6 hours 59 minutes
Welcome back. Cybersecurity Sudbury Ins to the M s 3 65 Security Administration. Course
I'm Your Stronger Jim Daniels were a Model three. Invest 3 65. Threat Protection Lesson one. Security within industry 65. Part two
Invest 3 65 Advanced Threat Protection
In this lesson, we will undoubtably cover
standard email protection
E o p Staines Along protection,
the composition of M s 3 65 80 p Advanced threat protection
and the benefits of the secure score to an organization
exchange on protection. E O T
E O P WITH Microsoft 3 65 80 p.
You can't escape back or names.
GOP provides protection against spoofing efficient attacks. Span an hour.
Uses a combination of I P in your oral reputation
domain reputation span and now we're filtering content. Build train in connection filtering.
You can be extended by enabling invest 3 65 80 p
within the tenant
exchange Online on comes with GOP included,
So the very basic bare minimum
once your organization goes to exchange on you, will have e a p. There.
You won't have the advanced features that come with 3 65 80 p or Invest rate 65 80. You won't have those advanced features, however.
You'll have a lot of foundational features with the A P
in this 3. 65 is a collection. It's a collective of features designed to combat advanced targeted threats.
M s 3 65 80 p is comprised of safe attachments,
safe links, spoof intelligence quarantine and anti fishing
Cloud AB. Security is a comprehensive cross SAS solution. Bring you visibility data controls and enhance threat protection to your cloud. APS.
With the service, you gain visibility in the shadow I t.
By discovering cloud apps that your users Youlus
has includes representation,
discovering insights and hands control.
If you have the license for cast and you're not using a shame when you
cloud up, security is a wonderful tool.
exchange. Online protection comes standard with exchange online,
and it provides protection against spoofing
fishing span. And now, where true
What do you think?
Our friend Cosmo just pointed that help
that is true.
It's based on system config,
user behavior and other security related measurements.
Some of the benefits of secure score
walking organization do to mitigate risk
Compare your organization with what other organizations are doing
so you can actually set a target. And it will tell you what needs to be done to achieve that target.
dashboards. The high level view
that you can export. You give access to take screenshots off to give to your SI SOS security managers stakeholders
a p I.
You can extend it with flexible A p I
As humans, we want to see
accomplishments. It's is about nature.
That's why I s m I says, Hey,
I'm gonna write a list of things to do. However,
I'm gonna put two things on the list I've already done
so I can see those two items being marked now.
It gives you motivation. The same thing was to hear score. Once you make a change and it's reflected and secure score, you can actually see it go up. You can see it increase. That encourages you and your team
to continue working for that goal of a more secure environment.
AP I can be fully integrated in with a Microsoft graph.
Some of the benefits of quite and secure scored data through the graph
Say you want to monitor and report when you're secure scoring and downstream reporting tools.
In other words, you want to take a crystal report where you want to take
something. Third party.
Maybe you want to do a power bi our report and great the FBI into it.
You want track your configuration baseline.
You were integrated that into compliance or cyber security instruments, applications.
A lot of times,
when we get that security insurance, they want to see proof of our environment. They want to see when we make it better. They want to see proof of that. So secure score through a P. I can allow that
you integrate your data into your security incident and of imagine, you're seem
or your casby solution.
This way you can drive a hybrid or multi cloud framework so you can see the total picture.
You have your secure score with any mystery 65. But you also have your seen whether be as your senator or something else that has your firewall snapshot.
Maybe it has different configuration.
All of that can roll into one
buzzword. Single pane of glass.
You're secure. Scored dashboard.
It analyzes your in Miss Trixie five Security based on security settings across the tennis
to secure score framework is based on score relative toe. What features you have enabled
what features are available to enable and want to risk was like either for
enabling those features, configuring them the way they are configured or ignoring those features and not enabling
On this screen shot, we can see that
85 out of 364.
It's probably not the best for
we, but we can see how it's compared to other ones
and we can actually see. Hey, maybe you're off to a good start.
While the dashboard provides a snapshot of the current security posture,
the analyzer could be used to manage the risk over time.
The animal, either Tan, provides a historical graph
that shows the score over the past 30 60 90 days. So if your security team is really working on improving the secure score,
this is a tangible graph you can show
to desist. Ah, or just a cold for say, Hey, this is our improvement.
This is something reported
a K T. I performance indicator, the Microsoft Secure score that shows we're heading in the right direction for organization
once you've used the secure score tool to determine the state of your security. Next steps to analyze your findings and plan how to improve conditions
you should consider your potential forest
again. Wash your appetite for risk washer organizations. Security posture. What's their stance?
How difficult the provides solutions are to implement
timeframes. How long it's gonna take an impact to your rating based on East Action.
Every organization is different.
Most organizations go with the low hanging fruit
so they can go ahead and check a few items off the list and see a positive improvement
you want to look at. Is the juice worth the squeeze?
Some organizations if the implementation, is going to cost $100,000 a year,
but the end result of a materialization of that risk is only gonna be 5000. They're not even going to implement that. Control
doesn't make financial sense.
Each organization is different.
If you're consultant,
each one of these analysis is totally different. It's all dependent on that organization.
So to recap the lesson, invest 3 65 includes several security solutions that can help you protect your users. Resource is, and that including exchange alarm protection.
Oh, through C C five advanced threat protection and cloud APP Security.
The Microsoft secure score provides a numerical summary or rating of your security postural within an S 3 65.
This writing is based on assistant configurations.
Why you configured what you have available to configure and you haven't
use your behavior and other security related in measurements.
Thank you for joining me in this video. I hope to see you next time. Take care.
Microsoft 365 Fundamentals [MS-900]
Microsoft 365 Fundamentals is a course designed to help both those looking for more information ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
AZ-500: Microsoft Azure Security Technologies
In this Microsoft Azure Security Technologies (AZ-500) training, students will learn the skills that are ...
9 CEU/CPE Hours Available
Certificate of Completion Offered