The Ultimate Guide to Securing Microsoft 365!

preview_player
Показать описание
In this episode I’ll take you from Zero to Hero in my latest security guide designed to bulletproof your environment. Hacking unfortunately is a multi million dollar industry that’s focussed on one thing. Ruining your life or your business. Well I say no more! It’s time to fight back and in this episode I’ll show you some simple tips and tricks that you can use that will vastly improve your security in Microsoft 365. From identity tips including multi factor authentication to conditional access. We’ll then look at securing your devices with Defender for Endpoint and then onto ensuring that those nasty phishing emails, attachments and links have nowhere to go. So as I say enough is enough. It’s time to fight back.

Timecodes

00:00 Introductions
02:04 Hunting for Bad Guys Using Sign In Logs
08:09 Fix the Anonymous Reporting Feature
07:48 How to easily Deploy Multi factor Authentication in Microsoft 365
11:30 How to Deploy MFA with Conditional Access
24:08 How to Protect your devices with Defender for Endpoint
29:00 How to Use Secure Score
30:09 How to stop Hackers sending you Malicious email Attachments
32:40 How to stop Hackers sending you Malicious Web Links
34:25 Session Conclusions
Рекомендации по теме
Комментарии
Автор

Genius Andy! More Security Best Practices PLZ

oliverreithage
Автор

Great quick key points to check, very clear, thanks

maluc
Автор

Excellent content. Thanks for sharing.👍

StamosTee
Автор

Great info. Thank you. Esp w license info. Good job.

harrylumsdon
Автор

Oh. You got to passkeys here. So they are a bit delayed I guess.

YES! I agree! Always show geo location for login requests as well as the requesting app! And educate your users on why this is important. It minimizes the risk of unintentionally letting someone else in

driver
Автор

Great video Andy! Very informative and really helpful for all levels of competency, even if you just want to polish up those policies! Thanks again!

traciekeane
Автор

@Andy - at 10:08: technically the SIM swap is all about having no physical access to the device nowadays. See any article on this — this point is getting enough info on a person to be able to impersonate the victim to their cell phone plan provider and getting them to switch the SIM to being registered to their (the attacker’s) phone

MosheWolfe
Автор

Thank you Andy for this new, very interesting video, with a price on the P1 subscribers ;-)

ACrispiels
Автор

Hey Andy! Being a Mac guy, or user at least, do you know if Microsoft has released the synchronized password experience for Sonoma yet? I use both a PC and a Mac for work since I do intune configurations and software distribution on both platforms for customers and test them. When enrolling Macs in intune you get an M365 login to start with and then you have to create a local account to log into your Mac. At some point with Sonoma this was going to change and the enrollment would be able to create the user account off of the M364 login and then keep password changes in sync. Though I read something about having to create one local account first for it to work which doesn’t really make much sense. Do you know if this is released yet? And also, it’s February now and still no passkey support for M365 accounts.. you talked about out this in a previous video, that FIDO2 keys would change to reflect this in EntraID when that was supported. Haven’t seen that rolled out to any tenants I manage yet.

driver
Автор

Hey Andy, with regards to the methods a user can enroll in MFA, if you have several checked, and you only want to lock it down to authenticator app, what happens to all of the users that are currently set up with text message as example they get forced to the app as soon as they try to authenticate next time?

jstump
Автор

Is there video explain incident and investigation at Defender portal?

doomy
Автор

Hello friend, were you able to definitively solve the invalid traffic issue? I would appreciate an answer, I am Spanish (you know how it feels)

gabiflorensa
Автор

As you’ve described in the video - would you rate the conditional access settings a ‘phishing resistant’?

Or it’s more we should be really implementing policies that target based on whether the request is coming from a compliant and non compliant device and ensure browser tokens or similar are expired.

C.Tag
Автор

biggest fear with conditional access is causing user disruption. For example: when I turned on MFA, I didnt realize it would sign users Outlook settings and we had a lot of calls. Report only sounds somewhat promising but doesnt necessarily show if the user will be receiving any prompts on their end. Is there a recommended way of approaching this to have the least amount of unexpected interruptions?

MegaNatebreezy
Автор

Is this for business accounts only? Does it apply to Home users?

kunalzshah
Автор

thank you for going over the report settings, and SIM swapping does not require physical access they just need to know your phone number and they socially engineer the phone company.
Is there any way to see who are the most active users ? report is hard to filter when you have so many users

Zachsnotboard
Автор

Enjoying the video... I wanted to give a "Like" but the count is currently at 420, and I don't want to be the one to ruin everyone's fun. I'll circle back after some other spoilsport does.

nickfmt