SlideShare a Scribd company logo
Learn How to Protect Against and
Recover from Data Breaches in
Office 365
Theresa Eller, Microsoft Premiere Field Engineer
sharepointmadam@anythingbutcode.onmicrosoft.com
Antonio Maio, Protiviti Senior Enterprise Architect & Microsoft MVP
Antonio.Maio@Protiviti.com
Platinum
Gold
Silver
Prize(s)
Learn how to protect against and recover from data breaches in Office 365
AGENDA
01 Common Attack Patterns
02 Types of Security Breaches
03 What Does a Security Breach Look Like
04 How to Investigate & Recover from an Attack
05 Protect from Future Attacks
COMMON ATTACK PATTERNS
lllllllll
lllllllll
Phishing
Password
Spray
Breach
Replay
200K
password spray attacks
blocked in August 2018
23M
high risk enterprise sign-in
attempts detected in March 2018
4.6B
attacker-driven sign-ins
detected in May 2018
John Doe
lllllll
PHISHING & SPEAR PHISHING
• One of the Most Common
Attack Vectors
• Targeted Attacks – They are
formatted for you!
• Attackers do their research
• OS-INT
(open source intelligence)
PHISHING & SPEAR PHISHING
• Lots of examples…
▪ Someone has accessed your account
▪ Verify your account
▪ Renew your subscription
▪ iTunes Receipt
▪ Replies (subject starting with Re:) when
you never received original
▪ Review your PayPay account
▪ Review this invoice
▪ Urgent action required…
CREDENTIAL STUFFING
• So Many Passwords!
• So many its Difficult for us to remember them all!
• Attackers will rely on human nature!
CREDENTIAL STUFFING: Re-using the Same
Passwords Across Multiple
Systems
ACCESSING CREDENTIALS & SAVING ON HOME PC
• Exposes Credentials to Home Users
• Exposes Credentials to Software
that Home Users Download
… like malware!
Types of Security Breaches
Inadvertent
or
Accidental
Data Leak
Insider
Threat
External
Threat
•
•
•
•
•
•
•
•
•
•
•
•
•
Insider
Threat
External
Threat
Inadvertent
or
Accidental
Data Leak
What Does a Security Breach Look Like
WHAT DOES A SECURITY BREACH LOOK LIKE?
• Email anomalies
• Emails from people/groups you don’t
normally communicate with
• Notifications from banks and online
services you don’t normally interact with
• Typos
• Urgent call to action
• Old contact information (old titles)
• Slow computer/Slow web access
•
•
•
External
Threat
•
•
•
External
Threat
Phishing
Research/OS-Int
Only send to smaller
partners (those less likely to
have good security practices)
•
•
•
External
Threat
Phishing
Only send to smaller
partners (those less likely to
have good security practices)
•
•
•
•
partner4@trustedcompany.com
•
•
•
•
External
Threat
Phishing
Target specific executives
within the organization that
are likely to have access to
financial information
•
•
•
•
•
•
•
•
•
Insider
Threat
•
•
•
•
Insider
Threat
The Industrious
The Partisan
The Spy
•
•
•
•
•
•
Inadvertent
or
Accidental
Data Leak
The Careless
The Inexperienced
The Lazy
The Home Worker
The Newcomer
The Stressed
The Disorganized
How to Investigate & Recover from an Attack
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-reporting-api
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
• Soon to be on by default on all new mailboxes
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
Protect from Future Attacks
Security features must be enabled to protect you
>99% of common user compromises are preventable
Most customers enable features after they’re
compromised
Average account secure score today is 14.65/180
Baseline Protection
Simple one-click experience enables our
recommended security configuration and features
Baseline configuration
For admins MFA enabled for Azure AD privileged roles
For all users MFA enabled
Enrolled in the Microsoft authenticator app for MFA
Require MFA when sign-in risk is detected
Block legacy authentication protocols
Block logins from compromised users
threats
Microsoft Secure Score
Visibility into your Microsoftsecurity position and how to improve it
Insights into your
security position
Guidance to increase
your security level
Learn how to protect against and recover from data breaches in Office 365
Identity Secure Score
Checkout your Identity Secure Score now at aka.ms/MyIdentitySecureScore
Insights into your
security posture
Guidance to help
you secure your
organization
CONDITIONAL ACCESS APP CONTROL
Microsoft Azure
Active Directory
Analyze Session RiskCheck device
compliance with Intune
Check
location
Check user
behavior
Check user
organization
Enforce Relevant Policies with Conditional Access App Control
Protect downloads
from unmanaged
devices with AIP
Monitor and alert on
actions when user
activity is suspicious
Enforce read-only mode
in applications for
partner (B2B) users
Require MFA and define
session timeouts for
unfamiliar locations
BOX.US.CAS.MS
Cloud App Security integrates with:
• Azure Active Directory
• Azure Information Protection
• Microsoft Intune
to protect any app in your organization.
Unusual file share activity
Unusual file download
Unusual file deletion activity
Ransomware activity
Data exfiltration to unsanctioned apps
Activity by a terminated employee
Indicators of a
compromisedsession
Malicious useof
an end-useraccount
Malware implanted in cloud apps
Malicious OAuth application
Multiple failed login attempts to app
Suspicious inbox rules (delete, forward)
Threat delivery
and persistence
!
!
!
Unusual impersonated activity
Unusual administrative activity
Unusual multiple delete VM activity
Malicious useof
a privilegeduser
Activity fromsuspicious IP addresses
Activity fromanonymous IP addresses
Activity froman infrequent country
Impossibletravel between sessions
Logon attempt from a suspicious user agent
Brute force attempts
Suspicious groups membership modifications
Honey Token account suspicious activities
Suspicious VPN connection
Abnormal access to AIP protected data
Reconnaissance
(65% of alert volume)
!
!
!
Compromised credentials
(16% of alert volume)
Lateral movement
(11% of alert volume)
Domain dominance
(8% of alert volume)
Golden ticket attack
Skeleton Key
Remote code execution on DC
Service creation on DC
DCShadow
86%
38%
10%
12%
Directoryservices
DNS
Account enumeration
SMB sessionenumeration
Impacted organizations: recon attacks
Pass-the-Ticket
Pass-the-Hash
Overpass-the-Hash
Learn how to protect against and recover from data breaches in Office 365
MFA reduces the risk of an attack by 99.9%
Have you turned on MFA?
Corporate
Network
Geo-location
MacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Location
Client apps &
Auth Method
Conditions
Microsoft
Cloud App Security
Force
password
reset
Require
MFA
Allow/block
access
Terms of Use
******
Limited
access
Controls
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
https://docs.microsoft.com/en-us/office365/securitycompliance/attack-simulator
 Enable MFA for your Admin Accounts or,
even better, use PIM
1.7% admins protected by MFA
 Monitor your Risk Reports
 Use Identity Secure Score
 Test passwordless sign-in with Microsoft
Authenticator
 Turn on Password Hash Sync
 Pull Azure AD Logs into your SIEM
systems
 Block Legacy Auth
 Modernize your password policy
 Block Suspicious IPs
 Enable user risk policy
 Enable sign-in risk policy
 Review app permissions & use MCAS
52
Thank you!
Theresa Eller, Microsoft Premiere Field Engineer
sharepointmadam@anythingbutcode.onmicrosoft.com
Antonio Maio, Protiviti Senior Enterprise Architect & Microsoft MVP
Antonio.Maio@Protiviti.com

More Related Content

PDF
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
 
PPTX
Overview of Microsoft Enterprise Mobility & Security(EMS)
Radhakrishnan Govindan
 
PDF
Microsoft Enterprise Mobility and Security EMS
David J Rosenthal
 
PDF
Microsoft Advanced Security & Compliance
Chris Genazzio
 
PPTX
Enterprise Mobility+Security Overview
Chris Genazzio
 
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 
PPTX
EMS Diagram Click Through Web
Eric Inch
 
PDF
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
David J Rosenthal
 
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Radhakrishnan Govindan
 
Microsoft Enterprise Mobility and Security EMS
David J Rosenthal
 
Microsoft Advanced Security & Compliance
Chris Genazzio
 
Enterprise Mobility+Security Overview
Chris Genazzio
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 
EMS Diagram Click Through Web
Eric Inch
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
David J Rosenthal
 

What's hot (20)

PPTX
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
PDF
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
PPTX
1 Modern Security - Keynote
Andrew Bettany
 
PPTX
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
PPTX
Community IT - Single Sign On
Community IT Innovators
 
PDF
Azure Information Protection
Robert Crane
 
PDF
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
 
PPTX
cyber-security-reference-architecture
Birendra Negi ☁️
 
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
Andrew Bettany
 
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
PPTX
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
 
DOCX
Security and Compliance In Microsoft Office 365 Whitepaper
David J Rosenthal
 
PPTX
Azure information protection
Kjetil Lund-Paulsen
 
PPTX
Cloud App Security
Alvaro Rezende
 
PDF
Msft cloud architecture_security_commonattacks
Akram Qureshi
 
PPTX
4 Modern Security - Integrated SecOps and incident response with MTP
Andrew Bettany
 
PDF
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
PPTX
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
PDF
Microsoft Azure Rights Management
David J Rosenthal
 
PDF
A beginners guide to administering office 365 with power shell antonio maio
AntonioMaio2
 
2 Modern Security - Microsoft Information Protection
Andrew Bettany
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
1 Modern Security - Keynote
Andrew Bettany
 
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
Community IT - Single Sign On
Community IT Innovators
 
Azure Information Protection
Robert Crane
 
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
 
cyber-security-reference-architecture
Birendra Negi ☁️
 
3 Modern Security - Secure identities to reach zero trust with AAD
Andrew Bettany
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
 
Security and Compliance In Microsoft Office 365 Whitepaper
David J Rosenthal
 
Azure information protection
Kjetil Lund-Paulsen
 
Cloud App Security
Alvaro Rezende
 
Msft cloud architecture_security_commonattacks
Akram Qureshi
 
4 Modern Security - Integrated SecOps and incident response with MTP
Andrew Bettany
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
Microsoft Azure Rights Management
David J Rosenthal
 
A beginners guide to administering office 365 with power shell antonio maio
AntonioMaio2
 
Ad

Similar to Learn how to protect against and recover from data breaches in Office 365 (20)

PPTX
Application Security-Understanding The Horizon
Lalit Kale
 
PDF
Stopping zero day threats
Zscaler
 
PDF
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 
PDF
Microsoft Avanced Threat Analytics
Adeo Security
 
PDF
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 
PDF
Office 365 Security Features That Nonprofits Should Know and Use
TechSoup
 
PPTX
information security awareness course
Abdul Manaf Vellakodath
 
PPTX
Discover advanced threats with threat intelligence - Jeremy Li
Jeremy Li
 
PPTX
Cyper security & Ethical hacking
Cmano Kar
 
PPTX
Application Whitelisting - Complementing Threat centric with Trust centric se...
Osama Salah
 
PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos De Pedro
 
PPT
Ethical Hacking
Keith Brooks
 
PDF
How to get deeper administration insights into your tenant
Robert Crane
 
PDF
Testing Application Security: The Hacker Psyche Exposed
TechWell
 
PPTX
2024 Security Outlook & Essential Security Practices
Dan Houser
 
PPTX
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
PPTX
Developing A Cyber Security Incident Response Program
BGA Cyber Security
 
PDF
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Application Security-Understanding The Horizon
Lalit Kale
 
Stopping zero day threats
Zscaler
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 
Microsoft Avanced Threat Analytics
Adeo Security
 
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 
Office 365 Security Features That Nonprofits Should Know and Use
TechSoup
 
information security awareness course
Abdul Manaf Vellakodath
 
Discover advanced threats with threat intelligence - Jeremy Li
Jeremy Li
 
Cyper security & Ethical hacking
Cmano Kar
 
Application Whitelisting - Complementing Threat centric with Trust centric se...
Osama Salah
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos De Pedro
 
Ethical Hacking
Keith Brooks
 
How to get deeper administration insights into your tenant
Robert Crane
 
Testing Application Security: The Hacker Psyche Exposed
TechWell
 
2024 Security Outlook & Essential Security Practices
Dan Houser
 
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Developing A Cyber Security Incident Response Program
BGA Cyber Security
 
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Ad

More from AntonioMaio2 (20)

PDF
Office 365 Security - MacGyver, Ninja or Swat team
AntonioMaio2
 
PDF
Information security in office 365 a shared responsibility - antonio maio
AntonioMaio2
 
PDF
SharePoint Saturday Ottawa - How secure is my data in office 365?
AntonioMaio2
 
PPTX
Office 365 security new innovations from microsoft ignite - antonio maio
AntonioMaio2
 
PPTX
Real world SharePoint information governance a case study - published
AntonioMaio2
 
PDF
Overcoming Security Threats and Vulnerabilities in SharePoint
AntonioMaio2
 
PPTX
What’s new in SharePoint 2016!
AntonioMaio2
 
PPTX
Data Visualization in SharePoint and Office 365
AntonioMaio2
 
PPTX
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
AntonioMaio2
 
PDF
Developing custom claim providers to enable authorization in share point an...
AntonioMaio2
 
PPTX
Identity management challenges when moving share point to the cloud antonio...
AntonioMaio2
 
PDF
A Practical Guide Information Governance with Microsoft SharePoint 2013
AntonioMaio2
 
PPTX
Best practices for security and governance in share point 2013 published
AntonioMaio2
 
PDF
Keeping SharePoint Always On
AntonioMaio2
 
PDF
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
AntonioMaio2
 
PPTX
Best practices for Security and Governance in SharePoint 2013
AntonioMaio2
 
PPTX
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
PPTX
Best Practices for Security in Microsoft SharePoint 2013
AntonioMaio2
 
PPTX
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
AntonioMaio2
 
PPTX
SharePoint Governance: Impacts of Moving to the Cloud
AntonioMaio2
 
Office 365 Security - MacGyver, Ninja or Swat team
AntonioMaio2
 
Information security in office 365 a shared responsibility - antonio maio
AntonioMaio2
 
SharePoint Saturday Ottawa - How secure is my data in office 365?
AntonioMaio2
 
Office 365 security new innovations from microsoft ignite - antonio maio
AntonioMaio2
 
Real world SharePoint information governance a case study - published
AntonioMaio2
 
Overcoming Security Threats and Vulnerabilities in SharePoint
AntonioMaio2
 
What’s new in SharePoint 2016!
AntonioMaio2
 
Data Visualization in SharePoint and Office 365
AntonioMaio2
 
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
AntonioMaio2
 
Developing custom claim providers to enable authorization in share point an...
AntonioMaio2
 
Identity management challenges when moving share point to the cloud antonio...
AntonioMaio2
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
AntonioMaio2
 
Best practices for security and governance in share point 2013 published
AntonioMaio2
 
Keeping SharePoint Always On
AntonioMaio2
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
AntonioMaio2
 
Best practices for Security and Governance in SharePoint 2013
AntonioMaio2
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
Best Practices for Security in Microsoft SharePoint 2013
AntonioMaio2
 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
AntonioMaio2
 
SharePoint Governance: Impacts of Moving to the Cloud
AntonioMaio2
 

Recently uploaded (20)

PPT
Activate_Methodology_Summary presentatio
annapureddyn
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
PDF
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PPTX
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PPTX
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
Activate_Methodology_Summary presentatio
annapureddyn
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
Exploring AI Agents in Process Industries
amoreira6
 

Learn how to protect against and recover from data breaches in Office 365