{"id":80240,"date":"2021-12-17T02:45:38","date_gmt":"2021-12-17T08:15:38","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=80240"},"modified":"2022-01-06T23:27:55","modified_gmt":"2022-01-07T04:57:55","slug":"threat-protection-with-microsoft-365-defender","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/threat-protection-with-microsoft-365-defender\/","title":{"rendered":"Threat Protection with Microsoft 365 Defender"},"content":{"rendered":"<h2><b>What is Microsoft 365 Defender?<\/b><\/h2>\n<p><i><span style=\"font-weight: 400;\">Microsoft 365 Defender is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attack<\/span><\/i><span style=\"font-weight: 400;\">s.<\/span><\/p>\n<h3><b>What does the M365 Suite do?<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protects against the threats and attackers<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Whizlabs, on 27 November 2021,\u00a0 conducted a well organised webinar on \u2018Threat Protection with Microsoft 365 Defender\u2019 with Mr. Anand Rao.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anand Rao is a Senior Technical Instructor and a Cloud Consultant with more than 15 years of experience. He<\/span><span style=\"font-weight: 400;\"> started with break fix environments and troubleshooting mainly on Microsoft platforms. With his forte being Directory services, he has been working on Identity and Access Management Systems for the\u00a0 last 15 years. He started working on Cloud in 2012 and to date, he has worked with various cloud platforms like Azure, Microsoft Services, Amazon web services, and more. His passion for Cyber Security got him certified in Ethical Hacking and Computer Security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following is the brief on his detailed explanation and discussion during the Webinar.<\/span><\/p>\n<h4><b>What is a Threat?<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Threats are potential weaknesses and the <\/span><b>attackers<\/b><span style=\"font-weight: 400;\"> capitalise on these weaknesses to infiltrate the organisation. The attackers will cross multiple domains so when the attacker is trying to get into your environment, they will not take the front door, instead, they will do reconnaissance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Reconnaissance is a military term that means doing thorough research on the enemy. Is it possible to take the equipment or ammunition there, are there enough food and supplies available, can we take the road or should we presume airways?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In simple words, <\/span><b>planning and preparing<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, how do the attackers figure out these things in lieu of Cyber Security?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They will figure out their attack space through emails, identities such as user accounts using the user id and password, endpoints that are devices like mobile phones, android, iOS, laptops, and other applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attackers will use their vulnerability and enter the infrastructure, i.e. the <\/span><b>attack surface<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The smaller the attack surface, the better it is for the infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Defence solutions, apart from Microsoft365 Defender, are Checkpoint, Barracuda Palo alto, and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sim solutions that aggregate all the logs altogether pave a new way for logs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today defence solutions have been designed for multiple purposes like, to:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detect<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Block<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">A defender protects your business from becoming vulnerable to these attacks, detects them on time and, the final step is to block the threats from each of the domains i.e. endpoints, apps, emails, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, the job of the whole M365 defender suite is to protect your identities, endpoints, applications onboarded to Microsoft Azure and other third party applications, and your emails and documents in office 365.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What if you are using Hybrid Cloud or AWS, Google Cloud or SAS providers like DocuSign, box and Dropbox solutions, Salesforce or ITSM solutions like ServiceNow?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The answer is, this is a one stop solution for all the domains like endpoints, applications, and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Cyber security teams are facing a lot of risks at present, but at the very same time, there are many tools available that provide advanced security analytics like Machine learning, making it possible to fight back with agility and adaptable defence systems. The security teams have to go through a number of alerts, some of which are legitimate while some of them are false positives and noises that are displayed on logs, which means significant damage to all the hard work that is hard to handle.<\/span><\/p>\n<h4><b>Some facts<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An average large organisation monitors a minimum of <\/span><b>17000 malware warnings<\/b><span style=\"font-weight: 400;\"> each week.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It takes <\/span><b>99 days<\/b><span style=\"font-weight: 400;\"> for an organisation of this scale to discover a breach, which means it gives a huge amount of time to the attacker to enter inside and collect all the data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It takes less than <\/span><b>48 hours<\/b><span style=\"font-weight: 400;\"> for an attacker to take complete control of the network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Around <\/span><b>4 million dollars<\/b><span style=\"font-weight: 400;\"> is the average cost of a data breach to a company.<\/span><\/li>\n<\/ul>\n<h4><b>What are the common threats?<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Credential Theft: password spray attacks and collects the credentials.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Malware: MALicious softWARE, for instance, Ransomware<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phishing: For example, creating an email and when a person clicks on it, it copies the data to an attacker system.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Infrastructure attacks: kind of physical attacks done sometimes via pen drive being inserted into the system that contains the data.<\/span><\/li>\n<\/ul>\n<h4><b>Timeline of an attack<\/b><\/h4>\n<p><img decoding=\"async\" class=\" wp-image-80243 aligncenter\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Timeline-of-an-attack-300x169.png\" alt=\"Timeline of an attack\" width=\"569\" height=\"321\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Timeline-of-an-attack-300x169.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Timeline-of-an-attack.png 512w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The attacker performs research and preparation alias Reconnaissance, or OSINT (open source intelligent information) collection or aggregates data from the previous attacks. Just when the attacker has all the information, it will attack the system. It will then use phishing and get the first system affected, called <\/span><b>Patient zero<\/b><span style=\"font-weight: 400;\">, going further to privilege escalation leading to credential theft wherein they make use of admin tools and compromise on the configuration of the machine. Thus, the attacker goes from one system or server to another and then many, thereby achieving <\/span><b>Domain Dominance<\/b><span style=\"font-weight: 400;\">. Here, they unlock the Admin credentials, the key to any system. Now they have everything that they need, that is Intellectual property proprietary information, formulas, maps, and more data. Then comes the data exfiltration which includes running some scripts and the attackers spend a considerable amount of time and there they go undetected for over 200 days.\u00a0<\/span><\/p>\n<h4><b>What are the capabilities of Microsoft 365 Defender Suite?<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Microsoft Defender for Endpoints<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Microsoft Defender for Office 365<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Microsoft Defender for Identities: For example, user id and passwords<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Applications with MCAS: Microsoft Cloud Access Security Broker is a tool to protect the applications onboarded.<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\" wp-image-80244 aligncenter\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Capabilities-of-Microsoft-365-300x53.png\" alt=\"Capabilities of Microsoft 365\" width=\"1189\" height=\"210\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Capabilities-of-Microsoft-365-300x53.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Capabilities-of-Microsoft-365.png 512w\" sizes=\"(max-width: 1189px) 100vw, 1189px\" \/><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\">So, Microsoft Defender, which is an evolving tool and has machine learning, consumes signals from various domains, through investing, detecting, and performing a cross domain analysis within its environment.<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To get hands-on experience on Microsoft Defender, please watch the YouTube video below, where Mr. Anand Rao has set up a lab and explained all the aspects in full detail.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><a href=\"https:\/\/www.youtube.com\/watch?v=wYqWAWCR95U&amp;t=1336s\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.youtube.com\/watch?v=wYqWAWCR95U&amp;t=1336s<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Microsoft 365 Defender? Microsoft 365 Defender is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks. What does the M365 Suite do? Protects against the threats and attackers Whizlabs, on 27 November 2021,\u00a0 conducted a well organised webinar on \u2018Threat Protection with Microsoft 365 Defender\u2019 with Mr. Anand Rao. Anand Rao is a Senior Technical Instructor and a Cloud Consultant with more than 15 years of experience. He started with break fix environments and troubleshooting mainly on Microsoft [&hellip;]<\/p>\n","protected":false},"author":359,"featured_media":80246,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[3982,29],"tags":[4778,4777],"class_list":["post-80240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-power-platform","category-webinar","tag-microsoft-365-defender","tag-microsoft-suite-365"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",560,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender-150x150.jpg",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",560,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",560,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",560,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",560,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender-250x250.jpg",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",560,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",96,54,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2021\/12\/Threat-Protection-with-365-Defender.jpg",150,84,false]},"uagb_author_info":{"display_name":"Abilesh Premkumar","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/abilesh\/"},"uagb_comment_info":0,"uagb_excerpt":"What is Microsoft 365 Defender? Microsoft 365 Defender is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks. What does the M365 Suite do? Protects against the threats and attackers Whizlabs, on 27 November 2021,\u00a0&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/80240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/359"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=80240"}],"version-history":[{"count":6,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/80240\/revisions"}],"predecessor-version":[{"id":80273,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/80240\/revisions\/80273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/80246"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=80240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=80240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=80240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}