0% found this document useful (0 votes)
39 views

Defender and Intune

Uploaded by

Priya Vardhini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Defender and Intune

Uploaded by

Priya Vardhini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Microsoft Defender and Intune

• Priya Vardhini Mohan


Solution Area Specialist (MWP)
A zero trust architecture
• Zero trust is based on the principle of proven trust—before trusting,
you must first verify. This approach removes the inherent trust typical
in legacy networks. A zero trust architecture reduces risk in all
environments by:

• Setting up strong authentication


• Checking device compliance before granting access
• Ensuring least-privilege access by allowing only explicitly
approved resources
• Microsoft 365 Defender is a Cloud-based, unified, pre-
and post-breach enterprise defense suite. It
coordinates prevention, detection, investigation,
and response across endpoints, identities, apps, email,
collaborative applications, and all of their data.

M365
Defender
• Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat
Protection) is a security service designed to protect you when you use Office 365.
• According to Microsoft, it’s a cloud-based email filtering service that protects your
business from threats to email & collaboration tools.

Defender for Defender for Office: Plan 1


Office365 1. Safe Attachments
2. Safe Links
3. Safe Attachments for SharePoint, OneDrive,
and Microsoft Teams
4. Anti-phishing in Defender for Office 365
protection
5. Real Time Detection
Defender for Business

1. Defender for Business is a new


endpoint security solution that was
designed especially for the small-
and medium-sized business (up to
300 employees). With this endpoint
security solution, your company's
devices are better protected from
ransomware, malware, phishing,
and other threats.
• Exchange Online Protection, part of Microsoft Defender for
Office 365, can detect the phishing email and use mail flow
rules (also known as transport rules) to make certain it
never arrives in the Inbox.
• Defender for Office 365 uses Safe Attachments to test the
attachment and determine that it's harmful, so the mail that
arrives either isn't actionable by the user, or policies
prevent the mail from arriving at all.
• Defender for Endpoint manages devices that connect to
Defender the corporate network and detect device and network
vulnerabilities that might otherwise be exploited.
• Defender for Identity takes note of sudden account
changes like privilege escalation, or high-risk lateral
movement. It also reports on easily exploited identity
issues like unconstrained Kerberos delegation, for
correction by the security team.
• Microsoft Defender for Cloud Apps notices anomalous
behavior like impossible-travel, credential access, an
• Defender for Endpoint Plans
Automated investigation and response (AIR)

• AIR enables your security


operations team to operate more
efficiently and effectively. AIR
capabilities include automated
investigation processes in
response to well-known threats
that exist today. Appropriate
remediation actions await
approval, enabling your security
operations team to respond
effectively to detected threats.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy