Reader small image

You're reading from  Mastering Microsoft 365 Defender

Product typeBook
Published inJul 2023
PublisherPackt
ISBN-139781803241708
Edition1st Edition
Right arrow
Authors (2):
Ru Campbell
Ru Campbell
author image
Ru Campbell

Ruairidh (Ru) Campbell is a Microsoft Security MVP and leads Microsoft consultancy at Threatscape. At Threatscape, Ru develops, delivers, and manages offerings and professional services for cybersecurity, compliance, identity, and management. In the cybersecurity community, Ru runs the Microsoft 365 Security & Compliance user group and his blog (campbell.scot), regularly speaks at other user groups and conferences, and contributes to well-known industry publications such as Practical 365. Ru holds 14 Microsoft certifications and a B.Sc. (Distinction) in computer networking from the University of the West of Scotland. Away from cybersecurity, he is a petrolhead who enjoys heavy metal and hiking around Scotland with his wife.
Read more about Ru Campbell

Viktor Hedberg
Viktor Hedberg
author image
Viktor Hedberg

Viktor Hedberg is a Microsoft Security MVP and senior consultant at Truesec. At Truesec, Viktor works with proactive security measures within the Microsoft sphere of technologies, by delivering workshops on best practices and by his deep technical expertise in these areas. In the cybersecurity community, Viktor runs his blogs at Truesec (Experts – viktor-hedberg). Alongside this, he is one of the hosts of the Swedish Windows Security user group, as well as a co-host of the Swedish podcast The Nerd Herd. He is a frequent speaker at both conferences and user groups around the world, focusing on matters of Microsoft Security. Viktor holds numerous Microsoft certifications, as well as being a Microsoft Certified Trainer. Away from cybersecurity, Viktor is a family man, spending most of his time with his wife and three kids, as well as enjoying football, both as a practitioner and as a fan. Heavy metal has been part of his life since his early teens.
Read more about Viktor Hedberg

View More author details
Right arrow

Managing Additional Capabilities for Windows

This chapter focuses on implementing the remaining MDE security capabilities for Windows. So far, you have learned how to manage Microsoft Defender Antivirus (MDAV) and ASR capabilities. Now, you will learn about the other key features of any MDE environment:

  • Device discovery, which lets you understand your estate and build Microsoft Defender Vulnerability Management data
  • Device control, which lets you protect endpoints from threats or noncompliance from attached devices, including printers
  • Windows Defender Firewall with Advanced Security (WFAS), which is the client firewall built into Windows and Windows Server for network control

By the end of this chapter, you will understand the use cases for these and how to implement them in line with good practices.

Device discovery

Some of the devices you should be most worried about compromising your environment are those you don’t control, can’t control, or don’t even know about. The objective of MDE’s device discovery capability is to uncover these risks, be they traditional unmanaged endpoints such as laptops and desktops, or other platforms such as network devices and printers.

Discovery can be approached in two ways:

  • Unmanaged devices can be discovered using MDE-onboarded devices. This means no additional agent or software to manage. This is sometimes referred to as the distributed sensor architecture. It is distributed insofar as all your onboarded devices can work together to build the data of discovered devices.
  • Managed network devices can be discovered using targeted assessment with a dedicated scanning device with an agent. Microsoft calls this network device discovery or authenticated scan. It is also sometimes referred to as targeted assessment...

Device control

Device control is all about protecting your endpoints from devices attached to them. USB attacks continue to be a problem, and you may also have governance needs to restrict access to external storage. We know we need some level of access to devices for productivity and business processes, but that must be balanced with security. In the era of remote work, this is particularly relevant because you are limited in your ability to physically monitor what users are connecting. Device control contributes to endpoint security by giving administrators the ability to control what types of hardware are permitted.

BitLocker and Endpoint DLP can be regarded as device control capabilities but are quite separate from MDE’s scope and aren’t covered in this book. Due to the nature of their access, device control is targeted at client operating systems rather than server operating systems.

Device control is divided into three capabilities:

  • Removable storage...

WFAS

Built into Windows 7 onward, including Windows Server equivalents, WFAS is the host firewall that can be used to control network traffic. WFAS is stateful, without being dependent on MDAV’s active mode, and comes preloaded with rules to protect systems out of the box, though it can also be managed centrally with the usual administrator tools for additional control and customization.

A key part of WFAS to understand is the concept of profiles, which are containers for rules depending on the connection determined by Network Location Awareness (NLA) (the NlaSvc service). There are three profiles, corresponding to NLA’s three location types:

  • Public, which is the most restrictive, and for areas such as public Wi-Fi, but also the default network
  • Private, which is behind a NAT and, most commonly now, the end user’s home or non-Active Directory Domain Services network
  • Domain, which is an on-premises Active Directory Domain Services network, determined...

Summary

This chapter concluded a series of chapters on managing MDE capabilities for Windows. In this one, you learned about key features in completing the MDE management options. This started with device discovery for discovering unmanaged devices or network devices using the authenticated scanner. Then, you learned about device control, which can be configured to protect your managed devices from unsanctioned or potentially malicious attached devices. Lastly, we explored WFAS, the built-in firewall capability for Windows that, although enabled out of the box, should be tuned for optimum protection.

In the chapters that follow, you will learn about how protection does not stop at Windows devices as we cover MDE across other operating systems.

Questions

To test your knowledge of protecting Windows clients and servers with MDE, try answering the following questions. The answers can be found toward the end of this book:

  1. Which of the following firewall profiles should be applicable in an office network for Active Directory-joined devices with line of sight to a domain controller?
    1. Domain
    2. Public
    3. Private
  2. You want to monitor Cisco switches in your network for known vulnerabilities. Which of the following MDE capabilities should you consider?
    1. Device control
    2. Network protection
    3. Cloud-delivered protection
    4. Network device discovery
  3. There is only one type of USB printer you want to support in your organization. You are reviewing printer protection to enforce this. Which of the following pieces of information do you need about the supported printer? Choose all that apply.
    1. VID
    2. Serial ID
    3. Product ID
    4. Friendly name
  4. You find that a corporate network is not being scanned as part of distributed device discovery. Where can you confirm...

Further reading

To go into even further detail about some of the topics in this chapter, you can refer to the following online material:

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Mastering Microsoft 365 Defender
Published in: Jul 2023Publisher: PacktISBN-13: 9781803241708
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (2)

author image
Ru Campbell

Ruairidh (Ru) Campbell is a Microsoft Security MVP and leads Microsoft consultancy at Threatscape. At Threatscape, Ru develops, delivers, and manages offerings and professional services for cybersecurity, compliance, identity, and management. In the cybersecurity community, Ru runs the Microsoft 365 Security & Compliance user group and his blog (campbell.scot), regularly speaks at other user groups and conferences, and contributes to well-known industry publications such as Practical 365. Ru holds 14 Microsoft certifications and a B.Sc. (Distinction) in computer networking from the University of the West of Scotland. Away from cybersecurity, he is a petrolhead who enjoys heavy metal and hiking around Scotland with his wife.
Read more about Ru Campbell

author image
Viktor Hedberg

Viktor Hedberg is a Microsoft Security MVP and senior consultant at Truesec. At Truesec, Viktor works with proactive security measures within the Microsoft sphere of technologies, by delivering workshops on best practices and by his deep technical expertise in these areas. In the cybersecurity community, Viktor runs his blogs at Truesec (Experts – viktor-hedberg). Alongside this, he is one of the hosts of the Swedish Windows Security user group, as well as a co-host of the Swedish podcast The Nerd Herd. He is a frequent speaker at both conferences and user groups around the world, focusing on matters of Microsoft Security. Viktor holds numerous Microsoft certifications, as well as being a Microsoft Certified Trainer. Away from cybersecurity, Viktor is a family man, spending most of his time with his wife and three kids, as well as enjoying football, both as a practitioner and as a fan. Heavy metal has been part of his life since his early teens.
Read more about Viktor Hedberg