0% found this document useful (0 votes)
127 views23 pages

Microsft 365 Security Proposal

Microsoft 365 Security provides security across devices, operating systems, and platforms to defend against cyberattacks. It features zero-trust foundations with secure identity management and protection of sensitive data. Microsoft Defender for Endpoint elevates endpoint security with AI-powered protection against ransomware and other threats. It offers comprehensive protection that is easy to use and more cost-effective than separate security solutions.

Uploaded by

purna.devi7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views23 pages

Microsft 365 Security Proposal

Microsoft 365 Security provides security across devices, operating systems, and platforms to defend against cyberattacks. It features zero-trust foundations with secure identity management and protection of sensitive data. Microsoft Defender for Endpoint elevates endpoint security with AI-powered protection against ransomware and other threats. It offers comprehensive protection that is easy to use and more cost-effective than separate security solutions.

Uploaded by

purna.devi7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

MICROSOFT 365 SECURITY

Microsoft 365
Secure productivity

Devices Operating system Security Management Collaboration


that meet specific that’s secure, easy to manage, that defends against cyberattacks that is built for a heterogenous device that connects every employee
job requirements update, and use across multiple platforms estate, including personal devices across all devices

Eliminate redundant solutions

Zero-Trust foundations Elevate your endpoint security


BUILD A ZERO-TRUST
FOUNDATION

KEEP YOUR DATA SAFE AND


DEFEND AGAINST
ADVANCED CYBERTHREATS
Zero-Trust is the foundation of great security

Secure and Defend against threats Protect sensitive information


manage identities on multi-platforms across data estate

Keep your data safe from unauthorized access when


passwords are lost or stolen with multi-factor authentication. Microsoft Defender Microsoft Intune
for Endpoint P1
Defend against advanced cyberthreats and safeguard business
data with enterprise-grade protection against phishing,
ransomware, and data loss.
Azure Information Azure AD
Protection Premium P1
Secure and manage
identities Verify every
access attempt
Signals
01 Enhance security, simplify access: Control
 User and
“where, when, and who” connects to Office apps Location Allow access
with Conditional Access. Identities  Device
 Application
 Real- time risk
02 Craft your path to passwordless with adaptive
policies requiring multifactor authentication and Azure Active Require MFA
Directory
phishing protection.
Policy
engine
03 Give users prompts to unblock themselves and Limit access
get back to work with password change or reset—
no admin or help desk needed. Endpoints

Conditional Access +
Continuous Access
Password reset
04 Perform Continuous Access Evaluation to Intune
Evaluation

remediate potential compromise in real-time. Azure AD

Monitor access
Protect against lost or stolen passwords with multi-
factor authentication
 Verify user identities with strong authentication

Including passwordless technology

Microsoft Windows FIDO2 Biometrics


Authenticator Hello security key
Multi-factor
authentication
prevents 99.9%1
of identity attacks
We support a broad
range of multi-factor Push Soft Hard SMS,
authentication options notification Tokens OTP Tokens OTP voice
Protect sensitive information
across your data estate
Cloud
01 Encrypt data at rest, in transit, and in use.

02 Discover and classify sensitive content at scale Excel


and extend protection to Microsoft and non-
Microsoft apps.

03 Address threat of data theft or exposure


from lost, stolen, or inappropriately
decommissioned computers.

04 Preserve content by custodian and send


hold notifications.

On-premises
ELEVATE YOUR ENDPOINT
SECURITY

CONTROL FOR WORK DATA


AND DEVICES
Microsoft Defender
Elevate your security

AI-powered device protection specially designed for advanced security

Enterprise-grade protection Easy to use Cost-effective


Protect your devices against ransomware Easy, wizard-based onboarding and out of the One affordable solution optimized
and other cyberthreats with industry-leading box policies get you up and running quickly. for your business instead of separate
Defender technologies like vulnerability Simple monthly summary reports show you and expensive add-ons.
management and endpoint detection threats detected and prevented so you know
and response with AI-powered automatic Defender is working around the clock to
attack disruption. help protect you.
Traditional antivirus vs. Defender for Business

Defender for Business offers comprehensive


device and server security

Traditional antivirus software only Improves visibility and response time to


cyberattacks with endpoint detection and response
protects a fraction of your business

Identifies and stops emerging cyberthreats with


Vulnerable to unknown cyberthreats next generation antivirus protection

Attacks can bypass protection Continuously protects your business from


malicious activity through automated investigation
and remediation and automatic attack disruption

Lacks protection against malicious websites


Tracks vulnerabilities across your most
critical assets
Defender for Business
Cybersecurity Framework map

Identify Protect Detect and respond Recover


Vulnerability Attack surface reduction Endpoint detection Automated investigation
management Next-generation protection and response and remediation
Microsoft Defender
Elevate your security

Vulnerability Attack surface Next generation Endpoint detection and Auto investigation
management reduction protection response and remediation

Simplified onboarding and administration


Identify Protect Detect and Respond Recover

Vulnerability management

A risk-based approach to mature your


vulnerability management program.

Continuous real-time
discovery

Context-aware
prioritization

Built-in, end-to-end
remediation process
Identify Protect Detect and Respond Recover

Attack surface
reduction

Protect against risks by reducing


the surface area of attack.

System hardening
without disruption

Customization that
fits your business

Visualize the impact


and simply turn it on
Attack surface reduction
Resist attacks and exploitations

HW-based isolation

Application control Isolate access to untrusted sites

Isolate access to untrusted Office files


Exploit protection
Host intrusion prevention
Network protection Exploit mitigation

Controlled folder access Ransomware protection for your files

Block traffic to low reputation destinations


Device control
Protect your legacy applications
Web protection Only allow trusted applications to run

Ransomware protection
Identify Protect Detect and Respond Recover

Endpoint detection
and response

Detect, investigate, and disrupt


advanced persistent attacks.

Behavioral-based, AI-powered
real-time protection

Automatic attack disruption for


in-progress attacks

Live response to gain


access to devices
Identify Protect Detect and Respond Recover

Automatic Attack
Disruption

Use AI to automatically disrupt


sophisticated attacks and simplify
complexity for your IT teams

AI models deliver high-confidence signals


to identify complex threats in real-time​

Automatically disrupts in-progress attacks


and contains compromised users and
devices​

Reduces the overall cost and limits the


impact of an attack

Please see Documentation for more detail.


What is Defender for When we look at the steps an analyst is taking
Business AIR? as when investigating and remediating threats
we can identify the following high-level steps:

1 2
Security automation is…
mimicking the ideal steps a human
would take to investigate and
remediate a cyber threat Determining Performing necessary
whether the threat remediation actions
requires action

3 4
Security automation is not…
if machine has alert  auto-isolate

Deciding what Repeating this as many


additional investigations times as necessary
should be next for every alert
Delivering device security across platforms

Endpoints and servers Mobile devices Virtual desktops

Azure Virtual Desktop Windows 365


5 reasons to choose Microsoft 365 Security

1 2

Protect sensitive data Detect and investigate


ever ywhere , even in advanced threats
motion and when shared with built-in intelligence

3 4 5

Secure the Gain visibility, build Manage compliance


modern workplace insights, control data with built-in, comprehensive
with a unified endpoint with management controls coverage
management and Windows 11
THANK YOU

You might also like