SlideShare una empresa de Scribd logo
1 de 34
Office 365 Security Best Practices
Webinar
Series
Sept 2018
About Community IT
Advancing mission
through the effective use
of technology.
100% Employee Owned
Presenter
Johan Hammerstrom
President & CEO
Presenter
Matthew Eshleman
CTO
Agenda
• Current Threat Landscape
• Office 365 Security Overview
• Features & Licensing
• Security Checklist with Office 365
• Accessing the Microsoft Security Graph
The current threat landscape
Office 365 is a target
30% 63% 58%
Email Logins Files
Why are attacks so successful?
30% 63% 58%
Why are attacks so successful?
30% 63% 58%It only takes hackers 4 minutes to get in your network,
but 99+ days for businesses to discover they’ve been
breached.
Securing Office 365
Simple
One solution
Cloud platform simplifies deployment
Reduces costs
Eliminates costs for multiple third-party
vendor solutions
Reduces maintenance and management costs
Aligns with business goals
Security built into your productivity platform
Don’t need to make trade-offs to justify
security investment
Protect business against risk-related costs
Microsoft 365 Business
Business savvy way to reduce risk
• Safeguard
• Keep credentials safe
• Limit use of credentials
• Confirm identity with multi-factor authentication (MFA)
• Prevent non-compliant devices from accessing system
• Monitor
• Audit data access
• Review login locations
• Respond quickly to detected threats
Control who has access to business information
81%
75%
Office 365 Licensing
Feature
Feature Bundle (Subscription)
License
Feature Bundle (Subscription)
License
a la Carte (License)
Features
Feature License Bundle
Cloud MFA Included in Office 365 Part of all O365 subscriptions
Granular MFA Requires Azure AD P1 Part of EM+S E3
Password Writeback Requires Azure AD P1 Part of EM+S E3
DLP Requires Exchange P2 Part of O365 E3
Azure Identity Protection Requires Azure AD P2 Part of EM+S E5
Email and File Encryption Requires Azure RMS Part of O365 E3
Cloud App Security Requires License Part of EM+S E5 or Cloud App SKU
SSO Requires Azure AD P1 Part of EM+S E3
Manage Computers Intune Part of EM+S E3
Office 365 Licensing
Recommended SKU's Per User Cost
(charity pricing)
Office 365 E3
(or Office 365 E1 + Office ProPlus Add-on)
$4.50/mo
($0/mo + $3/mo)
EM+S E3
(or EM+S E5)
50 free,
$2.25/mo ($6/mo)
Azure Sponsorship Subscription $5,000 annual credit
Cloud App Security $1.20/mo
What am
I missing?
E1 + Office ProPlus + EM+S does not include
• Information Protection
• DLP for email
• Unlimited email storage
• Litigation hold
https://technet.microsoft.com/en-
us/library/office-365-plan-options.aspx
Office 365 Security
Security
Checklist
 View Your Secure Score
https://securescore.office.com
 Enable Auditing in
https://protection.office.com
Message Trace
 Get Signed up for EM+S
https://www.microsoft.com/en-
us/nonprofits/enterprise-mobility-security
 Get Signed up for Azure Sponsorship
https://www.microsoft.com/en-
us/nonprofits/azure
 Link Azure AD with PowerBi
https://app.powerbi.com
SecureScore
Establish security baseline
Continuous monitoring and reporting to reduce
risk
Integrate data into compliance or
cybersecurity apps to improve overall protections
Admin
Security
Checklist
Have between 2-5 Global Admins
Turn on MFA for Staff
Complex Passwords for All
•Personally Identifiable Information
•Financial Information
Enable DLP in Office 365
•DMARC, DKIM, SPF
Secure Email
Require Disk Encryption
Review Audit data
End User Security Checklist
Pick a strong password
Chose unique passwords for each service
•Most recent breaches we've seen are probably email/password combinations
reused from previously compromised user account databases
Be cautious when clicking
•Learn the value of hovering over "friendly" link names
•Watch for domain names that look legitimate at first glance, but don't
actually match the real domain name of the destination you expect.
Report suspicious activity to your IT Team
MFA Enrollment
MFA Login
Advanced Controls
• Information Rights Management: Define policies for
who can access data
• Restrict access to OneDrive and Control Sync
• Managed device access to organizational data
• Configure Advanced Threat Analytics: Integrate on-
prem with the cloud for unified management
• Use Defender Advanced Threat Protection
Advanced Settings
• Configure Monitoring in
PowerBi
• Azure Active Directory
Logs
Links
• https://nonprofit.microsoft.com/#/register
• https://www.microsoft.com/en-
us/nonprofits/enterprise-mobility-security
• https://azure.microsoft.com/en-
us/pricing/details/active-directory/
• TechSoup Digital Security
https://techsoup.course.tc/catalog/track/digital
-security
Upcoming
Webinar
Security Incident Response
Wednesday October 17
4:00 – 5:00 PM EST
Questions?

Más contenido relacionado

La actualidad más candente

Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 

La actualidad más candente (20)

Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
Azure sentinel
Azure sentinelAzure sentinel
Azure sentinel
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
SC-900+2022.pdf
SC-900+2022.pdfSC-900+2022.pdf
SC-900+2022.pdf
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 

Similar a Office 365 Security Best Practices

Similar a Office 365 Security Best Practices (20)

Microsoft Cloud options
Microsoft Cloud optionsMicrosoft Cloud options
Microsoft Cloud options
 
Office 365 Security - Its 2am do you know whos in your office 365
Office 365 Security - Its 2am do you know whos in your office 365Office 365 Security - Its 2am do you know whos in your office 365
Office 365 Security - Its 2am do you know whos in your office 365
 
Presentation-PracticalGuideToHavingACustomerConversationOnSecurity (1).pptx
Presentation-PracticalGuideToHavingACustomerConversationOnSecurity (1).pptxPresentation-PracticalGuideToHavingACustomerConversationOnSecurity (1).pptx
Presentation-PracticalGuideToHavingACustomerConversationOnSecurity (1).pptx
 
Andy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep diveAndy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep dive
 
Office 365 for Business Demystified for the average Technology and Business P...
Office 365 for Business Demystified for the average Technology and Business P...Office 365 for Business Demystified for the average Technology and Business P...
Office 365 for Business Demystified for the average Technology and Business P...
 
Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 Enterprise
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
SMB Security Microsoft 365 - Deployment
SMB Security Microsoft 365 - DeploymentSMB Security Microsoft 365 - Deployment
SMB Security Microsoft 365 - Deployment
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
Rencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
Rencore Webinar: Advanced Security Management within Office 365 with Liam ClearyRencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
Rencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptx
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know Webinar
 
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
 
Savings, security, and stability: how ShareGate benefits everyone
Savings, security, and stability: how ShareGate benefits everyoneSavings, security, and stability: how ShareGate benefits everyone
Savings, security, and stability: how ShareGate benefits everyone
 

Más de Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Community IT Innovators
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
Community IT Innovators
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
Community IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Community IT Innovators
 

Más de Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 

Último

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Último (20)

THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 

Office 365 Security Best Practices

  • 1. Office 365 Security Best Practices Webinar Series Sept 2018
  • 2. About Community IT Advancing mission through the effective use of technology. 100% Employee Owned
  • 5. Agenda • Current Threat Landscape • Office 365 Security Overview • Features & Licensing • Security Checklist with Office 365 • Accessing the Microsoft Security Graph
  • 6. The current threat landscape
  • 7. Office 365 is a target 30% 63% 58% Email Logins Files
  • 8. Why are attacks so successful? 30% 63% 58%
  • 9. Why are attacks so successful? 30% 63% 58%It only takes hackers 4 minutes to get in your network, but 99+ days for businesses to discover they’ve been breached.
  • 11. Simple One solution Cloud platform simplifies deployment Reduces costs Eliminates costs for multiple third-party vendor solutions Reduces maintenance and management costs Aligns with business goals Security built into your productivity platform Don’t need to make trade-offs to justify security investment Protect business against risk-related costs Microsoft 365 Business Business savvy way to reduce risk
  • 12. • Safeguard • Keep credentials safe • Limit use of credentials • Confirm identity with multi-factor authentication (MFA) • Prevent non-compliant devices from accessing system • Monitor • Audit data access • Review login locations • Respond quickly to detected threats Control who has access to business information 81% 75%
  • 17. Features Feature License Bundle Cloud MFA Included in Office 365 Part of all O365 subscriptions Granular MFA Requires Azure AD P1 Part of EM+S E3 Password Writeback Requires Azure AD P1 Part of EM+S E3 DLP Requires Exchange P2 Part of O365 E3 Azure Identity Protection Requires Azure AD P2 Part of EM+S E5 Email and File Encryption Requires Azure RMS Part of O365 E3 Cloud App Security Requires License Part of EM+S E5 or Cloud App SKU SSO Requires Azure AD P1 Part of EM+S E3 Manage Computers Intune Part of EM+S E3
  • 18. Office 365 Licensing Recommended SKU's Per User Cost (charity pricing) Office 365 E3 (or Office 365 E1 + Office ProPlus Add-on) $4.50/mo ($0/mo + $3/mo) EM+S E3 (or EM+S E5) 50 free, $2.25/mo ($6/mo) Azure Sponsorship Subscription $5,000 annual credit Cloud App Security $1.20/mo
  • 19. What am I missing? E1 + Office ProPlus + EM+S does not include • Information Protection • DLP for email • Unlimited email storage • Litigation hold https://technet.microsoft.com/en- us/library/office-365-plan-options.aspx
  • 21. Security Checklist  View Your Secure Score https://securescore.office.com  Enable Auditing in https://protection.office.com Message Trace  Get Signed up for EM+S https://www.microsoft.com/en- us/nonprofits/enterprise-mobility-security  Get Signed up for Azure Sponsorship https://www.microsoft.com/en- us/nonprofits/azure  Link Azure AD with PowerBi https://app.powerbi.com
  • 22. SecureScore Establish security baseline Continuous monitoring and reporting to reduce risk Integrate data into compliance or cybersecurity apps to improve overall protections
  • 23.
  • 24. Admin Security Checklist Have between 2-5 Global Admins Turn on MFA for Staff Complex Passwords for All •Personally Identifiable Information •Financial Information Enable DLP in Office 365 •DMARC, DKIM, SPF Secure Email Require Disk Encryption Review Audit data
  • 25. End User Security Checklist Pick a strong password Chose unique passwords for each service •Most recent breaches we've seen are probably email/password combinations reused from previously compromised user account databases Be cautious when clicking •Learn the value of hovering over "friendly" link names •Watch for domain names that look legitimate at first glance, but don't actually match the real domain name of the destination you expect. Report suspicious activity to your IT Team
  • 28. Advanced Controls • Information Rights Management: Define policies for who can access data • Restrict access to OneDrive and Control Sync • Managed device access to organizational data • Configure Advanced Threat Analytics: Integrate on- prem with the cloud for unified management • Use Defender Advanced Threat Protection
  • 29. Advanced Settings • Configure Monitoring in PowerBi • Azure Active Directory Logs
  • 30.
  • 31.
  • 32. Links • https://nonprofit.microsoft.com/#/register • https://www.microsoft.com/en- us/nonprofits/enterprise-mobility-security • https://azure.microsoft.com/en- us/pricing/details/active-directory/ • TechSoup Digital Security https://techsoup.course.tc/catalog/track/digital -security
  • 33. Upcoming Webinar Security Incident Response Wednesday October 17 4:00 – 5:00 PM EST

Notas del editor

  1. - What is your best guidance for balancing security, with reasonable policies that do not unreasonably impede team productivity?