SlideShare a Scribd company logo
ยฉ Copyright Microsoft Corporation. All rights reserved.
SC-900T00-A Module 3:
Describe the Capabilities of
Microsoft Security Solutions
ยฉ Copyright Microsoft Corporation. All rights reserved.
Module
Agenda
Describe basic security capabilities in Azure
Describe security management capabilities of Azure
Describe security capabilities of Azure Sentinel
Describe threat protection with Microsoft 365 Defender
Describe security management capabilities of Microsoft 365
Describe endpoint security with Microsoft Intune
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 1: Describe basic security capabilities
in Azure
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 1 Introduction
After completing this module, you should be able to:
Describe
Azure security
capabilities
for protecting
your network
Describe
how Azure can
protect your VMs
Describe
how encryption
on Azure can
protect your data
ยฉ Copyright Microsoft Corporation. All rights reserved.
Azure Network Security groups
Network security groups (NSG) let you allow or deny network
traffic to and from Azure resources that exist in your Azure
Virtual Network.
โ€ข An NSG can be associated with multiple subnets or network interfaces
in a VNet.
โ€ข An NSG is made up of inbound and outbound security rules.
โ€ข Each rule specifies one or more of the following properties:
- Name - Priority
- Source or destination - Protocol
- Direction - Port range
- Action
ยฉ Copyright Microsoft Corporation. All rights reserved.
Demo
Azure Network Security Groups
ยฉ Copyright Microsoft Corporation. All rights reserved.
Azure DDoS protection
A Distributed Denial of Service
(DDoS) attack makes resources
unresponsive.
Azure DDoS Protection analyzes
network traffic and discards
anything that looks like a DDoS
attack.
Azure DDoS Protection tiers:
โ€ข Basic
โ€ข Standard
ยฉ Copyright Microsoft Corporation. All rights reserved.
Azure Firewall
Azure Firewall protects your Azure Virtual Network
(VNet) resources from attackers. Features include:
โ€ข Built-in high availability & Availability Zones
โ€ข Outbound SNAT & inbound DNAT
โ€ข Threat intelligence
โ€ข Network & application-level filtering
โ€ข Multiple public IP addresses
โ€ข Integration with Azure Monitor
ยฉ Copyright Microsoft Corporation. All rights reserved.
Azure Bastion
Azure Bastion provides secure
connectivity to your VMs directly from
the Azure portal using Transport Layer
Security (TLS). Features include:
โ€ข RDP and SSH directly in Azure
portal.
โ€ข Remote session over TLS and
firewall traversal for RDP/SSH.
โ€ข No Public IP required on the Azure
VM.
โ€ข No hassle of managing NSGs.
โ€ข Protection against port scanning.
โ€ข Protect against zero-day exploits.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Web Application Firewall
Web Application Firewall (WAF) provides centralized
protection of your web applications from common exploits
and vulnerabilities.
โ€ข Simpler security management
โ€ข Improves the response time to a security threat
โ€ข Patching a known vulnerability in one place
โ€ข Protection against threats and intrusions.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Ways Azure encrypts data & use of Key Vault
Encryption on Azure
Azure Storage Service Encryption
Azure Disk Encryption
Transparent data encryption (TDE)
What is Azure Key Vault?
Secrets management
Key management
Certificate management
Store secrets backed by HW or SW
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 2: Describe security management
capabilities of Azure
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 2 Introduction
After completing this module, youโ€™ll be able to:
Describe
the security
management
capabilities of
Azure.
Describe
the benefits and
use cases of Azure
Defender.
Understand Cloud
Security Posture
Management and
the security
baseline.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Azure Security Center
Azure Security Center - A unified infrastructure security management system that strengthens the security
posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud
- whether they're in Azure or not - as well as on premises. Azure Security Centerโ€™s features cover two broad
pillars of cloud security:
Cloud security posture management(CSPM):
โ€ข CSPM uses a combination of tools & services to
strengthen your hybrid cloud posture and track
compliance with the built-in policies.
โ€ข Features include secure score, detection of security
misconfigurations in your Azure machines, asset
inventory, and more.
Cloud workload protection (CWP):
โ€ข Security Center's integrated cloud workload
protection platform (CWPP), Azure Defender, brings
advanced, intelligent, protection of your Azure, non-
Azure, and hybrid resources and workloads.
โ€ข Defender plans include Azure Defender for servers,
App Service, SQL, Key Vault, and moreโ€ฆ
ยฉ Copyright Microsoft Corporation. All rights reserved.
Azure Secure Score
The secure score is shown in the Azure portal pages as a percentage value. To
improve your secure score, remediate security recommendations from your
recommendations list.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Demo
Azure Security Center
ยฉ Copyright Microsoft Corporation. All rights reserved.
Security baselines & the Azure Security Benchmark
Security baselines for Azure offer a consistent experience when securing your environment. They apply prescriptive best
practices and recommendations from the Azure Security Benchmark (ASB) to improve the security of workloads, data,
and services on Azure. The ASB comprises the security recommendations specific to the Azure platform. Example
security baselines include:
Azure security baseline for Azure Active Directory: Applies guidance from the ASB to Azure AD
Azure security baseline for Azure Firewall: Applies guidance from the ASB to Azure Firewall.
Azure security baseline for Security Center: Applies guidance from the ASB to Azure Security Center.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 3: Describe security capabilities of
Azure Sentinel
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 3 Introduction
After completing this module, youโ€™ll be able to:
Describe
the security
concepts for
SIEM, SOAR, and
XDR.
Describe
how Azure
Sentinel provides
integrated threat
protection.
Describe
the capabilities of
Azure Sentinel.
ยฉ Copyright Microsoft Corporation. All rights reserved.
SIEM, SOAR, and XDR
SIEM
What is security incident and
event management?
A SIEM system is a tool that an
organization uses to collect data from
across the whole estate, including
infrastructure, software, and resources.
It does analysis, looks for correlations
or anomalies, and generates alerts and
incidents.
SOAR
What is security orchestration
automated response?
A SOAR system takes alerts from many
sources, such as a SIEM system. The
SOAR system then triggers action-
driven automated workflows and
processes to run security tasks that
mitigate the issue.
XDR
What is extended detection
and response?
An XDR system is designed to deliver
intelligent, automated, and integrated
security across an organizationโ€™s
domain. It helps prevent, detect, and
respond to threats across identities,
endpoints, applications, email, IoT,
infrastructure, and cloud platforms.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Sentinel provides integrated threat protection (Slide 1)
Collect data at cloud scale across all users, devices, applications,
and infrastructure, both on-premises and in multiple clouds.
Detect previously uncovered threats and minimize false positives
using analytics and unparalleled threat intelligence.
Investigate threats with AI and hunt suspicious activities at
scale, tapping into decades of cybersecurity work at Microsoft.
Respond to incidents rapidly with built-in orchestration and
automation of common security.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Sentinel provides integrated threat protection (Slide 2)
Connect Sentinel to your data: use connectors for
Microsoft solutions providing real-time integration.
Workbooks: monitor the data using the Azure
Sentinel integration with Azure Monitor Workbooks.
Analytics: Using built-in analytics alerts, youโ€™ll get
notified when anything suspicious occurs.
Manage incidents: An incident is created when an
alert that you've enabled is triggered.
Security automation and orchestration: Integrate
with Azure Logic Apps, to create workflows
Playbooks: A collection of procedures that can help
automate and orchestrate your response.
Investigation: Understand the scope of a potential
security threat and find the root cause.
Hunting: Use search-and-query tools, to hunt
proactively for threats, before an alert is triggered.
Integrated threat protection: XDR with Microsoft
365 Defender and Azure Defender integration.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Sentinel provides integrated threat protection (Slide 3)
ยฉ Copyright Microsoft Corporation. All rights reserved.
Demo
Azure Sentinel
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 4: Describe threat protection with
Microsoft 365 Defender
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 4 Introduction
At the end of this module, youโ€™ll be able to:
Describe
the Microsoft
365 Defender
service.
Describe
how Microsoft 365
Defender provides
integrated
protection against
sophisticated
attacks.
Describe
how Microsoft
Cloud App
Security can help
defend your data
and assets.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Microsoft 365 Defender services
Microsoft 365 Defender
Natively coordinate the
detection, prevention,
investigation, and response
to threats.
Protects identities,
endpoints, apps and email
& collaboration.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Identity
Microsoft Defender for Identity covers following key areas
Monitor and profile user
behavior and activities
Defender for Identity monitors
and analyzes user activities and
information across your
network, including permissions
and group membership,
creating a behavioral baseline
for each user.
Protect user identities and
reduce the attack surface
Defender for Identity gives
invaluable insights on identity
configurations and suggested
security best practices.
Through security reports and
user profile analytics.
Identify suspicious activities
and advanced attacks across
the cyberattack kill-chain
โ€ข Reconnaissance
โ€ข Compromised credentials
โ€ข Lateral movements
โ€ข Domain dominance
Investigate alerts and
user activities
Defender for Identity is
designed to reduce general
alert noise, providing only
relevant, important security
alerts in a simple, real-time
organizational attack
timeline.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Office 365
Microsoft Defender for Office 365 covers:
1 2 3 4
Threat protection
policies
Reports Threat investigation and
response capabilities
Automated investigation
and response capabilities
Microsoft Defender for
Office 365 Plan 1
โ€ข Safe Attachments
โ€ข Safe Links
โ€ข Safe Attachments for SharePoint,
OneDrive, & Microsoft Teams
โ€ข Anti-phishing protection
โ€ข Real-time detections
Microsoft Defender for
Office 365 Plan 2
ยท Threat Trackers
ยท Threat Explorer
ยท Automated investigation &
response (AIR)
ยท Attack Simulator
Microsoft Defender for
Office 365 availability
ยท Microsoft 365 E5
ยท Office 365 E5
ยท Office 365 A5
ยท Microsoft 365 Business Premium
ยฉ Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is a platform designed to help enterprise networks protect
endpoints.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Microsoft Cloud App Security
Microsoft Cloud App Security provides rich visibility to your cloud services, control over data travel, and sophisticated
analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services.
The Cloud App Security framework
ยท Discover and control the use of Shadow IT
ยท Protect your sensitive information anywhere
in the cloud
ยท Protect against cyberthreats and anomalies
ยท Assess your cloud apps' compliance
Office 365 Cloud App Security
Enhanced Cloud App Discovery in
Azure Active Directory
Microsoft Cloud App
Security architecture
ยฉ Copyright Microsoft Corporation. All rights reserved.
Demo
Microsoft Cloud App Security
(MCAS)
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 5: Describe security management
capabilities of Microsoft 365
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 5 Introduction
In this module, you will:
Describe and
explore the
Microsoft 365
Defender
portal
Describe
how to use
Microsoft
Secure Score.
Explore
security
reports and
dashboards.
Describe
incidents and
incident
management
capabilities.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Microsoft 365 Defender portal
The Microsoft 365 Defender portal combines
protection, detection, investigation, and
response to email, collaboration, identity,
and device threats, in a central portal.
View the security health
of your organization.
Act to configure devices,
users, and apps.
Get alerts for suspicious activity.
The Microsoft 365 Defender navigation pane include these
options and more:
Learning
hub
Incidents
& alerts
Action
center
Reports
Secure
Score
Hunting
Email &
collaboration
Permissions
& roles
Threat
analytics
Endpoints
ยฉ Copyright Microsoft Corporation. All rights reserved.
Describe how to use Microsoft Secure Score
Microsoft Secure Score is a
representation of a company's
security posture.
Will show all possible
improvements for the product,
whatever the license edition,
subscription, or plan.
Supports recommendations for:
โ€ข Microsoft 365
โ€ข Azure Active Directory
โ€ข Microsoft Defender for
Endpoint
โ€ข Microsoft Defender for Identity
โ€ข Cloud App Security
ยฉ Copyright Microsoft Corporation. All rights reserved.
Demo
The Microsoft 365 Defender portal
ยฉ Copyright Microsoft Corporation. All rights reserved.
Security reports and dashboards
The Microsoft 365 Defender portal includes a Reports section. Shown below is the general security report.
By default, cards are grouped by the
following categories:
โ€ข Identities - user accounts and
credentials.
โ€ข Data - email and document
contents.
โ€ข Devices - computers, mobile
phones, and other devices.
โ€ข Apps - programs and attached
online services.
You can group cards by topic (risk,
detection trends, configuration and
health, and other.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Incidents & incident management
Incidents are a collection of correlated alerts created when a suspicious event is found and provides a
comprehensive view and context of an attack.
Incident management
Managing incidents is critical in ensuring that threats are contained
and addressed. In Microsoft 365 Defender, you can manage
incidents on devices, users accounts, and mailboxes.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 6: Describe endpoint security with
Microsoft Intune
ยฉ Copyright Microsoft Corporation. All rights reserved.
Lesson 6 Introduction
After completing this module, you should be able to:
Describe
what Intune is.
Describe
the tools available
with Intune.
Describe
howtomanage
deviceswith
MicrosoftEndpoint
Manager.
ยฉ Copyright Microsoft Corporation. All rights reserved.
Intune
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile
application management (MAM).
When devices are enrolled and managed in Intune, administrators can:
โ€ข See the devices enrolled and get an inventory of the ones accessing
organization resources.
โ€ข Configure devices so they meet your security and health standards.
โ€ข Push certificates to devices so users can easily access your Wi-Fi
network, or use a VPN to connect to it.
โ€ข See reports on users and devices to determine if they're compliant.
โ€ข Remove organization data if a device is lost, stolen, or not used
anymore.
When apps are managed in Intune, administrators can:
โ€ข Add and assign mobile apps to user groups and devices.
โ€ข Configure apps to start or run with specific settings enabled and
update existing apps already on the device.
โ€ข ยท See reports on which apps are used and track their usage.
โ€ข Do a selective wipe by removing only organization data from apps.
MDM MAM
ยฉ Copyright Microsoft Corporation. All rights reserved.
Endpoint security with Intune
Manage
devices
Manage
security baselines
Use policies to
manage device
security
Use device
compliance policy
Role-based access control
with Microsoft Intune
Configure
conditional access
โ€ข Device-based conditional
access, to ensure only
managed and compliant
devices can access network
resources.
โ€ข App-based conditional
access to manage access to
network resources by users
on devices that aren't
managed with Intune.
Integration with
Microsoft Defender
for Endpoint
โ€ข Android
โ€ข iOS/iPadOS
โ€ข Windows 10 or later
ยฉ Copyright Microsoft Corporation. All rights reserved.
Demo
Microsoft Intune
ยฉ Copyright Microsoft Corporation. All rights reserved.
Module Summary
In this module, you have:
โ€ข Learned about threat protection with Microsoft 365 Defender and its component solutions: Microsoft
Defender for Identity, Microsoft Defender for Endpoints, MCAS, and Microsoft Defender for Office 365.
โ€ข Learned about the security management capabilities of Microsoft 365 with the Microsoft 365 Defender
portal and Secure Score.
โ€ข Learned about Microsoft Intune.
ยฉ Copyright Microsoft Corporation. All rights reserved.

More Related Content

What's hot (20)

PPTX
SC-900 Intro
FredBrandonAuthorMCP
ย 
PPTX
SEIM-Microsoft Sentinel.pptx
AmrMousa51
ย 
PDF
Microsoft Azure Security Overview
Alert Logic
ย 
PPTX
Azure security and Compliance
Karina Matos
ย 
PDF
Microsoft Defender and Azure Sentinel
David J Rosenthal
ย 
PPTX
Azure Sentinel
Cheah Eng Soon
ย 
PPTX
Azure Security Center- Zero to Hero
Kasun Rajapakse
ย 
PDF
Access Security - Privileged Identity Management
Eng Teong Cheah
ย 
PDF
introduction to Azure Sentinel
Robert Crane
ย 
PDF
Introduction to Azure Sentinel
arnaudlh
ย 
PDF
Azure Security Overview
David J Rosenthal
ย 
PDF
An introduction to Office 365 Advanced Threat Protection (ATP)
Robert Crane
ย 
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
ย 
PDF
Microsoft Azure Sentinel
BGA Cyber Security
ย 
PDF
Azure Sentinel Tips
Mario Worwell
ย 
PPTX
Azure Security Fundamentals
Lorenzo Barbieri
ย 
PPTX
Azure Sentinel.pptx
Mohit Chhabra
ย 
PPTX
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
ย 
PDF
7 Experts on Implementing Microsoft 365 Defender
Mighty Guides, Inc.
ย 
PDF
Microsoft Office 365 Advanced Threat Protection
David J Rosenthal
ย 
SC-900 Intro
FredBrandonAuthorMCP
ย 
SEIM-Microsoft Sentinel.pptx
AmrMousa51
ย 
Microsoft Azure Security Overview
Alert Logic
ย 
Azure security and Compliance
Karina Matos
ย 
Microsoft Defender and Azure Sentinel
David J Rosenthal
ย 
Azure Sentinel
Cheah Eng Soon
ย 
Azure Security Center- Zero to Hero
Kasun Rajapakse
ย 
Access Security - Privileged Identity Management
Eng Teong Cheah
ย 
introduction to Azure Sentinel
Robert Crane
ย 
Introduction to Azure Sentinel
arnaudlh
ย 
Azure Security Overview
David J Rosenthal
ย 
An introduction to Office 365 Advanced Threat Protection (ATP)
Robert Crane
ย 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
ย 
Microsoft Azure Sentinel
BGA Cyber Security
ย 
Azure Sentinel Tips
Mario Worwell
ย 
Azure Security Fundamentals
Lorenzo Barbieri
ย 
Azure Sentinel.pptx
Mohit Chhabra
ย 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
ย 
7 Experts on Implementing Microsoft 365 Defender
Mighty Guides, Inc.
ย 
Microsoft Office 365 Advanced Threat Protection
David J Rosenthal
ย 

Similar to SC-900 Capabilities of Microsoft Security Solutions (20)

PDF
Longji Vwamhi | Infrastructure With Microsoft Defender
Longji Vwamhi
ย 
PDF
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
mahadikamol123
ย 
PDF
do you want to know about what is Microsoft Sentinel.pdf
amilsaifi5
ย 
PDF
Nicholas DiCola | Secure your IT resources with Azure Security Center
Microsoft ร–sterreich
ย 
PDF
aOS Monaco 2019 - A7 - Sรฉcurisez votre SI et vos services Office 365 partie 2...
aOS Community
ย 
PPTX
Azure Fundamentals Part 3
CCG
ย 
PPTX
Power of the cloud - Introduction to azure security
Bruno Capuano
ย 
PPTX
Cloud Security_ Unit 4
Integral university, India
ย 
PDF
Top 10 cloud security tools to adopt in 2024.pdf
Sparity1
ย 
PDF
CISSP-2022 Update domain 3 certification handouts
jboy80616
ย 
PDF
Securing Red Hat workloads on Azure
Principled Technologies
ย 
PDF
Top Learnings from Azure Security (1).pdf
infosec train
ย 
PPTX
Microsoft Sentinel and Its Components.pptx
Infosectrain3
ย 
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cryptzone
ย 
PPTX
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
ย 
PPTX
What is Microsoft Azure Security?-Microsoft Azure security
Zabeel Institute
ย 
PDF
Interview Questions for Azure Security.pdf
Infosec Train
ย 
PDF
Top 20 Cloud Security Professional Interview Q&A.pdf
infosecTrain
ย 
PDF
Top 20 Cloud Security Professional Interview Questions and Answers
priyanshamadhwal2
ย 
PDF
Ready to Ace Your Cloud Security Interview.
InfosecTrain
ย 
Longji Vwamhi | Infrastructure With Microsoft Defender
Longji Vwamhi
ย 
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
mahadikamol123
ย 
do you want to know about what is Microsoft Sentinel.pdf
amilsaifi5
ย 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Microsoft ร–sterreich
ย 
aOS Monaco 2019 - A7 - Sรฉcurisez votre SI et vos services Office 365 partie 2...
aOS Community
ย 
Azure Fundamentals Part 3
CCG
ย 
Power of the cloud - Introduction to azure security
Bruno Capuano
ย 
Cloud Security_ Unit 4
Integral university, India
ย 
Top 10 cloud security tools to adopt in 2024.pdf
Sparity1
ย 
CISSP-2022 Update domain 3 certification handouts
jboy80616
ย 
Securing Red Hat workloads on Azure
Principled Technologies
ย 
Top Learnings from Azure Security (1).pdf
infosec train
ย 
Microsoft Sentinel and Its Components.pptx
Infosectrain3
ย 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cryptzone
ย 
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
ย 
What is Microsoft Azure Security?-Microsoft Azure security
Zabeel Institute
ย 
Interview Questions for Azure Security.pdf
Infosec Train
ย 
Top 20 Cloud Security Professional Interview Q&A.pdf
infosecTrain
ย 
Top 20 Cloud Security Professional Interview Questions and Answers
priyanshamadhwal2
ย 
Ready to Ace Your Cloud Security Interview.
InfosecTrain
ย 
Ad

More from FredBrandonAuthorMCP (7)

PPTX
Savings, Expenses, and Budgeting.pptx
FredBrandonAuthorMCP
ย 
PPTX
Investing and Personal Financial Planning.pptx
FredBrandonAuthorMCP
ย 
PPTX
Exploring Blockchain in the Enterprise
FredBrandonAuthorMCP
ย 
PPTX
Business Automation - Intro to the Power Platform
FredBrandonAuthorMCP
ย 
PPTX
Automating Business Process with PowerApps and Power BI
FredBrandonAuthorMCP
ย 
PPTX
Automation for Small Business using the Power Platform
FredBrandonAuthorMCP
ย 
PPTX
Automating Business Processes Create Expense Tracker using PowerApps and Powe...
FredBrandonAuthorMCP
ย 
Savings, Expenses, and Budgeting.pptx
FredBrandonAuthorMCP
ย 
Investing and Personal Financial Planning.pptx
FredBrandonAuthorMCP
ย 
Exploring Blockchain in the Enterprise
FredBrandonAuthorMCP
ย 
Business Automation - Intro to the Power Platform
FredBrandonAuthorMCP
ย 
Automating Business Process with PowerApps and Power BI
FredBrandonAuthorMCP
ย 
Automation for Small Business using the Power Platform
FredBrandonAuthorMCP
ย 
Automating Business Processes Create Expense Tracker using PowerApps and Powe...
FredBrandonAuthorMCP
ย 
Ad

Recently uploaded (20)

PDF
Python basic programing language for automation
DanialHabibi2
ย 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
ย 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
ย 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
ย 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
ย 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
ย 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
ย 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
ย 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
ย 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
ย 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
ย 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
ย 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
ย 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
ย 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
ย 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
ย 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
ย 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
ย 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
ย 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
ย 
Python basic programing language for automation
DanialHabibi2
ย 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
ย 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
ย 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
ย 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
ย 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
ย 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
ย 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
ย 
Blockchain Transactions Explained For Everyone
CIFDAQ
ย 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
ย 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
ย 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
ย 
Smart Trailers 2025 Update with History and Overview
Paul Menig
ย 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
ย 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
ย 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
ย 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
ย 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
ย 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
ย 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
ย 

SC-900 Capabilities of Microsoft Security Solutions

  • 1. ยฉ Copyright Microsoft Corporation. All rights reserved. SC-900T00-A Module 3: Describe the Capabilities of Microsoft Security Solutions
  • 2. ยฉ Copyright Microsoft Corporation. All rights reserved. Module Agenda Describe basic security capabilities in Azure Describe security management capabilities of Azure Describe security capabilities of Azure Sentinel Describe threat protection with Microsoft 365 Defender Describe security management capabilities of Microsoft 365 Describe endpoint security with Microsoft Intune
  • 3. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 1: Describe basic security capabilities in Azure
  • 4. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 1 Introduction After completing this module, you should be able to: Describe Azure security capabilities for protecting your network Describe how Azure can protect your VMs Describe how encryption on Azure can protect your data
  • 5. ยฉ Copyright Microsoft Corporation. All rights reserved. Azure Network Security groups Network security groups (NSG) let you allow or deny network traffic to and from Azure resources that exist in your Azure Virtual Network. โ€ข An NSG can be associated with multiple subnets or network interfaces in a VNet. โ€ข An NSG is made up of inbound and outbound security rules. โ€ข Each rule specifies one or more of the following properties: - Name - Priority - Source or destination - Protocol - Direction - Port range - Action
  • 6. ยฉ Copyright Microsoft Corporation. All rights reserved. Demo Azure Network Security Groups
  • 7. ยฉ Copyright Microsoft Corporation. All rights reserved. Azure DDoS protection A Distributed Denial of Service (DDoS) attack makes resources unresponsive. Azure DDoS Protection analyzes network traffic and discards anything that looks like a DDoS attack. Azure DDoS Protection tiers: โ€ข Basic โ€ข Standard
  • 8. ยฉ Copyright Microsoft Corporation. All rights reserved. Azure Firewall Azure Firewall protects your Azure Virtual Network (VNet) resources from attackers. Features include: โ€ข Built-in high availability & Availability Zones โ€ข Outbound SNAT & inbound DNAT โ€ข Threat intelligence โ€ข Network & application-level filtering โ€ข Multiple public IP addresses โ€ข Integration with Azure Monitor
  • 9. ยฉ Copyright Microsoft Corporation. All rights reserved. Azure Bastion Azure Bastion provides secure connectivity to your VMs directly from the Azure portal using Transport Layer Security (TLS). Features include: โ€ข RDP and SSH directly in Azure portal. โ€ข Remote session over TLS and firewall traversal for RDP/SSH. โ€ข No Public IP required on the Azure VM. โ€ข No hassle of managing NSGs. โ€ข Protection against port scanning. โ€ข Protect against zero-day exploits.
  • 10. ยฉ Copyright Microsoft Corporation. All rights reserved. Web Application Firewall Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. โ€ข Simpler security management โ€ข Improves the response time to a security threat โ€ข Patching a known vulnerability in one place โ€ข Protection against threats and intrusions.
  • 11. ยฉ Copyright Microsoft Corporation. All rights reserved. Ways Azure encrypts data & use of Key Vault Encryption on Azure Azure Storage Service Encryption Azure Disk Encryption Transparent data encryption (TDE) What is Azure Key Vault? Secrets management Key management Certificate management Store secrets backed by HW or SW
  • 12. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 2: Describe security management capabilities of Azure
  • 13. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 2 Introduction After completing this module, youโ€™ll be able to: Describe the security management capabilities of Azure. Describe the benefits and use cases of Azure Defender. Understand Cloud Security Posture Management and the security baseline.
  • 14. ยฉ Copyright Microsoft Corporation. All rights reserved. Azure Security Center Azure Security Center - A unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not - as well as on premises. Azure Security Centerโ€™s features cover two broad pillars of cloud security: Cloud security posture management(CSPM): โ€ข CSPM uses a combination of tools & services to strengthen your hybrid cloud posture and track compliance with the built-in policies. โ€ข Features include secure score, detection of security misconfigurations in your Azure machines, asset inventory, and more. Cloud workload protection (CWP): โ€ข Security Center's integrated cloud workload protection platform (CWPP), Azure Defender, brings advanced, intelligent, protection of your Azure, non- Azure, and hybrid resources and workloads. โ€ข Defender plans include Azure Defender for servers, App Service, SQL, Key Vault, and moreโ€ฆ
  • 15. ยฉ Copyright Microsoft Corporation. All rights reserved. Azure Secure Score The secure score is shown in the Azure portal pages as a percentage value. To improve your secure score, remediate security recommendations from your recommendations list.
  • 16. ยฉ Copyright Microsoft Corporation. All rights reserved. Demo Azure Security Center
  • 17. ยฉ Copyright Microsoft Corporation. All rights reserved. Security baselines & the Azure Security Benchmark Security baselines for Azure offer a consistent experience when securing your environment. They apply prescriptive best practices and recommendations from the Azure Security Benchmark (ASB) to improve the security of workloads, data, and services on Azure. The ASB comprises the security recommendations specific to the Azure platform. Example security baselines include: Azure security baseline for Azure Active Directory: Applies guidance from the ASB to Azure AD Azure security baseline for Azure Firewall: Applies guidance from the ASB to Azure Firewall. Azure security baseline for Security Center: Applies guidance from the ASB to Azure Security Center.
  • 18. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 3: Describe security capabilities of Azure Sentinel
  • 19. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 3 Introduction After completing this module, youโ€™ll be able to: Describe the security concepts for SIEM, SOAR, and XDR. Describe how Azure Sentinel provides integrated threat protection. Describe the capabilities of Azure Sentinel.
  • 20. ยฉ Copyright Microsoft Corporation. All rights reserved. SIEM, SOAR, and XDR SIEM What is security incident and event management? A SIEM system is a tool that an organization uses to collect data from across the whole estate, including infrastructure, software, and resources. It does analysis, looks for correlations or anomalies, and generates alerts and incidents. SOAR What is security orchestration automated response? A SOAR system takes alerts from many sources, such as a SIEM system. The SOAR system then triggers action- driven automated workflows and processes to run security tasks that mitigate the issue. XDR What is extended detection and response? An XDR system is designed to deliver intelligent, automated, and integrated security across an organizationโ€™s domain. It helps prevent, detect, and respond to threats across identities, endpoints, applications, email, IoT, infrastructure, and cloud platforms.
  • 21. ยฉ Copyright Microsoft Corporation. All rights reserved. Sentinel provides integrated threat protection (Slide 1) Collect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds. Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence. Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft. Respond to incidents rapidly with built-in orchestration and automation of common security.
  • 22. ยฉ Copyright Microsoft Corporation. All rights reserved. Sentinel provides integrated threat protection (Slide 2) Connect Sentinel to your data: use connectors for Microsoft solutions providing real-time integration. Workbooks: monitor the data using the Azure Sentinel integration with Azure Monitor Workbooks. Analytics: Using built-in analytics alerts, youโ€™ll get notified when anything suspicious occurs. Manage incidents: An incident is created when an alert that you've enabled is triggered. Security automation and orchestration: Integrate with Azure Logic Apps, to create workflows Playbooks: A collection of procedures that can help automate and orchestrate your response. Investigation: Understand the scope of a potential security threat and find the root cause. Hunting: Use search-and-query tools, to hunt proactively for threats, before an alert is triggered. Integrated threat protection: XDR with Microsoft 365 Defender and Azure Defender integration.
  • 23. ยฉ Copyright Microsoft Corporation. All rights reserved. Sentinel provides integrated threat protection (Slide 3)
  • 24. ยฉ Copyright Microsoft Corporation. All rights reserved. Demo Azure Sentinel
  • 25. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 4: Describe threat protection with Microsoft 365 Defender
  • 26. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 4 Introduction At the end of this module, youโ€™ll be able to: Describe the Microsoft 365 Defender service. Describe how Microsoft 365 Defender provides integrated protection against sophisticated attacks. Describe how Microsoft Cloud App Security can help defend your data and assets.
  • 27. ยฉ Copyright Microsoft Corporation. All rights reserved. Microsoft 365 Defender services Microsoft 365 Defender Natively coordinate the detection, prevention, investigation, and response to threats. Protects identities, endpoints, apps and email & collaboration.
  • 28. ยฉ Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Identity Microsoft Defender for Identity covers following key areas Monitor and profile user behavior and activities Defender for Identity monitors and analyzes user activities and information across your network, including permissions and group membership, creating a behavioral baseline for each user. Protect user identities and reduce the attack surface Defender for Identity gives invaluable insights on identity configurations and suggested security best practices. Through security reports and user profile analytics. Identify suspicious activities and advanced attacks across the cyberattack kill-chain โ€ข Reconnaissance โ€ข Compromised credentials โ€ข Lateral movements โ€ข Domain dominance Investigate alerts and user activities Defender for Identity is designed to reduce general alert noise, providing only relevant, important security alerts in a simple, real-time organizational attack timeline.
  • 29. ยฉ Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Office 365 Microsoft Defender for Office 365 covers: 1 2 3 4 Threat protection policies Reports Threat investigation and response capabilities Automated investigation and response capabilities Microsoft Defender for Office 365 Plan 1 โ€ข Safe Attachments โ€ข Safe Links โ€ข Safe Attachments for SharePoint, OneDrive, & Microsoft Teams โ€ข Anti-phishing protection โ€ข Real-time detections Microsoft Defender for Office 365 Plan 2 ยท Threat Trackers ยท Threat Explorer ยท Automated investigation & response (AIR) ยท Attack Simulator Microsoft Defender for Office 365 availability ยท Microsoft 365 E5 ยท Office 365 E5 ยท Office 365 A5 ยท Microsoft 365 Business Premium
  • 30. ยฉ Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Endpoint Microsoft Defender for Endpoint is a platform designed to help enterprise networks protect endpoints.
  • 31. ยฉ Copyright Microsoft Corporation. All rights reserved. Microsoft Cloud App Security Microsoft Cloud App Security provides rich visibility to your cloud services, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services. The Cloud App Security framework ยท Discover and control the use of Shadow IT ยท Protect your sensitive information anywhere in the cloud ยท Protect against cyberthreats and anomalies ยท Assess your cloud apps' compliance Office 365 Cloud App Security Enhanced Cloud App Discovery in Azure Active Directory Microsoft Cloud App Security architecture
  • 32. ยฉ Copyright Microsoft Corporation. All rights reserved. Demo Microsoft Cloud App Security (MCAS)
  • 33. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 5: Describe security management capabilities of Microsoft 365
  • 34. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 5 Introduction In this module, you will: Describe and explore the Microsoft 365 Defender portal Describe how to use Microsoft Secure Score. Explore security reports and dashboards. Describe incidents and incident management capabilities.
  • 35. ยฉ Copyright Microsoft Corporation. All rights reserved. Microsoft 365 Defender portal The Microsoft 365 Defender portal combines protection, detection, investigation, and response to email, collaboration, identity, and device threats, in a central portal. View the security health of your organization. Act to configure devices, users, and apps. Get alerts for suspicious activity. The Microsoft 365 Defender navigation pane include these options and more: Learning hub Incidents & alerts Action center Reports Secure Score Hunting Email & collaboration Permissions & roles Threat analytics Endpoints
  • 36. ยฉ Copyright Microsoft Corporation. All rights reserved. Describe how to use Microsoft Secure Score Microsoft Secure Score is a representation of a company's security posture. Will show all possible improvements for the product, whatever the license edition, subscription, or plan. Supports recommendations for: โ€ข Microsoft 365 โ€ข Azure Active Directory โ€ข Microsoft Defender for Endpoint โ€ข Microsoft Defender for Identity โ€ข Cloud App Security
  • 37. ยฉ Copyright Microsoft Corporation. All rights reserved. Demo The Microsoft 365 Defender portal
  • 38. ยฉ Copyright Microsoft Corporation. All rights reserved. Security reports and dashboards The Microsoft 365 Defender portal includes a Reports section. Shown below is the general security report. By default, cards are grouped by the following categories: โ€ข Identities - user accounts and credentials. โ€ข Data - email and document contents. โ€ข Devices - computers, mobile phones, and other devices. โ€ข Apps - programs and attached online services. You can group cards by topic (risk, detection trends, configuration and health, and other.
  • 39. ยฉ Copyright Microsoft Corporation. All rights reserved. Incidents & incident management Incidents are a collection of correlated alerts created when a suspicious event is found and provides a comprehensive view and context of an attack. Incident management Managing incidents is critical in ensuring that threats are contained and addressed. In Microsoft 365 Defender, you can manage incidents on devices, users accounts, and mailboxes.
  • 40. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 6: Describe endpoint security with Microsoft Intune
  • 41. ยฉ Copyright Microsoft Corporation. All rights reserved. Lesson 6 Introduction After completing this module, you should be able to: Describe what Intune is. Describe the tools available with Intune. Describe howtomanage deviceswith MicrosoftEndpoint Manager.
  • 42. ยฉ Copyright Microsoft Corporation. All rights reserved. Intune Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). When devices are enrolled and managed in Intune, administrators can: โ€ข See the devices enrolled and get an inventory of the ones accessing organization resources. โ€ข Configure devices so they meet your security and health standards. โ€ข Push certificates to devices so users can easily access your Wi-Fi network, or use a VPN to connect to it. โ€ข See reports on users and devices to determine if they're compliant. โ€ข Remove organization data if a device is lost, stolen, or not used anymore. When apps are managed in Intune, administrators can: โ€ข Add and assign mobile apps to user groups and devices. โ€ข Configure apps to start or run with specific settings enabled and update existing apps already on the device. โ€ข ยท See reports on which apps are used and track their usage. โ€ข Do a selective wipe by removing only organization data from apps. MDM MAM
  • 43. ยฉ Copyright Microsoft Corporation. All rights reserved. Endpoint security with Intune Manage devices Manage security baselines Use policies to manage device security Use device compliance policy Role-based access control with Microsoft Intune Configure conditional access โ€ข Device-based conditional access, to ensure only managed and compliant devices can access network resources. โ€ข App-based conditional access to manage access to network resources by users on devices that aren't managed with Intune. Integration with Microsoft Defender for Endpoint โ€ข Android โ€ข iOS/iPadOS โ€ข Windows 10 or later
  • 44. ยฉ Copyright Microsoft Corporation. All rights reserved. Demo Microsoft Intune
  • 45. ยฉ Copyright Microsoft Corporation. All rights reserved. Module Summary In this module, you have: โ€ข Learned about threat protection with Microsoft 365 Defender and its component solutions: Microsoft Defender for Identity, Microsoft Defender for Endpoints, MCAS, and Microsoft Defender for Office 365. โ€ข Learned about the security management capabilities of Microsoft 365 with the Microsoft 365 Defender portal and Secure Score. โ€ข Learned about Microsoft Intune.
  • 46. ยฉ Copyright Microsoft Corporation. All rights reserved.