TrainingsNotesAzureMicrosoft 365Security
MS-500 - Security Administrator
- Configuring Privileged Identity Management
- Implementing MFA
- Mit O365 Einzelaktivierung möglich
- Implementing Self Service Password Reset
- All users or certain groups
- AAD P1 needed
- Password Alternatives
- Windows Hello for Business
- PIN
- Facial and finger print
- FIDO2
- Authenticator App
- Needs to be activated
- Windows Hello for Business
- Azure AD Access Reviews (Identity Governance)
- AAD P2 needed for users who do and create accessreview
- Azure AD Security Defaults
- Contain preconfigured security settings to prevent common atacks
- Basic level of securiy at no additional cost
- In conflict with CA
- All registers must register MFA in 14 days
- All Admins need MFA
- Old protocolsl ike IMAP, SMTP and POP3 will be blocked
- AAD Identity Protection
- AAD P2 needed
- Risky signin detection
- Enable automated responses to suspicious actions
- Types of risks detected:
- Sign-in from infected device
- Leaked credential
- Impossible travel
- Sign-in from unusual location
- Sign-in from suspicious or anonymous IP address
- Remediate risk events
- Manually reset user password
- Configure automated policy to remediate issue
- Receive notifications
- User risk detected messages
- Weekly digest email
Identity Synchronization
- SSO Options
- Azure AD Connect and AD FS
- Azure AD Connect with Password Synchronization and Seamless SSO
- Azure AD Connect with Pass-through Authentication and Seamless SSO
- Azure AD Connect Health
- Shows sync errors
- Sync services shows Azure AD Connects
- Agent for ADFS and ADDS available
- Planning Azure Connect with Multi Forest
- Autodiscover - Each Exchange forest must be authorative for at least one SMTP namespace and the coreesponding Autodiscover namespace
- Certificates -a single digitalcertificatec annot beused for multiple AD forests.
- Common Name must match the host being authenticated and is typically the etxernal hostname for the Client Access server in the AD forest
- Issuer - third party Certificate Authority that verfied the orgainzation information and issued the certificate, such as VeriSIgn or GoDaddy
- Every Forest will need to communicate with the Azure AD Connect agent on the server
- Azure AD Security Groups
- Created as local groups on domain joined servers and as domain groups if installed on a domain controller
- ADSyncAdmins
- FullAccess to AAD Connect
- ADSyncOperators
- Access to Azure AD Sync service manager
- ADSyncBrowser
- Has permission to gather information about a user's lineage when resetting password
- ADSyncPasswordSet
- Can perform all operations by using the password management interface
- Understanding Identity Federation
- Creates a trust relartionship between two organizations
- User authenticates against AD DS
- ADFS generates a claims token trusted by federation partner
- Access granted to resource based on Claims token
Managing External Access
- External sharing
- Office 365
- Azure AD B2B
- Azure AD free capabilities are available for guest users without additional licensing
- Guests dont needed licenses
- License calculation 1:5
M365 Security
- MS Strategy
- Effective defense dramatically increases the costs to the attacker
- Assume identities are always under attack
- Defense in depth is a must
- Protect, detect and respond
- Always assume you have been compromised
- Attacker only needs to find one vulnerability
- One advantage of the cloud is the shareds responsibility
- Cloud also provides better threat detection
- Large public cloud providers can invest billions
- Increate Attackers Cost
- Defend against cheapest attacks
- Prossess a good detection ands response process to limit attackers lateral movement
- Develop defense against potential and future attacks
- O365 ATP provides an attack simulator
- Using the secure score
- Improvement actions
- What is the Anti-Malware Pipeline?
- First mail is processed by techniques such as IP and sender reputation, combined with heuristics
- Next it is scanned by multiple signature-based anti-virus scanners
- EOP scans inviditual files
- Heuristic clustering is used to identitfy suspicious mail
- A sample from a cluster is sent to a hypervisor sandbox and the file is opened for further analysis
- Signals are collected, the results are run through a machine-learning (ML) method
- IF M365 ATP is eanbled, ATP extens the protection
- Zero-Hour Auto Purge
- Monitor updates to spam and malware signatures and can identify previously undetected malicious messages already in users inboxes
- Unopened spam is moved to junk mail
- Malware is stripped from mail regardless if it has been opened or not
- Reverse is also true
- Spoofing and Phishing Protection
- EOP supports email authentication technique
- Sender Policy Framwork (SPF)
- Domain Keys Identified Mail (DKIM)
- Domain-based Messaging and Reporting Compliance (DMARC)
- Spoof intelligence can provide insight into senders who are spoofing your domain
- E5 Plan needed or ATP license
- EOP supports email authentication technique
- Safe Attachments
- Needs ATP
- Dynamic Delivery not supported for OnPremise Hybrid System. Replace will be used instead
- Safe Links
- Microsoft Defender for Identity
- Monitor on premises domain controllers
- Captures network traffic and Windows events directly from your domain controllers
- Analyzes the data for attacks and threats
- AATP Sensor needed
- Application Guard
- Using hardware isolation, it helps prevent old and newly emerging attacks to help keep employees productive
- Define trusted web sites and everything not on your list is considered untrusted
- User opens untrusted site through Edge, then Edge opens the site in an isolated Hyper-V-enabled container
- Application Control
- W10 Entterprise license needed
- Applications are untrusted by default
- Can block unsigned scripts and MSIs
- Application control policies apply to the computer as a whole and affect all users
- Applications control rules include
- Attributes of the codesigning certificate
- Attributes of the apps binaries such as filename, version or hash
- The reputation determined by MS Intelligent Security Graph
- The identity of the process that initiated the installation
- The path from which the app or file is launched
- The process that launched the app or binary
- Defender Exploit Protection
- On by default
- Host intrusion prevention capabilities from Windows 10
- Exploit protection
- Attack surface reduction rule
- Network protection
Threat intelligence
- Azure Sentinel
- Cloud native SIEM (Security information and event management) tool that is built on Azure
- Using the cloud and artifical intelligence to help security operations teams identify and stop cyber-attacks before they cause harm
- Includes MS threat intelligence stream and external threat intelligence streams
- Collect data cloud scale
- Detect previously undetected threats
- Investigae threats with artifical intelligence
- Automate response to incidents
Information Protection
- Classifying Data
- Create or view a document with protection enabled you will have four data classification option
- Automatic, Recommended, Reclassification, User-set
- When a user sets a manual label, then it wont be automatically replaed
- Create or view a document with protection enabled you will have four data classification option
- Sensitivity Labels (Unified labeling)
- Metadata written to documents
- Stay in clear text so DLP can read them
- Travel with document regardless of location
- Creation within compliance center -> information protection
- Preview: Labels for Azure, including SQL columns, files Azure Blob Storage and more
- Documents can be encrypted and expire
- Assign permissions can be: users, group, all auth users, specific email addresses or domains
- Content marking: watermark, add a header/footer
- Protection setting for groups and sites: Privacy and external user access settings, external sharing and conditional access settubgs
- Labels are distributed by label policies to users
- Apply this label by default?
- Justification needed to remove label?
- Enforces user to set a label
- Provide user with a link to help page
- Auto labeling policy avilable
- AIP Super User
- Ensures authorized people and services can always read and inspect the data that Azure Rights Management protectsf for your organization
- If not Enabled by default
- Must use PowerShell to enable Super User and assign users or groups to it
- Enable-AadrmSuperUserFeature
- Set-AadrmSuperUserGroup
- Once enabled and assigned, can use it to manage protected content via PowerShell
- Protect-RMSFile
- Unrpotect-RMSFile
- Set-AIPFIleLabel
- To monitor activity of RMS Admins
- Get-AadrmAdminLog
- Customer Lockbox (E5 / Security Addon)
- If Customer Lockbox is activated, then the Support Engineer sends a request from their superior and the customer needs to approve the access
- Protecting Data Access in Microsoft 365
- MSFT_cloud_architecture_identity&device_protection.pdf
- Windows Information Protection
- Differentiates between corporate and personal data
- Data generated by or coming from a corporate app is tagged as work
- WIP provides the ability to:
- Encrypt enterprise data on corporate-owned and employee-owned (BYOD) devices
- Remotely wipe corporate work data off managed computers
- Stop non-protected apps from accessing corporate work data
- WIP prerequisites
- Deivce or Application Management solution that supports WIP (Intune)
- WIP policies with app protection settings
- Determine which Encyprtion Key to use
- Determine which Policy Protection Mode to use
- Configure your intelligent network boundaries
- M365 Encryption
- Data at rest
- Distributed Key Manager (DKM) or BItLocker in Microsoft datacenters
- Data in Transit
- TLS for files in transit
- Message Encryption with Azure Rights Management, S/MIME, and TLS for email in transit
- Rights Management in Exchange
- Can be applied by user manually or automatically in Outlook or OWA or via transport rules in Exchange Online
- Helps to protect restricted content
- Prevent forwaring, modifying, printing, faxing, saving, or cuttin and pasting the content
- Supports expiration of IRM-protected messages and attachments
- Prevents IRM-protected content from being copied using snipping tool
- Connect prevent all methods such as cameras, transcription or third party screen grab
- Automatically attaches a pre-license to proteced messages
- Client does not need repeated trips to server to get a user license
- Enables offline viewing IRM-protected messages and files
- Enables messages to be viewed in Outlook on the web
- Rights Management in SharePoint
- Needs to be activated/refreshed in the SharePoint Admincenter settings for all sites
- Under the library settings IRM can be enforced for alle files/documents
- Comparing IRM vs AIR in SharePoint
- When working with IRM protection
- Connot use the default or custom protection templates that you manage in the Azure Portal
- Protected PDF files are not supported (ppdf)
- Co-authoring is not supported
- AIP works on the client-side vs IRM working on the server-side
- When working with IRM protection
- Secure Multipurpose Internet Mail Extension (S/MIME)
- A protocal to digitally sign and encrypt email messages
- Append a digital signature to an email message
- Encryption an email message body and attachments
- Digital Signatures
- Provides Authentication, Data integrity and Nonrepudiation
- Signing process
- Message body is captured
- Hash value of the message is calculated
- Sender's private key is retrieved
- Hash value in ecrypted with the sender's private key
- Encrypted hash value is appended tothe message as the digital signature
- Digital Signatures and Encryption
- Message is captured
- Hash value of the message is calculated
- Sender's private key is retrieved
- Recipient's public key is retrieved
- Hash value is encrypted with the sender's private key
- Encrypted hash value is appended to the message as a digital signature
- One-time symmetric session key is generated
- Encryption operation is performed on a message using the session key
- Session key in encrypted using the recipient's piblic key
- Encrypted session key is included withthe encrypted message
- Message is sent
- Data at rest
- Data Loss Prevention (DLP)
- Infos
- Used to identify, monitor, report, and protect sensitive data
- Protect content in Exchangeemail, Teams chats and channel messages, and OneDrive/SharePoint documents
- Customize level of restrictions by creating DLP policies
- Simply warn users
- Black from sharing sensitive data to unauthorized users
- Block from sharing sensitive data altogether
- DLP conditions
- Content, such as the type of sensitive information you're looking
- Also, context such as who the document is shared with
- DLP actions
- Block access to the content
- Send a notification
- Display a policy tip
- Allow usersto override the configured action
- Document Protection through DLP Policies
- Leverage FCI properties or properties applied in SharePoint
- Create a managed property in the SharePoint admin center
- Content is protected after property is detected which does not happen instantly
- Infos
- Cloud App Security
- Overview
- Discover and control the use of Shadow IT
- Protect your sensitive information anywhere in the cloud
- Protect against cyberthreats and anomalies
- Assess the compliance of your cloud apps
- Cloud discovery
- Provide log files from local firewall
- Overview
- Archiving and Retention
- In-place Archiving in Exchange
- Online archive
- Not cached as part of the offline store files (.ost)
- Reduce compliance issue caused by personal store files (pst)
- Included in E3 and higher plans, can be added on to others
- Unlimited archive starts at 100GB, can turn on auto-expanding archiving via PowerSHell using Set-OrganizationConfig -AutoExpendingArchive
- In-place Records Management in SharePoint
- Activated by site collection
- A records Center site
- Manage Records in Place
- Activate in-Place Records Management at the Site Collection Level
- Configure Record Declaration Settigns at the Site, List or Library Level
- Messaging Records Management
- Supports users by cleaning up their primary mailboxes to improve performance
- Uses retention tags to apply retention settings to items and folder
- Default policy tag
- Retention policy tag
- Overrides default policy tag
- Personal tag
- Overrides retention policy tag
- Retention policies
- Retain items to comply with industry regulations and internal policies
- Can apply retention across all services in O365
- Allow users to continue to work while still meeting compliance requirements
- Reduce your risk in the event of litigation or a security breach
- Decide proactively whetere to retain content, delete content, or both
- In-place Archiving in Exchange
- Data Gorvernant
- Microsoft 365 security roadmap - Top priorities - Office 365 | Microsoft Docs
- Download File Protection Solutions for Office 365 from Official Microsoft Download Center
- MSFT_cloud_architecture_identity&device_protection.pdf