Browsers are difficult Please wait, loading your map...
Control devices securityM365 securityhardening servicesSecure endpoints : 10%of breaches involvedransomeware. (Verizon2021 DBIR)Endpoint managementintune (Licencerequired)Link to Intune interfaceSecure O365 appLink to O365 interfaceMicrosoft Defender forEndpoin (Licencerequired)Link to intune interfaceSecure access : 25%attacks are reusingstolen credentials(verizon 2021 DBIR) -34% of data breaches in2018 involved internalactors (Verizon).Secure connectionMFALink to O365 interfaceAzure conditionnalaccess policies (licencerequired)Link to Azure AdinterfaceBlock legacyauthenticationprotocolsLink to Azure AdinterfaceSecure AuthorizationAdministrators rolesLink to O365 interfaceThird party applicationsAzure AD applicationpermissionsLink to Azure ADinterfaceScope MS graphPermission to accessmailboxesOffice 365 serviceaccounts permissionsTeams apps permissionsLink to O365 interfaceScope access toExchange web service"ApplicationImpersonation" rightScope access toExchange Web service"full_access_as_app"rightTemporaryadministrator access(licence required)Link to Azure ADinterfaceGuest accessLink to Azure ADinterfaceScoping Azure ADapplication rights tosomes users. To notallow an app to accessthe data of all O365usersAzure AD app accessingexchange onlineAzure AD app accessingteams/skypeAzure AD app accessingsharepoint ; site vssite.selected rightsCan also navigate to asite, generate client idusing /_layouts/15/AppRegNew.aspx at endof url of site and grantaccess to this client byadding /_layouts/15/appinv.aspx at end ofsite and following thislink itScoping impersonationaccess given to O365account in ExchangeOnlineLink to MSFT docSecure documentssharing : 23% of databreaches are caused byhuman error (IBM)Onedrive / Sharepointsharing optionsSharing linksconfigurationsLink to O365 interface :sharepoint admincenter > Policies >SharingSites permissionsTeams sharing optionsLink to external accessinterfaceData loss prevention(DLP) (licence required)Azure informationprotectionLink to O365 interfaceO365 DLP rulesLink to O365 interfaceProtection againstunauthorized e-mailsforwardingLink to O365 interfaceGuest accessLink to Azure ADinterfaceSecure e-mailing :36% of successfulldatabreach startedwith a phishing(verizon 2021 DBIR)Protect against knowncommercial spamsLink to O365 interfaceProtect against "displayname" impersonnationattack (licence required)Link to O365 interfaceProtect against "e-mailaddress impersonnationattacks" and phishersdetectionSPFSecureemailingservicesDKIMDMARCProtection againstunknown maliciousURLs in e-mails (licencerequired)Link to O365 interfaceProtection againstunknown attachmentsin e-mails (licencerequired)Link to O365 interfacePortection againstunknown commercialspamLink to O365 interfaceProtection against virusLink to O365 interfaceProtection againstpotentially dangerousexecutableLink to O365 interfaceHelping users to reportphishingLink to O365 interfaceProtection againstunauthorized e-mailsforwardingLink to O365 interfaceProtection against fakee-mail servers spoofingyour MX records in DNScachesProtection against "appconsent" phishingattacksLink to O365 interfaceEnhance filtering if EOPis not the first in lineAntispamLink to O365Non-repudiation ofactions : M365 andAzure AD logs are kept90 days. This is notenought since theaverage time to identifya breach in 2020 was228 days (IBM)Inspect audit logs andmanage logs retentionExchange audit logsCloud SaaS SIEMmanaged by OppidumSecurityAzure AD audit logsCloud SaaS SIEMmanaged by OppidumSecurityM365 Audit logsCloud SaaS SIEMmanaged by OppidumSecurityMS cloud app security(licence required)Link to O365Incident response : Theaverage time to containa breach was 80 days(IBM)Detecting an attacksSecurity dashboardsLink to O365 interfaceO365 security alertsalertsLink to O365 interfaceusers feedbacksScoping an attacksAzure AD audit logsLink to Azure ADinterfaceO365 audit logsLink to O365 interfaceExchange audit logsLink to O365 interface ;compliance > auditingLink to email threatexplorerData searchLink to O365 interfaceStopping an attackAzure AD disablingusersLink to Azure ADSender blacklistingLink to O365URL blacklisting (licencerequired)Link to O365Mass deletion ofmalicious e-mailsManagement of falsepositives

Created using MindMup.com