For our final stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing M365 Integration. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part II: Identity Security, Part III: Device Security, Part IV: App Security, and Part V: Data Security to get caught up prior to reading Part VI: M365 Integration which will be discussed during this article.
The Microsoft 365 security stack has many beneficial security features which we have reviewed over the course of the last five articles. Whether it is protecting your identity during authentication, securing managed devices, containerizing corporate data on personal devices or providing persistent protection to organization data; the Microsoft 365 security stack has you covered. Security features can provide a lot, but the true power around the Microsoft 365 security stack is its integration with itself.
Powering M365 Integration within Microsoft Cloud App Security:
MCAS provides discovery of Shadow IT, activity policies for investigating, file policy for actions against sensitive information including data at rest, managing OAuth app permissions, advanced reporting from Microsoft 365 plus third party connected apps telemetry and much more. By integrating Microsoft Cloud App Security with the following features you extend its overall capabilities into additional Microsoft 365 security stack areas.
Powering M365 Integration within Microsoft Defender ATP:
MDATP provides endpoint detection and response security center where visibility around Windows OS, Windows Server, MacOS, Linux (public preview) and Android (public preview for the app) can be centrally protected. Integrating Microsoft Defender ATP with the following features can extend the functionality to new levels with increased Microsoft 365 signal consumption.
Powering M365 Integration with Microsoft Threat Protection:
Microsoft Threat Protection unifies threat protection services across your endpoints, user identities, affected mailboxes, and cloud apps. MTP provides a cross-product single pane of glass for combined incident queue, automated response to threat, cross-product threat hunting and self-healing all services mentioned above. By enabling Microsoft Threat Protection you can provide an interface for coordinating detection, prevention, investigation and response to threats that will provide the following advantages.
As we look back on what we have discussed about M365 integration, I hope you begin to not just look at each Microsoft 365 security stack capability as a single point of protection. Instead dive deeper into potential security solutions that integrate multiple Microsoft 365 security features into a cross service security solution. When you allow for threat signals throughout Microsoft 365 to integrate with one another you are able to bring individual pieces of threat intelligence together to for a picture that may not be obvious to the human eye.
Thank you so much for joining me during this journey while we discussed holistic cloud protection with the Microsoft 365 security stack. While our journey comes to an end, your journey in the security space will continue as cloud services continues to evolve so will security threats. When evaluating your cloud security posture always take a step back and look at security from a holistic cloud protection solution perspective.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.