Table of Contents

Get Started

O365 Cloud App Security

Detect events in the Office 365 environment and take action to respond to a breach.


With Office 365, we no longer worry about security, virus and spam issues because these are handled by Microsoft.
Foxtons

Matthew Li Manager at Nova Business Services Limited

Improve Your Risk Profile

A user logs in from an unexpected subnet. A server experiences repeated login attempts from the same IP address. An account authenticates from Moscow two hours after logging in from Atlanta. If such anomalies go undetected, attackers can eventually seize Command and Control of machines, hop off to more lucrative financial systems, and execute code to create significant data breaches.

In their lighthearted take on a serious topic, Verizon’s “Data Breach Investigation Report” showed server security breaches in decline, but only in relation to the quickly growing device and person categories.  User/person attacks are rising due to malware and because users are falling prey to phishing.

Percent of Breaches Per Asset Category

Percent of Breaches Per Asset Category-1

Microsoft’s made significant investments in end user security, including rolling out Advanced Threat Protection to all Office 365 E5 subscribers.  And aof June 2016, another layer of security, called Advanced Security Managementwas added to Microsoft Office 365.  It’s automatically a part of the E5 bundle, or can be purchased a la carte for $3/user/month. 

Advanced Security Management allows you to: 

  • Identify high risk usage, security incidents, and threats 
  • Protect your Office 365 environment with granular security policies/controls 
  • Gain enhanced visibility into cloud SaaS apps, with no agent required 

Using Advanced Security Management allows the Security team to be better informed about events occurring in the Office 365 environment, and enables them to take action to avoid or respond to a breach.  Policies can be set up to watch for general anomalies or very specific ones.  Responses can vary from alerting an administrator to locking a potentially compromised account. 

The configurations are made in the Compliance Center within the Office 365 Admin Console.  The rules are actually stored in Azure, because Advanced Security Management is a stripped-down Office 365 version of Cloud Apps Security, the service that tracks SaaS usage and allows organizations to bring that under control. 

Below, you can see that one “General Anomaly” policy is already set up by default, which is looking for anomalies against the baseline threshold.  Two specific policies are also configured.

Alert From Advanced Security Management-1

When an anomaly is detected, an administrator can analyze the cause.  An example alert triggered by the general policy is shown below.  It shows that an admin’s account was used to log in from an anonymous proxy, via an unknown ISP, and ran a rare command.  All these oddities together combined for a combined risk score of 85/100, enough to cause an alert.

Advanced Security Management Policy Dashboard-1

Given such a Maltov cocktail of events, an administrator could respond by deactivating that account immediately, or drill down. If that IP address, for instance, was the source of attempted logins to multiple accounts, an administrator would know to take a different course of action.

Additional rules can be created for more narrow cases where an organization has concerns.

Advanced Security Management improves your risk profile, by alerting and even shutting down accounts when access is compromised.

For more info about keeping attacks from happening, return to our security landing page or look at the DLP/Identity Management capabilities in Office 365.

 

Resources

Office 365 Consolidation Lessons Learned Part 3

With all the proper planning, budgeting, and coordination complete, its now time to focus on the actual technical challenges that will be encountered when doing a tenant to tenant migration.  Each...

Office 365 Consolidation Lessons Learned Part 2

The first article in this series discussed the fundamental stages of a tenant to tenant migration.  Now that you understand the overall picture, this article will discuss the non-technical challenges...

Office 365 Consolidation Lessons Learned Part 1

In the age of pure on-premises environments, it was rare to have more than a single Active Directory environment.  Even when you did, it was merely tied together with a simple Forest Trust.  On a...

What's your Secure Score?

When Microsoft  released its Office 365 Secure Score in mid-2017, it promised to be a helpful roadmap for IT Pros to secure their O365 environment. 18 months later, O365 tenants are still woefully insecure.  Contact us to see what you can do to improve your organization's Secure Score. 

 

ref:_00D80KtFf._5000y1WwWQD:ref