Microsoft Advanced Threat Analytics Brings the Behavioral Analytics Concept to IT and the Organization’S Users
Total Page:16
File Type:pdf, Size:1020Kb
Welcome Improved Security and Productivity using Office 365 & Microsoft Cloud What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks! System Source & Microsoft: ▪ Microsoft Certified Partner…since 1980’s • Silver – Learning Solutions • Train 6,000 students/year • Our Instructors rate 20% higher than Microsoft National Average Customer Satisfaction Scores. • Silver – Infrastructure ▪ 1,000’s of Microsoft implementations • Small Business to Enterprise • Non-profit • Education System Source & Microsoft: Microsoft Competencies • Server Platform • Hosting • Windows Server 2012 & 2016 • Exchange Server, SQL Server, Microsoft Server • Management and Virtualization • Microsoft Cloud Solutions, Microsoft • Devices & Deployment Private Cloud, Configuration • Windows 10, Office Manager, Windows Server • Small Business • Messaging • Office 365, Windows 10 • Exchange Server, Exchange Online, Exchange Online Protection • Mid-Market Solutions Provider • Microsoft Cloud Solutions, Office 365, Windows Server 2012 & 2016, Windows 10 Agenda System Source – Dave Ferg What is a secure environment? Identity and authentication security with Office 365 Email security features with Office 365 Microsoft - Steve Deming System Source Learning Center – Jack Underwood What is security? What is a secure environment? Organizations have varying degrees of security requirements. Regulations for financial, health, government, etc. Threats are evolving daily Viruses and malware Vulnerable software, data breaches, lost devices Hacked identities Ransomware, and more… What is a secure environment? Threats are attacking various targets. Data in transit Email and storage Servers and end devices Some threats are “innocent” Sending confidential information outside the organization Having data on unsecure devices – Unencrypted drives, removable media, unmanaged devices, etc. What is a secure environment? Security is a continuous process that requires depth, automation, education, and awareness. Protection Firewalls and other filtering tools Deployment tools Detection AV software / scanning tools Monitoring and notification Remediation Quarantine, clean, block, educate What is a secure environment? Security requires continuous monitoring and modification Security requires actions by the IT department to implement technology, but also education of the user community to protect against “innocent” mistakes and social engineering attacks. Is Office 365 secure? Microsoft provides Here you can find information about the information about: security of Office 365 at Privacy Compliance their Trust Center site Physical and infrastructure security https://www.microsoft.com/en- Data security such as encryption in us/trustcenter/cloudservices/office365 transit and at rest Identity security Operation and use safe guards Monitoring and remediation And much more… Microsoft’s Holistic Approach PROTECT DETECT ! RESPOND Microsoft’s Defense in Depth Strategy Office 365 Enterprise capabilities APPS SERVICES SECURITY ANALYTICS VOICE Cloud Productivity & Rich Communication and Advanced Enterprise Complete Cloud Insights for Everyone Mobility Collaboration Protection Communication Office Pro Plus: Exchange : Advanced Threat Protection: Power BI Pro: PSTN Conferencing: Office apps on up to 5 PCs & Macs Business-class email & Calendar Zero-day threat and malware Live business analytics and Worldwide dial-in for your online protection visualization meetings Mobile Office Apps: OneDrive: Cloud Storage and file sharing Advanced Security Management: Delve Analytics: Cloud PBX: Office Apps for Tablet & Enhanced visibility and control Individual and team effectiveness Business phone system in the cloud Smartphones SharePoint: Team sites & internal portals Threat Intelligence: PSTN Calling: Actionable insights to global attack Cost effective cloud based dial tone Skype for Business: threats (add-on) Online Meetings, IM, video chat Advanced Compliance: Microsoft Teams: Identifying the relevant data quickly Chat-based Collaboration and enhanced customer data access Yammer: controls. Private social networking Office 365 E3 Office 365 E5 Enterprise Mobility & Security capabilities Identity and access management Identity Driven Security Managed Mobile Productivity Information Protection Azure Active Directory Microsoft Advanced Threat Microsoft Azure Information Premium P1 Analytics Intune Protection Premium P1 E3 Single sign-on to cloud and on- Identify suspicious activities & Mobile device and app Encryption for all files and storage premises applications. Basic advanced attacks on premises. management to protect corporate locations. Cloud based file conditional access security apps and data on any device. tracking EMS Existing Azure RMS capabilities E5 Azure Active Directory Microsoft Azure Information EMS Premium P2 Cloud App Security Protection Premium P2 Advanced risk based identity Bring enterprise-grade visibility, Intelligent classification, & protection with alerts, analysis, & control, and protection to your encryption for files shared inside remediation. cloud applications. & outside your organization Secure Islands acquisition Identity Management Where are your Office 365 Identities? Microsoft Azure Active Directory Azure Active Directory (Azure AD) is Microsoft’s multi-tenant cloud based directory and identity management service. Azure AD also includes a full suite* of identity management capabilities including: Azure Multi-factor authentication Active Directory Device registration Self-service password management Self-service group management Privileged account management Role based access control Application usage monitoring Rich auditing and security monitoring and alerting. Active Directory * Subscription level (Free, Basic or Premium) determines features available Every paid subscription to Office 365 comes with a free subscription to Azure Active Directory. To activate this subscription and access the Azure management portal directly, you have to complete a one-time registration process. You can use Azure AD to manage your apps and to create and manage user and group accounts independent of Office 365. You can purchase Azure AD Basic and/or Premium directly or get the Premium edition as part of the Enterprise Mobility Suite. Identity Management with Office 365 Cloud identity with Cloud identity directory synchronization Azure AD Connect A free tool that can be installed on a domain controller Single identity in the cloud Suitable for small organizations with no Single identity integration to on-premises suitable for medium directories and large organizations without federation* Identity Management with Office 365 Cloud identity with Azure AD Connect directory synchronization Installation Password Synchronization – Passwords are stored in Azure AD Pass-through authentication – Passwords passed to on-premises AD for validation (no passwords in AAD) ADFS – Will deploy ADFS servers SSO – Browser login to Azure AD (works with password synchronization or pass-through Single identity authentication) suitable for medium and large organizations without federation* Directory Synchronization – SSO A computer account named AZUREADSSOACCT is created in the on-premises Active Directory and the Kerberos decryption key is shared securely with Azure AD. Two Kerberos service principal names (SPNs) are created to represent the cloud URLs that are used during authentication between the client and Azure AD. SSO Process – Browser login Azure AD challenges the client, via a 401 Unauthorized response, to provide a Kerberos ticket. The client requests a ticket from Active Directory for Azure AD. Active Directory locates the machine account and returns a Kerberos ticket to the client encrypted with the machine account's secret. The client sends the Kerberos ticket it acquired from Active Directory to Azure AD. Azure AD decrypts the Kerberos ticket. Directory Synchronization Considerations • Install on a Windows 2008 R2 - 2016 server • Configure OUs to synchronize • Optional – Configure attribute filtering Directory Synchronization Considerations Microsoft requires an Exchange server on-premises to manage Exchange attributes Password synchronization requires password changes to occur in Active Directory (unless a Premium Azure AD license is purchased) Account management is done on-premises for most settings Identity Management with Office 365 Cloud identity with Cloud identity directory synchronization Federated identity Single identity in the cloud Suitable for small organizations with no Single identity Single federated identity integration to on-premises suitable for medium and credentials suitable directories and large organizations without for medium and large federation* organizations Federation Directory Federation redirects all authentication to the on-premises AD Fault tolerant designs are necessary because if your ADFS servers are unreachable, there will be no access to your Office 365 resources Federated domains can be unfederated if needed SaaS Single Sign On SaaS SSO Microsoft has pre-built SSO connectors with thousands of SaaS vendors SaaS SSO Setup of SSO is done in the Azure AD console Using SSO reduces identity management tasks and standardizes credentials for application access. Multifactor Authentication Setup Multifactor Authentication Setup Multifactor