{"id":89302,"date":"2019-04-17T09:00:50","date_gmt":"2019-04-17T16:00:50","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89302"},"modified":"2023-05-15T23:00:23","modified_gmt":"2023-05-16T06:00:23","slug":"defend-your-digital-landscape-microsoft-365","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/17\/defend-your-digital-landscape-microsoft-365\/","title":{"rendered":"Defend your digital landscape with Microsoft 365"},"content":{"rendered":"
What is it about the middle of the night that brings our fears to the surface? For me, it\u2019s the unknown dangers that may confront my young daughter and how I will protect her.<\/p>\n
Fear of the unknown can also disrupt the sleep of a chief information security officer (CISO) who worries about the inevitable attack they have yet to discover. What will they do when the company is breached? Is the organization ready? How bad will it be? This is why we adopt an \u201cassume breach\u201d mindset. Organizations must prevent as many attacks as they can, but they also must be able to detect when a bad actor has made it past their defenses and be ready to act.<\/p>\n
If you are suffering from sleepless nights, the Defend your digital landscape<\/a> e-book may offer peace of mind. The e-book shows how Microsoft 365<\/a> can help you quickly reconstruct an attack timeline and improve your defenses. It focuses on a (fictitious) Security Operations team lead, Cathy, who uses Microsoft 365 Enterprise E5<\/a> products to prevent, detect, and respond to a breach.<\/p>\n Phishing campaigns continue to be one of the most popular methods that bad actors use to compromise an identity and gain access to an enterprise. Even as users have gotten smarter, the attackers have improved their tactics. Defend your digital landscape<\/a> describes how you can use Microsoft 365 security to prevent employees from accessing links or attachments that are a likely threat, or better yet, block damaging emails from reaching them in the first place.<\/p>\n To uncover a breach, you need to identify when users behave atypically. Each of your users has \u201cnormal\u201d behavioral patterns related to how and where they access your network and resources. Microsoft 365 security can monitor usage and behavior across a variety of tools and platforms to develop a baseline for what is \u201cnormal\u201d for each user. Once it knows what\u2019s normal, it will recognize when something atypical has occurred and initiate action. The Defend your digital landscape<\/a> e-book provides several examples of how you can use this capability to automate a response.<\/p>\n If you are coordinating between several different security products, it isn\u2019t always easy to reconstruct an attack timeline. This is important because attackers may have compromised several users or endpoints before you detect them. The e-book provides clear examples of how Microsoft 365 products work together to help you correlate details and uncover what happened, so that you can rapidly respond and take back control.<\/p>\n As a parent, one of my jobs is to raise a child who is resilient in the face of setbacks. I can\u2019t eliminate all threats, but I can teach my daughter how to respond and recover when things don\u2019t go as planned. This basic survival concept also applies to security professionals.<\/p>\n To learn more, download the first three e-books in our series:<\/p>\n Also, stay tuned for the fourth e-book in our series, \u201cUnderstand and improve your security posture,\u201d which provides recommendations to help you build a strong security posture.<\/p>\n","protected":false},"excerpt":{"rendered":" Detect a security breach in real-time and respond immediately to reduce damage. Read our latest e-book, \u201cDefend your digital landscape,\u201d to find out how.<\/p>\n","protected":false},"author":96,"featured_media":89303,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3675],"products":[3690,3693],"threat-intelligence":[],"tags":[3809],"coauthors":[2014],"class_list":["post-89302","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-information-protection-and-governance","products-microsoft-defender","products-microsoft-defender-xdr","tag-security-strategies"],"yoast_head":"\nPrevent a breach<\/h3>\n
Detect a breach quickly to minimize impact<\/h3>\n
Respond to security incidents<\/h3>\n
Learn more<\/h3>\n
\n