20Part%20Three%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2906990%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EThis%20blog%20is%20the%20final%20installment%20of%20a%20three-part%20series%20detailing%20the%20journey%20we%E2%80%99re%20on%20to%20simplify%20configuration%20of%20threat%20protection%20capabilities%20in%20Office%20365%20to%20enable%20best-in%20class%20protection%20for%20our%20customers.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-office%2Fmastering-configuration-in-defender-for-office-365-part-two%2Fba-p%2F2307134%22%20target%3D%22_blank%22%3Eprevious%20blog%3C%2FA%3E%20in%20this%20series%2C%20we%20took%20a%20closer%20look%20at%20capabilities%20we%20have%20enabled%20to%20keep%20customers%20secure%20by%20addressing%20the%20legacy%20override%20problem.%20In%20this%20blog%2C%20we%20will%20share%20additional%20measures%20we%20are%20taking%20to%20prevent%20inadvertent%20gaps%20in%20protection%20coverage%20for%20your%20organization.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3EThe%20Motivation%3A%20Inadvertent%20Configuration%20Gaps%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAs%20the%20threat%20landscape%20continues%20to%20evolve%2C%20Microsoft%20is%20focused%20on%20innovating%20and%20developing%20solutions%20to%20ensure%20users%20are%20protected.%20In%20email%20security%2C%20we%20regularly%20release%20new%20security%20controls%20and%20update%20existing%20controls%20that%20customers%20can%20enable%2C%20to%20keep%20their%20users%20secure.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHowever%2C%20we%20often%20find%20gaps%20in%20protection%20coverage%20within%20organizations.%20Some%20security%20controls%20are%20inadvertently%20overlooked%2C%20and%20as%20a%20result%20some%20or%20all%20users%20are%20left%20with%20incomplete%20protection.%20We%20have%20lots%20of%20great%20protection%20features%20available%20to%20customers%20in%20Microsoft%20Defender%20for%20Office%20365%20that%20we%20don%E2%80%99t%20want%20customers%20to%20miss%20out%20on.%20Not%20turning%20on%20these%20key%20protection%20features%20can%20lead%20to%20unintentionally%20allowing%20malicious%20messages%2C%20such%20as%20phishing%20messages%2C%20to%20be%20delivered%20to%20their%20inbox.%20And%20that%20in%20turn%20puts%20the%20organization%20at%20greater%20risk%20for%20breaches.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20this%20reason%2C%20we%E2%80%99ve%20been%20hard%20at%20work%20to%20help%20customers%20get%20and%20stay%20secure%20with%20maximal%20ease.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CBR%20%2F%3EIntroducing%20Built-In-Protection%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EA%20few%20months%20ago%2C%20we%20released%20preset%20security%20policies%20to%20make%20it%20easy%20for%20customers%20to%20get%20and%20stay%20secure%20on%20the%20latest%20policy%20recommendations%20for%20Defender%20for%20Office%20365.%20To%20learn%20more%20about%20preset%20security%20policies%2C%20please%20check%20out%20our%20blog%3A%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-office%2Fmastering-configuration-in-defender-for-office-365-part-one%2Fba-p%2F2300064%22%20target%3D%22_blank%22%3EMastering%20Configuration%20Part%20One%20(microsoft.com)%3C%2FA%3E.%20All%20customers%20had%20to%20do%20was%20specify%20the%20users%20to%20associate%20with%20the%20right%20template%2C%20and%20the%20users%20would%20be%20protected%20with%20current%20and%20new%20protection%20layers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%2C%20we%E2%80%99re%20making%20things%20even%20easier%20by%20introducing%20a%20powerful%20%3CEM%3E%3CU%3Edefault%3C%2FU%3E%3C%2FEM%3E%20security%20preset%3A%20Built-In-Protection%20in%20Defender%20for%20Office%20365.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBuilt-In-Protection%26nbsp%3Bis%20a%20third%20preset%20security%20policy%20(like%20the%20Standard%20and%20Strict%20preset%20policies)%2C%20but%20it%E2%80%99s%20enabled%20by%20default%20for%20all%20new%20and%20existing%20customers%20and%20requires%20no%20security%20admin%20action.%20It%20will%20implement%20a%20version%20of%20Safe%20Links%20and%20Safe%20Attachments%20that%20results%20in%20low%20impact%20on%20the%20end-user.%20The%20goal%20is%20to%20provide%20organizations%20with%20an%20immediate%20bump%20in%20protection%20across%20their%20tenants%20and%20to%20ensure%20all%20Defender%20for%20Office%20365%20customers%20have%20the%20protection%20they%20need%20without%20having%20to%20think%20about%20it.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Sundeep_Saini_0-1635745002803.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F322069i22C4EBAE409E312B%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Sundeep_Saini_0-1635745002803.png%22%20alt%3D%22Sundeep_Saini_0-1635745002803.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMaximizing%20default%20protections%2C%20with%20low%20impact%20risk%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EBuilt-In-Protection%20enables%20time-of-delivery%20detonation%20of%20files%20and%20URLs%20as%20well%20as%20time-of-click%20protections.%20Given%20our%20goal%20to%20be%20low%20impact%20to%20end%20users%20while%20enabling%20these%20key%20protections%2C%20Safe%20Links%20URL%20wrapping%20will%20be%20disabled.%20We%20are%20also%20enabling%20Safe%20Links%20protections%20for%20Teams%20in%20Built-In-Protection.%20To%20learn%20more%20about%20Safe%20Links%20for%20Teams%2C%20please%20check%20out%20our%20blog%3A%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-office%2Fmicrosoft-teams-gets-more-phishing-protection%2Fba-p%2F2585559%22%20target%3D%22_blank%22%3EAnnouncing%20General%20Availability%20of%20Safe%20Links%20for%20Microsoft%20Teams%3C%2FA%3E.%20Built-In-Protection%20does%20not%20impact%20users%20who%20already%20have%20a%20Safe%20Links%20or%20Safe%20Attachments%20policy%20in%20place.%20This%20means%20that%20if%20a%20user%20is%20already%20covered%20under%20the%20standard%20or%20strict%20preset%3B%20or%20under%20an%20explicit%20custom%20policy%2C%20the%20built-in%20preset%20will%20not%20have%20an%20impact%20on%20her%2C%20because%20this%20policy%20has%20the%20lowest%20priority.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPolicies%20will%20be%20applied%20in%20the%20following%20order%20of%20precedence%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EStrict%3C%2FLI%3E%0A%3CLI%3EStandard%3C%2FLI%3E%0A%3CLI%3ECustom%3C%2FLI%3E%0A%3CLI%3EBuilt-in-Protection%20or%20default%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EThis%20also%20means%20that%20if%20additional%20domains%20are%20added%20to%20your%20tenant%2C%20they%20will%20be%20automatically%20protected%20through%20Built-In-Protection%20with%20a%20base%20level%20of%20Safe%20Links%20and%20Safe%20Attachment.%20This%20reduces%20the%20administrative%20burden%20and%20time%20involved%20in%20getting%20around%20to%20protecting%20these%20users%2C%20as%20they%20get%20instant%20protection%20under%20the%20Built-in%20preset.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EThe%20role%20of%20Built-In-Protection%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EBuilt-In-Protection%20is%20intended%20to%20address%20gaps%20in%20protection%20coverage.%20It%20also%20gives%20an%20immediate%20uplift%20in%20the%20default%20level%20of%20protection%20for%20unprotected%20users%2C%20by%20automatically%20turning%20on%20some%20powerful%20low-impact%20features.%20And%20that%E2%80%99s%20a%20great%20step%20in%20improving%20the%20overall%20security%20posture%20of%20the%20organization%2C%20while%20reducing%20the%20potential%20of%20a%20breach.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThat%20said%2C%20we%20definitely%20want%20administrators%20to%20proceed%20(hopefully%20quickly)%20to%20adopt%20one%20of%20the%20other%20security%20presets.%20These%20other%20presets%20(standard%20and%20strict)%20include%20coverage%20of%20other%20security%20features%20that%20bolster%20the%20level%20of%20protection%20even%20more.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3ERollout%20of%20Built-In-Protection%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20will%20gradually%20roll%20out%20Built-In-Protection%20worldwide%20starting%20in%20November%20and%20through%20the%20end%20of%20this%20year.%20We%20will%20also%20release%20the%20option%20to%20configure%20exceptions%20in%20the%20Microsoft%20365%20Defender%20portal%20ahead%20of%20enabling%20the%20Built-In-Protection%20policy.%20Although%20we%20do%20not%20recommend%20it%2C%20we%20recognize%20the%20need%20for%20some%20organizations%20to%20exclude%20certain%20users%20or%20groups%20from%20Built-In-Protection%20and%20admins%20will%20have%20the%20opportunity%20to%20configure%20these%20exceptions.%20We%20will%20communicate%20specific%20rollout%20dates%20for%20your%20tenant%20via%20Microsoft%20Admin%20Message%20Center%20Posts.%20Stay%20tuned!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELearn%20more%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EPreset%20Security%20Policies%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fpreset-security-policies%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPreset%20security%20policies%20-%20Office%20365%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ESafe%20Links%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fsafe-links%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EComplete%20Safe%20Links%20overview%20for%20Microsoft%20Defender%20for%20Office%20365%20-%20Office%20365%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ESafe%20Attachments%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fsafe-attachments%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESafe%20Attachments%20-%20Office%20365%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EDo%20you%20have%20questions%20or%20feedback%20about%20Microsoft%20Defender%20for%20Office%20365%3F%20Engage%20with%20the%20community%20and%20Microsoft%20experts%20in%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMDOForum%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDefender%20for%20Office%20365%20forum%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2906990%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Mastering%20Configuration%20title%20slide.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F322075i77A864718A44126E%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Mastering%20Configuration%20title%20slide.jpg%22%20alt%3D%22Mastering%20Configuration%20title%20slide.jpg%22%20%2F%3E%3C%2FSPAN%3EThis%20blog%20is%20the%20final%20installment%20of%20a%20three-part%20series%20on%20simplifying%20configuration%20of%20threat%20protection%20in%20Office%20365.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2906990%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAwareness%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EConfiguration%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMastering%20Configuration%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPrevention%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecure%20Posture%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Nov 04 2021 09:03 AM
Updated by: