Securing the Platform: Designing SaaS service implementations to meet federal policy ( 3 of 4)

Published 02-26-2020 09:30 AM 2,558 Views
Microsoft

Several federal initiatives such as CDM (Continuous Diagnostic and Mitigation), TIC (Trusted Internet Connection) increasingly becoming similar, in that identical tools and approaches such as Zero Trust can be used to meet multiple federal mandates. This convergence provides an opportunity to reduce complexity while helping agencies improve their security posture and increase IT efficiency.

 

This blog, the third of a four-part series on meeting federal mandates with SaaS services, provides a deep dive on securing the platform.

 

Using Microsoft Secure Score to implement cloud controls

 

Implementing proper cloud controls is imperative to an organization as more data moves to the cloud. Most Cloud breaches can be traced back to an attacker compromising credentials, because the proper controls were not enabled to protect the identity. To help gain a holistic view of your cloud estate,

Microsoft has introduced a scoring concept called Microsoft Secure Score.  Microsoft Secure Score provides recommendations across your entire data estate to include identity, data, apps, and infrastructure.  Secure Score will provide recommendation to your organization and increase your score as you enable the recommended security controls. 

 

Allen_0-1582593459002.png

Figure 1 Microsoft Secure Score

 

 

Using Azure Identity Governance

 

A common question from customers is, how do we protect the platform now that it is internet accessible all the time?  If we go back to a Zero Trust model and the concept that Identity is the perimeter, we start by securing our sensitive accounts.  Azure Identity Governance is a combination of Access Reviews, Privileged Identity Management, Entitlements, and Terms of Use. If you are wondering why we are talking about Azure governance when the focus is Office 365, remember, Office 365 uses Azure Activity Directory for its identity service

 

 

Allen_1-1582593459033.png

Figure 2 Azure Identity Governance getting started page

 

Azure AD access reviews allow organizations to configure polices and control group membership.  Organizations define how often they want to review group membership, who can approve the users, and what action to take if the review process does not occur.  Controlling and reviewing sensitive accounts on regular basis helps protect organization from mis-configuration and reduces risk.

 

 

Allen_2-1582593459061.png

Figure 3 Access Review creation wizard

 

Configuring Azure AD PIM

 

The second component of Identity Governance is Azure AD PIM (Privileged Identity Management); PIM follows the rule of least privilege. When PIM is enabled on an account, that account has zero standing rights.  This forces staff to go through a process to “request” elevation of privilege. Organizations can configure several options for this process. The most common is to require an approver before rights can be elevated.

 

Example:

 

  1. Admin.1 logs into Microsoft Azure, but when Admin.1 logs on, he/she does not have administrative access.
  2. Admin.1 must request access to their administrative role.
  3. When requesting access, Admin.1 must use multi-factor authentication to increase privilege.
  4. Admin.1 becomes Global Admin for 2 hours, after which the rights are removed.

 

The PIM services audits and logs the entire process, providing organizations a detailed set of information to review while keeping the rule of least privilege.

 

Allen_3-1582593459103.png

Figure 4 Privilege Identity Management dashboard

 

Using Azure Identity Protection 

 

Azure Identity Protection generates risk levels, alerts, and reports that can be analyzed by your organization to help identify any suspicious activity.  When users attempt to access your applications, a conditional access policy can determine if access is acceptable or should be denied based on the user risk level. This allows organizations to determine their acceptable level of risk and helps with three key concepts:

 

  1. Automate the detection and remediation of identity-based risks
  2. Investigate risks using data in the portal
  3. Export risk detection data to third-party utilities for further analysis

 

 

Allen_4-1582593459144.png

Figure 5 Azure Active Directory Identity Protection dashboard

 

When accessing Office 365, authentication/authorization is controlled with Azure Active Directory. Since authentication is centrally controlled and Microsoft cloud solutions are natively integrated, organizations may additionally leverage conditional access policies to further block access.  Organizations can require that privileged accounts can only logon from a corporate network, require multi-factor authentication, and the device must be healthy.  Setting conditions on all accounts is critical, especially for privileged identities to help mitigate a potential breach.

 

Allen_5-1582593459174.png

Figure 6 Overview of Conditional Access

 

 

Office 365 is a suite of solutions that include Microsoft Exchange Online, SharePoint Online, Teams, and more. To cover all the configurations is outside the scope of this article. We will focus on protecting Microsoft Exchange Online, however many of the controls we introduce are global to Office 365. Exchange Online has numerous controls to help organization protect, discover, and monitor the flow of data through the system.  Exchange Online offers traditional services like connection filtering, spam and malware scanning, as well as modern threat protection with Office 365 Advanced Threat Protection (ATP); providing Safe Attachments, and Safe Linking.

 

Regulating spam and protection

Organizations need to continually protect themselves from spoofing, spam, and phishing. Office 365 provides native support for solutions like Domain Keys Identified mail (DKIM), Domain-based message authentication (DMARC), and Sender Policy Framework (SPF). These solutions are well established technology and can help regulate spam and protect organizations from common attacks.

 

 

Allen_6-1582593459210.png

Figure 7 Overview of DKIM, DMARC, and SPF

 

Threat intelligence and management 

 

With all the security tools organizations implement to date, Phishing is still one of the most common methods of attack. Office 365 provides built in tools to help organizations configure anti-phishing and anti-malware policies to better protect your organization.

 

 

Allen_7-1582593459244.png

Figure 8 Office 365 Threat Management Policies

  

User training is a recursive process and Office 365 provides a built-in attack simulator. The attack simulator allows administrators to create content, track, and report on users. This helps organizations identify and find vulnerable users before a real attack impacts your organization.

 

 

Allen_8-1582593459259.png

Figure 9 Office 365 Attack Simulator

 

 

Office 365 provides several built-in solutions to help organizations view their threat landscape. Microsoft provides 9 key capabilities under the Threat management section in the Office 365 portal:

 

  1. Dashboard
  2. Investigations
  3. Explorer
  4. Submissions
  5. Attack Simulator
  6. Review
  7. Policy
  8. Threat Tracker
  9. App Permission

 

 

 

The security dashboard provides an overview of your organizations threat landscape.  Microsoft surfaces global attack trends, malware summaries, and several other key indicators for an organization to review and investigate.

 

Allen_9-1582593459322.png

Figure 10 Office 365 Threat management dashboard

 

Signal sharing 

Most organizations bounce between tools attempting to discover which node was infected first after a compromise has occurred.  One reason this happens is the lack of signal sharing between tools.  Microsoft solutions share signals between services like Office 365 and MDATP.  The signal sharing provides security teams a view of the entire kill chain in one location and starts investigating the endpoint immediately. The auto investigation helps expedite the security teams’ tasks by pulling logs and several key data points, from the endpoint, and correlating those events.

 

 

Allen_10-1582593459421.png

Figure 11 Office 365 investigations

 

Using Threat Explorer 

Dashboards are good visualizations however; security teams need the ability to hunt through data to investigate potential issues. Explorer allows your security team to hunt through your message data looking for SHA hashes, malware, and many other key attributes, to track down potentially malicious payloads.

 

 

Allen_11-1582593459446.png

Figure 12 Office 365 Threat Explorer

 

Getting a detailed analysis from Microsoft 

Organizations often find files they believe to be malicious but are uncertain. Office 365 provides the ability to submit messages/files to Microsoft for more detailed analysis.  When you submit an email, you get information about any policies that may have allowed the incoming message into your tenant, as well as examination of any URLs and attachments in the message.

 

 

Allen_12-1582593459452.png

Figure 13 Office 365 submission

 

 

Organizations often create rules and filters that can capture legitimate messages or unintentionally block users. Providing administrators, the ability to review any incidents, quarantined messages, or restricted users is critical to business productivity.

 

 

Allen_13-1582593459465.png

Figure 14 Office 365 Admin Review

 

Using Advanced Threat Protection (ATP)

Organizations are under constant threat and simple techniques like Phishing happen every day. As attack techniques evolve, so must organization security practices. Office 365 lets your organization create Advanced Threat Protection (ATP) policies to accomplish this.

 

 

Allen_14-1582593459504.png

Figure 15 Office 365 Threat Management Policies

 

 

Office 365 ATP has two key capabilities; Safe Links and Safe Attachments.  Office 365 Safe Attachments allows organizations to configure policies to "detonate" attachments before delivering files to the user. During this process, Microsoft uses ML and behavioral analytics enriched by the Security Graph to determine if the attachment is malicious.  Office 365 ATP policies work across various services like SharePoint, Exchange, Teams and OneDrive to protect the entire platform.

 

 

Allen_15-1582593459539.png

Figure 16 Office 365 Safe Links policy creation setting

 

 

Office 365 ATP helps protect your organization by providing time-of-click verification of web addresses (URLs) with Safe Links policies.  Each URL that is embedded in a document, message, or chat, will be run through Microsoft’s threat protection to prevent users from following links to web sites recognized as malicious.

 

 

Allen_16-1582593459547.jpeg

Figure 17 example of Office 365 Safe Links block

 

Data Protection

When talking about Data Loss Prevention (DLP) or “data leakage”, we know data moves, and quite often moves to cloud services such Box, Google Drive, and other commercial cloud services. Data protection is a constant struggle for IT, and it is only getting harder.  In the “Securing Mobile” article we talked about how AIP polices move with the document but what if documents haven’t been labeled and sit outside the corporate boundary. Microsoft has several solutions that work together to help organizations gain visibility and control of your data estate.  Each solution provides a key control point for your organizational data from discovery and control to protection.

 

Microsoft Cloud App Security (MCAS) is designed to give insight into how cloud apps are being used in your organization. It provides an at-a-glance overview of what kinds of apps are being used, your open alerts, and the risk levels of apps in your organization. MCAS integrates natively with the Office 365 service to allow organizations to create policies to govern data and access.

 

 

Allen_17-1582593459575.jpeg

Figure 18 Microsoft Cloud App security policy page

 

Identifying risk is critical for an organization, especially when it comes to user’s activity. Microsoft believes identity is the new security perimeter and understanding user activity is imperative. Azure ATP is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Azure ATP, Microsoft Cloud App Security (MCAS), and Azure AD Identity Protection adds powerful User and Entity Behavioral Analytics (UEBA) capabilities into Microsoft’s Threat Protection solutions.

 

 

Allen_18-1582593459608.png

Figure 19 MCAS User Behavior Analysis

 

 

In this scenario, we demonstrated how an organization can use the native Microsoft cloud tools to help protect the Office 365 platform. There are numerous features this article did not cover like legal hold, regulatory compliance, and more that are native to Microsoft’s cloud platform. Be on the lookout for the next blog of the series where you’ll learn more about auditing and logging.

 

 

%3CLINGO-SUB%20id%3D%22lingo-sub-1192088%22%20slang%3D%22en-US%22%3ESecuring%20the%20Platform%3A%20Designing%20SaaS%20service%20implementations%20to%20meet%20federal%20policy%20(%203%20of%204)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1192088%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3ESeveral%20federal%20initiatives%20such%20as%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.dhs.gov%2Fcisa%2Fcdm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ECDM%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E(Continuous%20Diagnostic%20and%20Mitigation)%2C%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.cisa.gov%252Ftrusted-internet-connections%26amp%3Bdata%3D02%257C01%257Cv-catcri%2540microsoft.com%257Cd13ab2eafbf649e6222208d7943d4008%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637140863110449644%26amp%3Bsdata%3D6ZRNB2RvUQKsa0eCp3If0gvHeq%252B1PTgopVnNtDnKfxQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ETIC%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E(Trusted%20Internet%20Connection)%20increasingly%20becoming%20similar%2C%20in%20that%20identical%20tools%20and%20approaches%20such%20as%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fitshowcase%2Fimplementing-a-zero-trust-security-model-at-microsoft%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3EZero%20Trust%3C%2FEM%3E%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CEM%3Ecan%20be%20used%20to%20meet%20multiple%20federal%20mandates.%20This%20convergence%20provides%20an%20opportunity%20to%20reduce%20complexity%20while%20helping%20agencies%20improve%20their%20security%20posture%20and%20increase%20IT%20efficiency.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EThis%20blog%2C%20the%20third%20of%20a%20four-part%20series%20on%20meeting%20federal%20mandates%20with%20SaaS%20services%2C%20provides%20a%20deep%20dive%20on%20securing%20the%20platform.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUsing%20Microsoft%20Secure%20Score%20to%20implement%20cloud%20controls%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EImplementing%20proper%20cloud%20controls%20is%20imperative%20to%20an%20organization%20as%20more%20data%20moves%20to%20the%20cloud.%20Most%20Cloud%20breaches%20can%20be%20traced%20back%20to%20an%20attacker%20compromising%20credentials%2C%20because%20the%20proper%20controls%20were%20not%20enabled%20to%20protect%20the%20identity.%20To%20help%20gain%20a%20holistic%20view%20of%20your%20cloud%20estate%2C%3C%2FP%3E%0A%3CP%3EMicrosoft%20has%20introduced%20a%20scoring%20concept%20called%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fmtp%2Fmicrosoft-secure-score%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Secure%20Score%3C%2FA%3E%3C%2FSPAN%3E.%26nbsp%3B%20Microsoft%20Secure%20Score%20provides%20recommendations%20across%20your%20entire%20data%20estate%20to%20include%20identity%2C%20data%2C%20apps%2C%20and%20infrastructure.%26nbsp%3B%20Secure%20Score%20will%20provide%20recommendation%20to%20your%20organization%20and%20increase%20your%20score%20as%20you%20enable%20the%20recommended%20security%20controls.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_0-1582593459002.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173340iE40E9C884A5917D7%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_0-1582593459002.png%22%20alt%3D%22Allen_0-1582593459002.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-1790986428%22%20id%3D%22toc-hId-1790985658%22%3E%3CEM%3EFigure%201%20Microsoft%20Secure%20Score%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUsing%20Azure%20Identity%20Governance%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20common%20question%20from%20customers%20is%2C%20how%20do%20we%20protect%20the%20platform%20now%20that%20it%20is%20internet%20accessible%20all%20the%20time%3F%26nbsp%3B%20If%20we%20go%20back%20to%20a%20Zero%20Trust%20model%20and%20the%20concept%20that%20Identity%20is%20the%20perimeter%2C%20we%20start%20by%20securing%20our%20sensitive%20accounts.%26nbsp%3B%20Azure%20Identity%20Governance%20is%20a%20combination%20of%20Access%20Reviews%2C%20Privileged%20Identity%20Management%2C%20Entitlements%2C%20and%20Terms%20of%20Use.%20If%20you%20are%20wondering%20why%20we%20are%20talking%20about%20Azure%20governance%20when%20the%20focus%20is%20Office%20365%2C%20remember%2C%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Foffice365%2Fenterprise%2Fabout-office-365-identity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EOffice%20365%20uses%20Azure%20Activity%20Directory%20for%20its%20identity%20service%3C%2FA%3E%3C%2FSPAN%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_1-1582593459033.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173342i61BBBB8277128D6D%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_1-1582593459033.png%22%20alt%3D%22Allen_1-1582593459033.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--16468035%22%20id%3D%22toc-hId--16468805%22%3E%3CEM%3EFigure%202%20Azure%20Identity%20Governance%20getting%20started%20page%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fgovernance%2Faccess-reviews-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20access%20reviews%3C%2FA%3E%3C%2FSPAN%3E%20allow%20organizations%20to%20configure%20polices%20and%20control%20group%20membership.%26nbsp%3B%20Organizations%20define%20how%20often%20they%20want%20to%20review%20group%20membership%2C%20who%20can%20approve%20the%20users%2C%20and%20what%20action%20to%20take%20if%20the%20review%20process%20does%20not%20occur.%26nbsp%3B%20Controlling%20and%20reviewing%20sensitive%20accounts%20on%20regular%20basis%20helps%20protect%20organization%20from%20mis-configuration%20and%20reduces%20risk.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_2-1582593459061.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173341i6BC6F05575B27D6E%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_2-1582593459061.png%22%20alt%3D%22Allen_2-1582593459061.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--1823922498%22%20id%3D%22toc-hId--1823923268%22%3E%3CEM%3EFigure%203%20Access%20Review%20creation%20wizard%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EConfiguring%20Azure%20AD%20PIM%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20second%20component%20of%20Identity%20Governance%20is%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fprivileged-identity-management%2Fpim-configure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20PIM%3C%2FA%3E%3C%2FSPAN%3E%20(Privileged%20Identity%20Management)%3B%20PIM%20follows%20the%20rule%20of%20least%20privilege.%20When%20PIM%20is%20enabled%20on%20an%20account%2C%20that%20account%20has%20zero%20standing%20rights.%20%26nbsp%3BThis%20forces%20staff%20to%20go%20through%20a%20process%20to%20%E2%80%9Crequest%E2%80%9D%20elevation%20of%20privilege.%20Organizations%20can%20configure%20several%20options%20for%20this%20process.%20The%20most%20common%20is%20to%20require%20an%20approver%20before%20rights%20can%20be%20elevated.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExample%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EAdmin.1%20logs%20into%20Microsoft%20Azure%2C%20but%20when%20Admin.1%20logs%20on%2C%20he%2Fshe%20does%20not%20have%20administrative%20access.%3C%2FLI%3E%0A%3CLI%3EAdmin.1%20must%20request%20access%20to%20their%20administrative%20role.%3C%2FLI%3E%0A%3CLI%3EWhen%20requesting%20access%2C%20Admin.1%20must%20use%20multi-factor%20authentication%20to%20increase%20privilege.%3C%2FLI%3E%0A%3CLI%3EAdmin.1%20becomes%20Global%20Admin%20for%202%20hours%2C%20after%20which%20the%20rights%20are%20removed.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20PIM%20services%20audits%20and%20logs%20the%20entire%20process%2C%20providing%20organizations%20a%20detailed%20set%20of%20information%20to%20review%20while%20keeping%20the%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FPrinciple_of_least_privilege%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3Erule%20of%20least%20privilege%3C%2FEM%3E%3C%2FA%3E%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_3-1582593459103.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173343i4D73EC9D8A5C2493%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_3-1582593459103.png%22%20alt%3D%22Allen_3-1582593459103.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-663590335%22%20id%3D%22toc-hId-663589565%22%3E%3CEM%3EFigure%204%20Privilege%20Identity%20Management%20dashboard%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUsing%20Azure%20Identity%20Protection%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Identity%20Protection%20generates%20risk%20levels%2C%20alerts%2C%20and%20reports%20that%20can%20be%20analyzed%20by%20your%20organization%20to%20help%20identify%20any%20suspicious%20activity.%26nbsp%3B%20When%20users%20attempt%20to%20access%20your%20applications%2C%20a%20conditional%20access%20policy%20can%20determine%20if%20access%20is%20acceptable%20or%20should%20be%20denied%20based%20on%20the%20user%20risk%20level.%20This%20allows%20organizations%20to%20determine%20their%20acceptable%20level%20of%20risk%20and%20helps%20with%20three%20key%20concepts%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EAutomate%20the%20detection%20and%20remediation%20of%20identity-based%20risks%3C%2FLI%3E%0A%3CLI%3EInvestigate%20risks%20using%20data%20in%20the%20portal%3C%2FLI%3E%0A%3CLI%3EExport%20risk%20detection%20data%20to%20third-party%20utilities%20for%20further%20analysis%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_4-1582593459144.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173345i468A64EB5CBB5B3F%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_4-1582593459144.png%22%20alt%3D%22Allen_4-1582593459144.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--1143864128%22%20id%3D%22toc-hId--1143864898%22%3E%3CEM%3EFigure%205%20Azure%20Active%20Directory%20Identity%20Protection%20dashboard%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20accessing%20Office%20365%2C%20authentication%2Fauthorization%20is%20controlled%20with%20Azure%20Active%20Directory.%20Since%20authentication%20is%20centrally%20controlled%20and%20Microsoft%20cloud%20solutions%20are%20natively%20integrated%2C%20organizations%20may%20additionally%20leverage%20conditional%20access%20policies%20to%20further%20block%20access.%26nbsp%3B%20Organizations%20can%20require%20that%20privileged%20accounts%20can%20only%20logon%20from%20a%20corporate%20network%2C%20require%20multi-factor%20authentication%2C%20and%20the%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fdeployment%2Fupdate%2Fdevice-health-monitor%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edevice%20must%20be%20healthy%3C%2FA%3E%3C%2FSPAN%3E.%20%26nbsp%3BSetting%20conditions%20on%20all%20accounts%20is%20critical%2C%20especially%20for%20privileged%20identities%20to%20help%20mitigate%20a%20potential%20breach.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_5-1582593459174.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173344i287EB94E4C850B5C%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_5-1582593459174.png%22%20alt%3D%22Allen_5-1582593459174.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-1343648705%22%20id%3D%22toc-hId-1343647935%22%3E%3CEM%3EFigure%206%20Overview%20of%20Conditional%20Access%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOffice%20365%20is%20a%20suite%20of%20solutions%20that%20include%20Microsoft%20Exchange%20Online%2C%20SharePoint%20Online%2C%20Teams%2C%20and%20more.%20To%20cover%20all%20the%20configurations%20is%20outside%20the%20scope%20of%20this%20article.%20We%20will%20focus%20on%20protecting%20Microsoft%20Exchange%20Online%2C%20however%20many%20of%20the%20controls%20we%20introduce%20are%20global%20to%20Office%20365.%20Exchange%20Online%20has%20numerous%20controls%20to%20help%20organization%20protect%2C%20discover%2C%20and%20monitor%20the%20flow%20of%20data%20through%20the%20system.%26nbsp%3B%20Exchange%20Online%20offers%20traditional%20services%20like%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fconfigure-the-connection-filter-policy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Econnection%20filtering%3C%2FA%3E%3C%2FSPAN%3E%2C%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fanti-spam-and-anti-malware-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Espam%20and%20malware%20scanning%3C%2FA%3E%3C%2FSPAN%3E%2C%20as%20well%20as%20modern%20threat%20protection%20with%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Foffice-365-atp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EOffice%20365%20Advanced%20Threat%20Protection%3C%2FA%3E%3C%2FSPAN%3E%20(ATP)%3B%20providing%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fatp-safe-attachments%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESafe%20Attachments%3C%2FA%3E%3C%2FSPAN%3E%2C%20and%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fset-up-atp-safe-links-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESafe%20Linking%3C%2FA%3E%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERegulating%20spam%20and%20protection%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOrganizations%20need%20to%20continually%20protect%20themselves%20from%20spoofing%2C%20spam%2C%20and%20phishing.%20Office%20365%20provides%20native%20support%20for%20solutions%20like%26nbsp%3B%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fuse-dkim-to-validate-outbound-email%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDomain%20Keys%20Identified%20mail%3C%2FA%3E%3C%2FSPAN%3E%20(DKIM)%2C%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fuse-dmarc-to-validate-email%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDomain-based%20message%20authentication%3C%2FA%3E%3C%2FSPAN%3E%20(DMARC)%2C%20and%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fset-up-spf-in-office-365-to-help-prevent-spoofing%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESender%20Policy%20Framework%3C%2FA%3E%3C%2FSPAN%3E%20(SPF).%20These%20solutions%20are%20well%20established%20technology%20and%20can%20help%20regulate%20spam%20and%20protect%20organizations%20from%20common%20attacks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_6-1582593459210.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173346i9083DD8629525862%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_6-1582593459210.png%22%20alt%3D%22Allen_6-1582593459210.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--463805758%22%20id%3D%22toc-hId--463806528%22%3E%3CEM%3EFigure%207%20Overview%20of%20DKIM%2C%20DMARC%2C%20and%20SPF%20%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EThreat%20intelligence%20and%20management%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20all%20the%20security%20tools%20organizations%20implement%20to%20date%2C%20Phishing%20is%20still%20one%20of%20the%20most%20common%20methods%20of%20attack.%20Office%20365%20provides%20built%20in%20tools%20to%20help%20organizations%20configure%20anti-phishing%20and%20anti-malware%20policies%20to%20better%20protect%20your%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_7-1582593459244.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173348iBAF4834E115FC1C9%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_7-1582593459244.png%22%20alt%3D%22Allen_7-1582593459244.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-2023707075%22%20id%3D%22toc-hId-2023706305%22%3E%3CEM%3EFigure%208%20Office%20365%20Threat%20Management%20Policies%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUser%20training%20is%20a%20recursive%20process%20and%20Office%20365%20provides%20a%20built-in%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fattack-simulator%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eattack%20simulator%3C%2FA%3E%3C%2FSPAN%3E.%20The%20attack%20simulator%20allows%20administrators%20to%20create%20content%2C%20track%2C%20and%20report%20on%20users.%20This%20helps%20organizations%20identify%20and%20find%20vulnerable%20users%20before%20a%20real%20attack%20impacts%20your%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_8-1582593459259.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173347i0DAA66E892D3414F%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_8-1582593459259.png%22%20alt%3D%22Allen_8-1582593459259.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-216252612%22%20id%3D%22toc-hId-216251842%22%3E%3CEM%3EFigure%209%20Office%20365%20Attack%20Simulator%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOffice%20365%20provides%20several%20built-in%20solutions%20to%20help%20organizations%20view%20their%20threat%20landscape.%20Microsoft%20provides%209%20key%20capabilities%20under%20the%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Foffice-365-ti%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EThreat%20management%3C%2FA%3E%3C%2FSPAN%3E%20section%20in%20the%20Office%20365%20portal%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EDashboard%3C%2FLI%3E%0A%3CLI%3EInvestigations%3C%2FLI%3E%0A%3CLI%3EExplorer%3C%2FLI%3E%0A%3CLI%3ESubmissions%3C%2FLI%3E%0A%3CLI%3EAttack%20Simulator%3C%2FLI%3E%0A%3CLI%3EReview%3C%2FLI%3E%0A%3CLI%3EPolicy%3C%2FLI%3E%0A%3CLI%3EThreat%20Tracker%3C%2FLI%3E%0A%3CLI%3EApp%20Permission%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20security%20dashboard%20provides%20an%20overview%20of%20your%20organizations%20threat%20landscape.%20%26nbsp%3BMicrosoft%20surfaces%20global%20attack%20trends%2C%20malware%20summaries%2C%20and%20several%20other%20key%20indicators%20for%20an%20organization%20to%20review%20and%20investigate.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_9-1582593459322.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173351i6DEBA3545CD8FDB8%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_9-1582593459322.png%22%20alt%3D%22Allen_9-1582593459322.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--1591201851%22%20id%3D%22toc-hId--1591202621%22%3E%3CEM%3EFigure%2010%20Office%20365%20Threat%20management%20dashboard%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESignal%20sharing%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EMost%20organizations%20bounce%20between%20tools%20attempting%20to%20discover%20which%20node%20was%20infected%20first%20after%20a%20compromise%20has%20occurred.%26nbsp%3B%20One%20reason%20this%20happens%20is%20the%20lack%20of%20signal%20sharing%20between%20tools.%26nbsp%3B%20Microsoft%20solutions%20share%20signals%20between%20services%20like%20Office%20365%20and%20MDATP.%26nbsp%3B%20The%20signal%20sharing%20provides%20security%20teams%20a%20view%20of%20the%20entire%20kill%20chain%20in%20one%20location%20and%20starts%20investigating%20the%20endpoint%20immediately.%20The%20auto%20investigation%20helps%20expedite%20the%20security%20teams%E2%80%99%20tasks%20by%20pulling%20logs%20and%20several%20key%20data%20points%2C%20from%20the%20endpoint%2C%20and%20correlating%20those%20events.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_10-1582593459421.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173350i083173D343D71070%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_10-1582593459421.png%22%20alt%3D%22Allen_10-1582593459421.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--241751637%22%20id%3D%22toc-hId--241752407%22%3E%3CEM%3EFigure%2011%20Office%20365%20investigations%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUsing%20Threat%20Explorer%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EDashboards%20are%20good%20visualizations%20however%3B%20security%20teams%20need%20the%20ability%20to%20hunt%20through%20data%20to%20investigate%20potential%20issues.%20Explorer%20allows%20your%20security%20team%20to%20hunt%20through%20your%20message%20data%20looking%20for%20SHA%20hashes%2C%20malware%2C%20and%20many%20other%20key%20attributes%2C%20to%20track%20down%20potentially%20malicious%20payloads.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_11-1582593459446.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173349i84043DF7EBD4FB95%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_11-1582593459446.png%22%20alt%3D%22Allen_11-1582593459446.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--2049206100%22%20id%3D%22toc-hId--2049206870%22%3E%3CEM%3EFigure%2012%20Office%20365%20Threat%20Explorer%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGetting%20a%20detailed%20analysis%20from%20Microsoft%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOrganizations%20often%20find%20files%20they%20believe%20to%20be%20malicious%20but%20are%20uncertain.%20Office%20365%20provides%20the%20ability%20to%20submit%20messages%2Ffiles%20to%20Microsoft%20for%20more%20detailed%20analysis.%26nbsp%3B%20When%20you%20submit%20an%20email%2C%20you%20get%20information%20about%20any%20policies%20that%20may%20have%20allowed%20the%20incoming%20message%20into%20your%20tenant%2C%20as%20well%20as%20examination%20of%20any%20URLs%20and%20attachments%20in%20the%20message.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_12-1582593459452.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173352i50598DA6B6F1059A%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_12-1582593459452.png%22%20alt%3D%22Allen_12-1582593459452.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-438306733%22%20id%3D%22toc-hId-438305963%22%3E%3CEM%3EFigure%2013%20Office%20365%20submission%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOrganizations%20often%20create%20rules%20and%20filters%20that%20can%20capture%20legitimate%20messages%20or%20unintentionally%20block%20users.%20Providing%20administrators%2C%20the%20ability%20to%20review%20any%20incidents%2C%20quarantined%20messages%2C%20or%20restricted%20users%20is%20critical%20to%20business%20productivity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_13-1582593459465.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173353i02CA9474BF80E980%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_13-1582593459465.png%22%20alt%3D%22Allen_13-1582593459465.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--1369147730%22%20id%3D%22toc-hId--1369148500%22%3E%3CEM%3EFigure%2014%20Office%20365%20Admin%20Review%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUsing%20Advanced%20Threat%20Protection%20(ATP)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOrganizations%20are%20under%20constant%20threat%20and%20simple%20techniques%20like%20Phishing%20happen%20every%20day.%20As%20attack%20techniques%20evolve%2C%20so%20must%20organization%20security%20practices.%20Office%20365%20lets%20your%20organization%20create%20Advanced%20Threat%20Protection%20(ATP)%20policies%20to%20accomplish%20this.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_14-1582593459504.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173354i870C2CDEDF129BD0%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_14-1582593459504.png%22%20alt%3D%22Allen_14-1582593459504.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-1118365103%22%20id%3D%22toc-hId-1118364333%22%3E%3CEM%3EFigure%2015%20Office%20365%20Threat%20Management%20Policies%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOffice%20365%20ATP%20has%20two%20key%20capabilities%3B%20Safe%20Links%20and%20Safe%20Attachments.%26nbsp%3B%20Office%20365%20Safe%20Attachments%20allows%20organizations%20to%20configure%20policies%20to%20%22detonate%22%20attachments%20before%20delivering%20files%20to%20the%20user.%20During%20this%20process%2C%20Microsoft%20uses%20ML%20and%20behavioral%20analytics%20enriched%20by%20the%20Security%20Graph%20to%20determine%20if%20the%20attachment%20is%20malicious.%26nbsp%3B%20Office%20365%20ATP%20policies%20work%20across%20various%20services%20like%20SharePoint%2C%20Exchange%2C%20Teams%20and%20OneDrive%20to%20protect%20the%20entire%20platform.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_15-1582593459539.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173356i439B54A9BCB9E0DB%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_15-1582593459539.png%22%20alt%3D%22Allen_15-1582593459539.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--689089360%22%20id%3D%22toc-hId--689090130%22%3E%3CEM%3EFigure%2016%20Office%20365%20Safe%20Links%20policy%20creation%20setting%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOffice%20365%20ATP%20helps%20protect%20your%20organization%20by%20providing%20time-of-click%20verification%20of%20web%20addresses%20(URLs)%20with%20Safe%20Links%20policies.%20%26nbsp%3BEach%20URL%20that%20is%20embedded%20in%20a%20document%2C%20message%2C%20or%20chat%2C%20will%20be%20run%20through%20Microsoft%E2%80%99s%20threat%20protection%20to%20prevent%20users%20from%20following%20links%20to%20web%20sites%20recognized%20as%20malicious.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_16-1582593459547.jpeg%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173355iC3A28599934DE2E4%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_16-1582593459547.jpeg%22%20alt%3D%22Allen_16-1582593459547.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId-1798423473%22%20id%3D%22toc-hId-1798422703%22%3E%3CEM%3EFigure%2017%20example%20of%20Office%20365%20Safe%20Links%20block%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EData%20Protection%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWhen%20talking%20about%20Data%20Loss%20Prevention%20(DLP)%20or%20%E2%80%9Cdata%20leakage%E2%80%9D%2C%20we%20know%20data%20moves%2C%20and%20quite%20often%20moves%20to%20cloud%20services%20such%20Box%2C%20Google%20Drive%2C%20and%20other%20commercial%20cloud%20services.%20Data%20protection%20is%20a%20constant%20struggle%20for%20IT%2C%20and%20it%20is%20only%20getting%20harder.%26nbsp%3B%20In%20the%20%E2%80%9CSecuring%20Mobile%E2%80%9D%20article%20we%20talked%20about%20how%20AIP%20polices%20move%20with%20the%20document%20but%20what%20if%20documents%20haven%E2%80%99t%20been%20labeled%20and%20sit%20outside%20the%20corporate%20boundary.%20Microsoft%20has%20several%20solutions%20that%20work%20together%20to%20help%20organizations%20gain%20visibility%20and%20control%20of%20your%20data%20estate.%26nbsp%3B%20Each%20solution%20provides%20a%20key%20control%20point%20for%20your%20organizational%20data%20from%20discovery%20and%20control%20to%20protection.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Cloud%20App%20Security%20(MCAS)%20is%20designed%20to%20give%20insight%20into%20how%20cloud%20apps%20are%20being%20used%20in%20your%20organization.%20It%20provides%20an%20at-a-glance%20overview%20of%20what%20kinds%20of%20apps%20are%20being%20used%2C%20your%20open%20alerts%2C%20and%20the%20risk%20levels%20of%20apps%20in%20your%20organization.%20MCAS%20integrates%20natively%20with%20the%20Office%20365%20service%20to%20allow%20organizations%20to%20create%20policies%20to%20govern%20data%20and%20access.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_17-1582593459575.jpeg%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173357iDD970A2D8FB8AC76%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_17-1582593459575.jpeg%22%20alt%3D%22Allen_17-1582593459575.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--9030990%22%20id%3D%22toc-hId--9031760%22%3E%3CEM%3EFigure%2018%20Microsoft%20Cloud%20App%20security%20policy%20page%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIdentifying%20risk%20is%20critical%20for%20an%20organization%2C%20especially%20when%20it%20comes%20to%20user%E2%80%99s%20activity.%20Microsoft%20believes%20identity%20is%20the%20new%20security%20perimeter%20and%20understanding%20user%20activity%20is%20imperative.%20Azure%20ATP%20is%20a%20cloud-based%20security%20solution%20that%20leverages%20your%20on-premises%20Active%20Directory%20signals%20to%20identify%2C%20detect%2C%20and%20investigate%20advanced%20threats%2C%20compromised%20identities%2C%20and%20malicious%20insider%20actions%20directed%20at%20your%20organization.%20Azure%20ATP%2C%20Microsoft%20Cloud%20App%20Security%20(MCAS)%2C%20and%20Azure%20AD%20Identity%20Protection%20adds%20powerful%20User%20and%20Entity%20Behavioral%20Analytics%20(UEBA)%20capabilities%20into%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Ftechnology%2Fthreat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%E2%80%99s%20Threat%20Protection%20solutions%3C%2FA%3E%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Allen_18-1582593459608.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173358i4343719139F9EF55%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Allen_18-1582593459608.png%22%20alt%3D%22Allen_18-1582593459608.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH5%20id%3D%22toc-hId--1816485453%22%20id%3D%22toc-hId--1816486223%22%3E%3CEM%3EFigure%2019%20MCAS%20User%20Behavior%20Analysis%3C%2FEM%3E%3C%2FH5%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20scenario%2C%20we%20demonstrated%20how%20an%20organization%20can%20use%20the%20native%20Microsoft%20cloud%20tools%20to%20help%20protect%20the%20Office%20365%20platform.%20There%20are%20numerous%20features%20this%20article%20did%20not%20cover%20like%20legal%20hold%2C%20regulatory%20compliance%2C%20and%20more%20that%20are%20native%20to%20Microsoft%E2%80%99s%20cloud%20platform.%26nbsp%3BBe%20on%20the%20lookout%20for%20the%20next%20blog%20of%20the%20series%20where%20you%E2%80%99ll%20learn%20more%20about%20auditing%20and%20logging.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1192088%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TIC3-BlogSeries-part3-876819662-image.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173678iEF36CB1CC6417991%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22TIC3-BlogSeries-part3-876819662-image.png%22%20alt%3D%22TIC3-BlogSeries-part3-876819662-image.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3ESeveral%20federal%20initiatives%20such%20as%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.dhs.gov%2Fcisa%2Fcdm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ECDM%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E(Continuous%20Diagnostic%20and%20Mitigation)%2C%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.cisa.gov%252Ftrusted-internet-connections%26amp%3Bdata%3D02%257C01%257Cv-catcri%2540microsoft.com%257Cd13ab2eafbf649e6222208d7943d4008%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637140863110449644%26amp%3Bsdata%3D6ZRNB2RvUQKsa0eCp3If0gvHeq%252B1PTgopVnNtDnKfxQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ETIC%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E(Trusted%20Internet%20Connection)%20increasingly%20becoming%20similar%2C%20in%20that%20identical%20tools%20and%20approaches%20such%20as%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fitshowcase%2Fimplementing-a-zero-trust-security-model-at-microsoft%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3EZero%20Trust%3C%2FEM%3E%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CEM%3Ecan%20be%20used%20to%20meet%20multiple%20federal%20mandates.%20This%20convergence%20provides%20an%20opportunity%20to%20reduce%20complexity%20while%20helping%20agencies%20improve%20their%20security%20posture%20and%20increase%20IT%20efficiency.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EThis%20blog%2C%20the%20third%20of%20a%20four-part%20series%20on%20meeting%20federal%20mandates%20with%20SaaS%20services%2C%20provides%20a%20deep%20dive%20on%20securing%20the%20platform.%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1192088%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Elocal%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPublic%20sector%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Mar 02 2020 01:37 PM
Updated by: