MICROSOFT 365 SECURITY
Microsoft 365
Secure productivity
Devices Operating system Security Management Collaboration
that meet specific that’s secure, easy to manage, that defends against cyberattacks that is built for a heterogenous device that connects every employee
job requirements update, and use across multiple platforms estate, including personal devices across all devices
Eliminate redundant solutions
Zero-Trust foundations Elevate your endpoint security
BUILD A ZERO-TRUST
FOUNDATION
KEEP YOUR DATA SAFE AND
DEFEND AGAINST
ADVANCED CYBERTHREATS
Zero-Trust is the foundation of great security
Secure and Defend against threats Protect sensitive information
manage identities on multi-platforms across data estate
Keep your data safe from unauthorized access when
passwords are lost or stolen with multi-factor authentication. Microsoft Defender Microsoft Intune
for Endpoint P1
Defend against advanced cyberthreats and safeguard business
data with enterprise-grade protection against phishing,
ransomware, and data loss.
Azure Information Azure AD
Protection Premium P1
Secure and manage
identities Verify every
access attempt
Signals
01 Enhance security, simplify access: Control
User and
“where, when, and who” connects to Office apps Location Allow access
with Conditional Access. Identities Device
Application
Real- time risk
02 Craft your path to passwordless with adaptive
policies requiring multifactor authentication and Azure Active Require MFA
Directory
phishing protection.
Policy
engine
03 Give users prompts to unblock themselves and Limit access
get back to work with password change or reset—
no admin or help desk needed. Endpoints
Conditional Access +
Continuous Access
Password reset
04 Perform Continuous Access Evaluation to Intune
Evaluation
remediate potential compromise in real-time. Azure AD
Monitor access
Protect against lost or stolen passwords with multi-
factor authentication
Verify user identities with strong authentication
Including passwordless technology
Microsoft Windows FIDO2 Biometrics
Authenticator Hello security key
Multi-factor
authentication
prevents 99.9%1
of identity attacks
We support a broad
range of multi-factor Push Soft Hard SMS,
authentication options notification Tokens OTP Tokens OTP voice
Protect sensitive information
across your data estate
Cloud
01 Encrypt data at rest, in transit, and in use.
02 Discover and classify sensitive content at scale Excel
and extend protection to Microsoft and non-
Microsoft apps.
03 Address threat of data theft or exposure
from lost, stolen, or inappropriately
decommissioned computers.
04 Preserve content by custodian and send
hold notifications.
On-premises
ELEVATE YOUR ENDPOINT
SECURITY
CONTROL FOR WORK DATA
AND DEVICES
Microsoft Defender
Elevate your security
AI-powered device protection specially designed for advanced security
Enterprise-grade protection Easy to use Cost-effective
Protect your devices against ransomware Easy, wizard-based onboarding and out of the One affordable solution optimized
and other cyberthreats with industry-leading box policies get you up and running quickly. for your business instead of separate
Defender technologies like vulnerability Simple monthly summary reports show you and expensive add-ons.
management and endpoint detection threats detected and prevented so you know
and response with AI-powered automatic Defender is working around the clock to
attack disruption. help protect you.
Traditional antivirus vs. Defender for Business
Defender for Business offers comprehensive
device and server security
Traditional antivirus software only Improves visibility and response time to
cyberattacks with endpoint detection and response
protects a fraction of your business
Identifies and stops emerging cyberthreats with
Vulnerable to unknown cyberthreats next generation antivirus protection
Attacks can bypass protection Continuously protects your business from
malicious activity through automated investigation
and remediation and automatic attack disruption
Lacks protection against malicious websites
Tracks vulnerabilities across your most
critical assets
Defender for Business
Cybersecurity Framework map
Identify Protect Detect and respond Recover
Vulnerability Attack surface reduction Endpoint detection Automated investigation
management Next-generation protection and response and remediation
Microsoft Defender
Elevate your security
Vulnerability Attack surface Next generation Endpoint detection and Auto investigation
management reduction protection response and remediation
Simplified onboarding and administration
Identify Protect Detect and Respond Recover
Vulnerability management
A risk-based approach to mature your
vulnerability management program.
Continuous real-time
discovery
Context-aware
prioritization
Built-in, end-to-end
remediation process
Identify Protect Detect and Respond Recover
Attack surface
reduction
Protect against risks by reducing
the surface area of attack.
System hardening
without disruption
Customization that
fits your business
Visualize the impact
and simply turn it on
Attack surface reduction
Resist attacks and exploitations
HW-based isolation
Application control Isolate access to untrusted sites
Isolate access to untrusted Office files
Exploit protection
Host intrusion prevention
Network protection Exploit mitigation
Controlled folder access Ransomware protection for your files
Block traffic to low reputation destinations
Device control
Protect your legacy applications
Web protection Only allow trusted applications to run
Ransomware protection
Identify Protect Detect and Respond Recover
Endpoint detection
and response
Detect, investigate, and disrupt
advanced persistent attacks.
Behavioral-based, AI-powered
real-time protection
Automatic attack disruption for
in-progress attacks
Live response to gain
access to devices
Identify Protect Detect and Respond Recover
Automatic Attack
Disruption
Use AI to automatically disrupt
sophisticated attacks and simplify
complexity for your IT teams
AI models deliver high-confidence signals
to identify complex threats in real-time
Automatically disrupts in-progress attacks
and contains compromised users and
devices
Reduces the overall cost and limits the
impact of an attack
Please see Documentation for more detail.
What is Defender for When we look at the steps an analyst is taking
Business AIR? as when investigating and remediating threats
we can identify the following high-level steps:
1 2
Security automation is…
mimicking the ideal steps a human
would take to investigate and
remediate a cyber threat Determining Performing necessary
whether the threat remediation actions
requires action
3 4
Security automation is not…
if machine has alert auto-isolate
Deciding what Repeating this as many
additional investigations times as necessary
should be next for every alert
Delivering device security across platforms
Endpoints and servers Mobile devices Virtual desktops
Azure Virtual Desktop Windows 365
5 reasons to choose Microsoft 365 Security
1 2
Protect sensitive data Detect and investigate
ever ywhere , even in advanced threats
motion and when shared with built-in intelligence
3 4 5
Secure the Gain visibility, build Manage compliance
modern workplace insights, control data with built-in, comprehensive
with a unified endpoint with management controls coverage
management and Windows 11
THANK YOU