I've written some advice that almost every organization can take to decrease the risk of being attacked by malicious actors. Awareness is rising due the fact that multiple organizations are being breached at this moment.
In this article I'm focusing on Cloud Security technology which is quickly deployable and can leverage instant insights and metrics to make 'security' decisions. I'm always pushing for quick enrollment and activation because the threat is out there. If you don't believe it — don't activate anything and only watch the insights. You will be confident and get in control to make impactful security decisions.
A How to decrease the risk of an attack on your users
In this chapter I've brought infrastructure close to the user-risk. Accounts with passwords are a big risk which can be lowered by activation of the steps below. This activation can be done in 4 hours.
1. Extend Active Directory to Azure AD for better insights in user risk
Install Azure AD Connect and sync your users to Azure AD. You could use Directory and password Synchronization to bring all identities from your current environment towards Azure AD.
2. Prevent all Azure AD accounts from being phished by activating Multi-Factor Authentication
First of all accept the fact that every password in your organization has been leaked. Read: Your Pa$$word doesn't matter — Microsoft Tech Community.
Security defaults will push MFA for every account and will disable legacy authentication that does not use MFA. Also don't forget to activate MFA for every company service.
To enable security defaults in your directory:
3. Understand the user and credential risks in your local domain
To understand the identity risk it's best to consolidate the risks from multiple fronts. Applications are using AD or Azure AD authentication which creates insights in an attack attempt. If you create a Defender for Identity instance, all user sign-ins are brought to the Cloud for analysis.
4. Activate a trial of Office 365 E5 to see identity risk consolidated from multiple fronts
When you have the capabilities to understand the identity risks and see what is going on in your organization you are more capable of acting and making decisions on additional levels — for example: creating an additional conditional access policy.
Then activate Cloud App Security (Defender for Cloud Apps).
Navigate to portal.cloudappsecurity.com and see the open alerts.
B How to protect your organization from software exploits
Software could contain malware packages which could take over computers. Badly patched computers are increasing the risk of being attacked from within.
If you have activated a demo E5 license you could understand the risk of bad patching of software from one portal. This activation is more complex and requires more attention and reaction but it's doable in some hours. Working on risks is another thing — but start doing and choose pragmatic.
C Protect your organization from targeted phishing attacks
Phishing attacks are the number one attempt to get control of your organizational infrastructure. Don't let actors in from a stupid e-mail.
D Don't make exceptions and take insights seriously
If you have activated some Microsoft 365 E5 capabilities you can now work on 2 portals to understand what is going on in your environment:
Take care and stay safe.