Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft 365 Defender

You're reading from  Mastering Microsoft 365 Defender

Product type Book
Published in Jul 2023
Publisher Packt
ISBN-13 9781803241708
Pages 572 pages
Edition 1st Edition
Languages
Authors (2):
Ru Campbell Ru Campbell
Profile icon Ru Campbell
Viktor Hedberg Viktor Hedberg
Profile icon Viktor Hedberg
View More author details

Table of Contents (33) Chapters

Preface 1. Part 1: Cyber Threats and Microsoft 365 Defender
2. Chapter 1: Microsoft and Modern Cybersecurity Threats 3. Chapter 2: Microsoft 365 Defender: The Big Picture 4. Part 2: Microsoft Defender for Endpoint
5. Chapter 3: The Fundamentals of Microsoft Defender for Endpoint 6. Chapter 4: Onboarding Windows Clients and Servers 7. Chapter 5: Getting Started with Microsoft Defender Antivirus for Windows 8. Chapter 6: Advanced Microsoft Defender Antivirus for Windows 9. Chapter 7: Managing Attack Surface Reduction for Windows 10. Chapter 8: Managing Additional Capabilities for Windows 11. Chapter 9: Onboarding and Managing macOS 12. Chapter 10: Onboarding and Managing Linux Servers 13. Chapter 11: Onboarding and Managing iOS and Android 14. Part 3: Microsoft Defender for Identity
15. Chapter 12: Deploying Microsoft Defender for Identity 16. Chapter 13: Managing Defender for Identity 17. Part 4: Microsoft Defender for Office 365
18. Chapter 14: Deploying Exchange Online Protection 19. Chapter 15: Deploying Defender for Office 365 20. Part 5: Microsoft Defender for Cloud Apps
21. Chapter 16: Implementing and Managing Microsoft Defender for Cloud Apps 22. Part 6: Proactive Security and Incident Response
23. Chapter 17: Maintaining Security Hygiene and Threat Awareness 24. Chapter 18: Extended Detection and Response with Microsoft 365 Defender 25. Chapter 19: Advanced Hunting with KQL 26. Chapter 20: Microsoft Sentinel Integration 27. Chapter 21: Understanding Microsoft 365 Defender APIs 28. Part 7: Glossary and Answers
29. Chapter 22: Glossary
30. Chapter 23: Answers 31. Index 32. Other Books You May Enjoy

Managing Additional Capabilities for Windows

This chapter focuses on implementing the remaining MDE security capabilities for Windows. So far, you have learned how to manage Microsoft Defender Antivirus (MDAV) and ASR capabilities. Now, you will learn about the other key features of any MDE environment:

  • Device discovery, which lets you understand your estate and build Microsoft Defender Vulnerability Management data
  • Device control, which lets you protect endpoints from threats or noncompliance from attached devices, including printers
  • Windows Defender Firewall with Advanced Security (WFAS), which is the client firewall built into Windows and Windows Server for network control

By the end of this chapter, you will understand the use cases for these and how to implement them in line with good practices.

Device discovery

Some of the devices you should be most worried about compromising your environment are those you don’t control, can’t control, or don’t even know about. The objective of MDE’s device discovery capability is to uncover these risks, be they traditional unmanaged endpoints such as laptops and desktops, or other platforms such as network devices and printers.

Discovery can be approached in two ways:

  • Unmanaged devices can be discovered using MDE-onboarded devices. This means no additional agent or software to manage. This is sometimes referred to as the distributed sensor architecture. It is distributed insofar as all your onboarded devices can work together to build the data of discovered devices.
  • Managed network devices can be discovered using targeted assessment with a dedicated scanning device with an agent. Microsoft calls this network device discovery or authenticated scan. It is also sometimes referred to as targeted assessment...

Device control

Device control is all about protecting your endpoints from devices attached to them. USB attacks continue to be a problem, and you may also have governance needs to restrict access to external storage. We know we need some level of access to devices for productivity and business processes, but that must be balanced with security. In the era of remote work, this is particularly relevant because you are limited in your ability to physically monitor what users are connecting. Device control contributes to endpoint security by giving administrators the ability to control what types of hardware are permitted.

BitLocker and Endpoint DLP can be regarded as device control capabilities but are quite separate from MDE’s scope and aren’t covered in this book. Due to the nature of their access, device control is targeted at client operating systems rather than server operating systems.

Device control is divided into three capabilities:

  • Removable storage...

WFAS

Built into Windows 7 onward, including Windows Server equivalents, WFAS is the host firewall that can be used to control network traffic. WFAS is stateful, without being dependent on MDAV’s active mode, and comes preloaded with rules to protect systems out of the box, though it can also be managed centrally with the usual administrator tools for additional control and customization.

A key part of WFAS to understand is the concept of profiles, which are containers for rules depending on the connection determined by Network Location Awareness (NLA) (the NlaSvc service). There are three profiles, corresponding to NLA’s three location types:

  • Public, which is the most restrictive, and for areas such as public Wi-Fi, but also the default network
  • Private, which is behind a NAT and, most commonly now, the end user’s home or non-Active Directory Domain Services network
  • Domain, which is an on-premises Active Directory Domain Services network, determined...

Summary

This chapter concluded a series of chapters on managing MDE capabilities for Windows. In this one, you learned about key features in completing the MDE management options. This started with device discovery for discovering unmanaged devices or network devices using the authenticated scanner. Then, you learned about device control, which can be configured to protect your managed devices from unsanctioned or potentially malicious attached devices. Lastly, we explored WFAS, the built-in firewall capability for Windows that, although enabled out of the box, should be tuned for optimum protection.

In the chapters that follow, you will learn about how protection does not stop at Windows devices as we cover MDE across other operating systems.

Questions

To test your knowledge of protecting Windows clients and servers with MDE, try answering the following questions. The answers can be found toward the end of this book:

  1. Which of the following firewall profiles should be applicable in an office network for Active Directory-joined devices with line of sight to a domain controller?
    1. Domain
    2. Public
    3. Private
  2. You want to monitor Cisco switches in your network for known vulnerabilities. Which of the following MDE capabilities should you consider?
    1. Device control
    2. Network protection
    3. Cloud-delivered protection
    4. Network device discovery
  3. There is only one type of USB printer you want to support in your organization. You are reviewing printer protection to enforce this. Which of the following pieces of information do you need about the supported printer? Choose all that apply.
    1. VID
    2. Serial ID
    3. Product ID
    4. Friendly name
  4. You find that a corporate network is not being scanned as part of distributed device discovery. Where can you confirm...

Further reading

To go into even further detail about some of the topics in this chapter, you can refer to the following online material:

lock icon The rest of the chapter is locked
You have been reading a chapter from
Mastering Microsoft 365 Defender
Published in: Jul 2023 Publisher: Packt ISBN-13: 9781803241708
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime}