Reader small image

You're reading from  Microsoft 365 Security and Compliance for Administrators

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781837638376
Edition1st Edition
Right arrow
Authors (2):
Sasha Kranjac
Sasha Kranjac
author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

Omar Kudović
Omar Kudović
author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović

View More author details
Right arrow

Microsoft Defender for Office 365

Nowadays, especially after the COVID-19 pandemic, companies are increasingly shifting their focus to protecting their systems, information, and data. This is important because companies have a lot of questions about the principles of working from home. And because of that, good planning for setting up protection and secure access to information from different remote locations is a big challenge.

Working from home can pose a risk to secure access to information, and it is important to point out that many employees do not have proper protection at home in terms of network security. All devices used to access information and send and receive emails are significant targets of attacks aiming to get hold of information. One of the biggest challenges that companies face is implementing sufficient protection for sending/receiving emails. In addition to protection against viruses, malware, and phishing, the training and proper education of employees is a...

Technical requirements

To access Microsoft Defender for Office 365, you need to have one of the previously mentioned licenses and administrator rights. It is enough to have Global Administrator rights to do any of the required configurations for the service. However, if you need to allocate access rights and activity permissions for the Microsoft Defender for Office 365 portal, then it is necessary to create a security group in Microsoft Entra ID and assign the following necessary administrator roles:

  • Security Administrator
  • Security Operator
  • Security Reader
  • Global Reader

Important note

Users with the specified administrator roles are also entitled to other Microsoft 365 Defender services, such as Microsoft Defender for Endpoint or Microsoft Defender for Cloud Apps.

Getting started with Microsoft Defender for Office 365

Not so long ago, if the organization was planning to set up an Exchange Server instance on-premises, they had to plan for setting up both a proxy server and the additional protections for proper filtering of mail traffic. What has not changed with the transition to Exchange Online is that you still require adequately set-up DNS records for authentication of your mail system. The following are the records that you do still need to upload to Exchange Online at the level of your tenant:

  • MX records
  • SPF records
  • DKIM records
  • DMARC records

Depending on which type of Microsoft Defender for Office 365 plan you have (Plan 1 or Plan 2), there are different options for configuring policies and rules.

Plan 1 has a lot of different options, which can be useful when setting up protection for your mail traffic. The basic settings of Exchange Online Protection, in most cases, are not sufficient to satisfy all requirements...

Protecting assets with Microsoft Defender for Office 365

In today’s fast-paced and interconnected world, keeping your sensitive information and digital treasures safe has become absolutely vital for organizations of all shapes and sizes. With remote work exploding in popularity and cyber threats becoming more and more sophisticated, making sure your organization’s data and communications are secure has never been more critical. And in this ever-evolving landscape of digital dangers, Microsoft Defender for Office 365 steps up as a real superhero in the world of modern cybersecurity.

Think of Microsoft Defender for Office 365 as your trusty shield, specially designed to safeguard your organization’s prized possessions within the Microsoft 365 universe. It’s like having a high-tech security squad at your disposal, complete with cutting-edge threat-spotting skills, intelligent algorithms, and powerful protective features. This formidable defender stands tall...

Responding to alerts and mitigating threats

Threat Explorer is a feature in Microsoft Defender for Office 365 that provides an interactive interface to search and analyze threat intelligence data. It allows security administrators to quickly identify and investigate security threats, view threat information and trends, and take action to mitigate potential threats. Threat Explorer also provides insights into attacker behavior and helps to identify patterns and correlations in security events. This information can be used to fine-tune security policies, improve incident response procedures, and proactively detect and prevent future attacks. The following screenshot shows options and information available in the Threat Explorer portal. It is very useful for a daily or weekly overview of what is happening in your tenant:

Figure 3.31 – The Threat Explorer portal

Figure 3.31 – The Threat Explorer portal

Also, keep in mind that it is important to check your own Secure Score from time to time...

Summary

Microsoft Defender for Office 365 is a comprehensive security solution designed to protect against threats to an organization’s Office 365 environment. It provides a multi-layered defense using a combination of machine learning, behavior analysis, and threat intelligence to detect and prevent attacks. This solution protects against a wide range of security threats such as phishing, malware, and ransomware attacks.

Microsoft Defender for Office 365 also includes threat protection for email, files, and links. It uses advanced filters and algorithms to identify suspicious content and can automatically take action to block or quarantine malicious messages, attachments, and links. The solution integrates with other Microsoft security products, such as Microsoft Entra ID, for a comprehensive defense across an organization’s entire environment. In addition to protection against security threats, Microsoft Defender for Office 365 provides advanced reporting and management...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Microsoft 365 Security and Compliance for Administrators
Published in: Mar 2024Publisher: PacktISBN-13: 9781837638376
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Authors (2)

author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović