You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Evaluate solutions that include Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps
3
+
title: Evaluate how Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps protect productivity workloads
4
4
metadata:
5
-
title: Evaluate Solutions That Include Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps
5
+
title: Evaluate how Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps protect productivity workloads
6
6
description: "Evaluate how Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps protect productivity and collaboration workloads, including email threat protection, CASB capabilities, and real-time session controls."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-microsoft-365/4-design-configurations-operational-practices-microsoft-365.yml
title: Evaluate data security and compliance controls in Microsoft Copilot for Microsoft 365 services
3
+
title: Evaluate how data security and compliance controls protect organizational data used by Microsoft 365 Copilot
4
4
metadata:
5
-
title: Evaluate data security and compliance controls in Microsoft Copilot for Microsoft 365 services
5
+
title: Evaluate How Data Security and Compliance Controls Protect Organizational Data Used by Microsoft 365 Copilot
6
6
description: "Evaluate data security and compliance controls for Microsoft 365 Copilot, including sensitivity labels, DLP, Insider Risk Management, auditing, eDiscovery, retention, and DSPM for AI."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-microsoft-365/includes/2-evaluate-security-posture-collaboration-productivity-workloads.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@ Evaluating security posture for productivity and collaboration workloads require
2
2
3
3
## Evaluate posture with Microsoft Secure Score
4
4
5
-
[Microsoft Secure Score](/defender-xdr/microsoft-secure-score) is a numerical measurement of your organization's security posture, available in the [Microsoft Defender portal](https://security.microsoft.com/securescore). A higher score indicates that more recommended security actions are implemented. Secure Score helps your organization:
5
+
Microsoft Secure Score is a numerical measurement of your organization's security posture, available in the Microsoft Defender portal. A higher score indicates that more recommended security actions are implemented. Secure Score helps your organization:
6
6
7
7
-**Report** on the current state of security posture across productivity workloads.
8
8
-**Improve** posture by providing discoverability, visibility, guidance, and control.
@@ -32,7 +32,7 @@ Secure Score also covers non-Microsoft SaaS applications connected through Defen
32
32
Recommended actions are organized into four groups that align to the core dimensions of your productivity workload security:
33
33
34
34
-**Identity**: Microsoft Entra accounts and roles, including multifactor authentication, Conditional Access policies, and privileged role management.
35
-
-**Device**: Microsoft Defender for Endpoint recommendations, covered under [Microsoft Secure Score for Devices](/windows/security/threat-protection/microsoft-defender-atp/tvm-microsoft-secure-score-devices), including vulnerability management and endpoint configuration.
35
+
-**Device**: Microsoft Defender for Endpoint recommendations, including vulnerability management and endpoint configuration.
36
36
-**Apps**: Email and cloud app security, including Exchange Online protection policies and Defender for Cloud Apps configurations.
37
37
-**Data**: Microsoft Purview Information Protection recommendations, covering data classification, sensitivity labels, and data loss prevention policies.
38
38
@@ -67,7 +67,7 @@ The highest ranked actions should be prioritized first. For actions that have hi
67
67
68
68
## Extend posture evaluation with Microsoft Security Exposure Management
69
69
70
-
[Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) builds on Secure Score by providing a unified view of security posture across your entire digital estate, including endpoints, cloud resources, and external attack surfaces. While Secure Score acts as an industry baseline and benchmark, Security Exposure Management adds deeper contextual analysis for designing holistic protection strategies for productivity workloads.
70
+
Microsoft Security Exposure Management builds on Secure Score by providing a unified view of security posture across your entire digital estate, including endpoints, cloud resources, and external attack surfaces. While Secure Score acts as an industry baseline and benchmark, Security Exposure Management adds deeper contextual analysis for designing holistic protection strategies for productivity workloads.
71
71
72
72
Key capabilities that complement Secure Score include:
[Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) now resides within Security Exposure Management, providing a unified vulnerability management experience across your digital estate. This integration delivers several benefits for evaluating collaboration workload posture:
86
+
Microsoft Defender Vulnerability Management now resides within Security Exposure Management, providing a unified vulnerability management experience across your digital estate. This integration delivers several benefits for evaluating collaboration workload posture:
87
87
88
88
-**Unified vulnerability view**: Organizations with both Defender for Cloud and Defender for Endpoint licenses can see all vulnerabilities affecting their devices and cloud resources in a single view.
89
89
-**Risk-based prioritization**: Cloud vulnerabilities are prioritized by risk in the Defender portal, helping you focus on the most impactful issues across your productivity workloads.
90
90
-**Integrated recommendations**: Vulnerability management recommendations feed into the unified recommendations catalog, with separate views for misconfigurations and vulnerabilities to support different remediation workflows.
91
91
92
92
### Data connectors
93
93
94
-
Security Exposure Management supports [data connectors](/security-exposure-management/overview-data-connectors) that integrate with external security solutions and data sources. These connectors consolidate security data from non-Microsoft tools—such as ServiceNow CMDB for asset management, and Tenable, Qualys, and Rapid7 for vulnerability assessment—into a single unified view. Connectors for Wiz and Palo Alto Prisma extend coverage to non-Microsoft cloud security platforms.
94
+
Security Exposure Management supports data connectors that integrate with external security solutions and data sources. These connectors consolidate security data from non-Microsoft tools—such as ServiceNow CMDB for asset management, and Tenable, Qualys, and Rapid7 for vulnerability assessment—into a single unified view. Connectors for Wiz and Palo Alto Prisma extend coverage to non-Microsoft cloud security platforms.
95
95
96
96
Data collected through these connectors is normalized within the enterprise exposure graph, enriching your device inventory, mapping relationships between external assets and existing infrastructure, and revealing new attack paths. For a security architect evaluating productivity workloads, connectors provide a complete picture of posture across both Microsoft and non-Microsoft security tools.
97
97
@@ -110,15 +110,15 @@ When you evaluate and design security posture for productivity and collaboration
110
110
111
111
## Evaluate AI readiness as a posture dimension
112
112
113
-
As organizations adopt generative AI tools, security posture evaluation must extend to AI-specific risks. [Data Security Posture Management (DSPM)](/purview/data-security-posture-management-learn-about) in Microsoft Purview provides AI-focused posture metrics that complement Secure Score and Security Exposure Management. DSPM tracks objectives related to data exposure prevention, oversharing risk, and policy coverage. These capabilities are covered in detail in the unit on evaluating data security controls for Microsoft 365 Copilot.
113
+
As organizations adopt generative AI tools, security posture evaluation must extend to AI-specific risks. Data Security Posture Management (DSPM) in Microsoft Purview provides AI-focused posture metrics that complement Secure Score and Security Exposure Management. DSPM tracks objectives related to data exposure prevention, oversharing risk, and policy coverage. These capabilities are covered in detail in the unit on evaluating data security controls for Microsoft 365 Copilot.
114
114
115
115
From a posture evaluation perspective, the **AI observability** dashboard in DSPM is especially relevant. It inventories all active AI apps and agents across your organization, highlights high-risk agents, and reports sensitive interactions. This gives you visibility into how AI tools interact with organizational data, which feeds directly into the posture metrics you track alongside Secure Score and Security Exposure Management.
116
116
117
-
The [Microsoft Security Dashboard for AI](https://ai.security.microsoft.com) provides a complementary executive-level view. It aggregates AI risk signals from Microsoft Entra, Microsoft Defender, and Microsoft Purview into a single dashboard, covering identity governance for AI apps, threat protection for AI workloads, data classification of AI-accessible content, and compliance posture against AI regulations. For security architects, this dashboard provides a starting point for assessing whether existing security controls adequately cover the AI attack surface.
117
+
The Microsoft Security Dashboard for AI provides a complementary executive-level view. It aggregates AI risk signals from Microsoft Entra, Microsoft Defender, and Microsoft Purview into a single dashboard, covering identity governance for AI apps, threat protection for AI workloads, data classification of AI-accessible content, and compliance posture against AI regulations. For security architects, this dashboard provides a starting point for assessing whether existing security controls adequately cover the AI attack surface.
118
118
119
119
## Align with Microsoft cloud security benchmark v2
120
120
121
-
The [Microsoft cloud security benchmark v2 (MCSBv2)](/security/benchmark/azure/overview) provides a framework of security controls that validates your posture evaluation approach against Microsoft-recommended best practices. The **Posture and Vulnerability Management (PV)** domain maps directly to the capabilities covered in this unit:
121
+
The Microsoft cloud security benchmark v2 (MCSBv2) provides a framework of security controls that validates your posture evaluation approach against Microsoft-recommended best practices. The **Posture and Vulnerability Management (PV)** domain maps directly to the capabilities covered in this unit:
122
122
123
123
| MCSBv2 control | Secure Score / MSEM alignment |
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-microsoft-365/includes/3-design-microsoft-defender-365-solution.md
+9-14Lines changed: 9 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,8 @@
1
1
As a security architect, you need to evaluate how Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps protect your organization's productivity and collaboration workloads. These solutions address different but complementary attack surfaces: Defender for Office 365 focuses on email and collaboration-based threats, while Defender for Cloud Apps extends protection to SaaS applications. Both integrate into Microsoft Defender XDR (Extended Detection and Response), providing correlated signals and unified incident management across the full kill chain.
2
2
3
-
:::image type="content" source="../media/defender-xdr-integration.png" lightbox="../media/defender-xdr-integration.png" alt-text="An image that shows how Microsoft's XDR solution seamlessly integrates with Microsoft Sentinel in the Microsoft Defender portal.":::
3
+
## Evaluate how Microsoft Defender for Office 365 protects collaboration workloads
4
4
5
-
## Evaluate Microsoft Defender for Office 365
6
-
7
-
[Microsoft Defender for Office 365](/defender-office-365/mdo-about) protects your organization against sophisticated threats in email and collaboration tools, including phishing, zero-day malware, and business email compromise (BEC). It's available in two plans that build on the built-in security features included with all cloud mailboxes.
5
+
Microsoft Defender for Office 365 protects your organization against sophisticated threats in email and collaboration tools, including phishing, zero-day malware, and business email compromise (BEC). It's available in two plans that build on Exchange Online Protection (EOP), which provides built-in anti-malware, anti-spam, anti-spoofing, and zero-hour auto purge (ZAP) for all cloud mailboxes.
8
6
9
7
### Plan 1: Prevention and detection
10
8
@@ -34,9 +32,9 @@ When you evaluate Defender for Office 365 for your organization, consider the fo
34
32
-**Preset security policies**: Use preset security policies as a baseline configuration. These follow Microsoft-recommended defaults and simplify initial deployment. Customize policies as your organization's threat landscape evolves.
35
33
-**XDR integration**: Defender for Office 365 feeds alerts and signals into Microsoft Defender XDR, correlating email-based threats with endpoint, identity, and cloud app signals. This cross-domain correlation is essential for detecting multi-stage attacks.
36
34
37
-
## Evaluate Microsoft Defender for Cloud Apps
35
+
## Evaluate how Microsoft Defender for Cloud Apps protects SaaS applications
38
36
39
-
[Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps) is a cloud access security broker (CASB) that delivers full protection for SaaS applications. It provides visibility into cloud app usage, enforces real-time access controls, and protects sensitive data stored in cloud services.
37
+
Microsoft Defender for Cloud Apps is a cloud access security broker (CASB) that delivers full protection for SaaS applications. It provides visibility into cloud app usage, enforces real-time access controls, and protects sensitive data stored in cloud services.
40
38
41
39
### Core capabilities
42
40
@@ -52,15 +50,13 @@ Defender for Cloud Apps addresses four key areas:
52
50
53
51
### Conditional Access App Control
54
52
55
-
[Conditional Access App Control](/defender-cloud-apps/proxy-intro-aad) uses a reverse proxy architecture integrated with Microsoft Entra Conditional Access to monitor and control user sessions in real time. Access and session policies enable granular controls, including:
53
+
Conditional Access App Control uses a reverse proxy architecture integrated with Microsoft Entra Conditional Access to monitor and control user sessions in real time. Access and session policies enable granular controls, including:
56
54
57
55
- Blocking downloads of sensitive documents on unmanaged devices.
58
56
- Requiring reauthentication when sensitive actions occur during a session.
59
57
- Protecting downloaded files by applying encryption and sensitivity labels.
60
58
- Preventing uploads of unlabeled files that contain sensitive content.
61
59
- Blocking uploads of potentially malicious files by scanning against Microsoft Threat Intelligence.
62
-
- Monitoring user sessions for compliance and logging activities for investigation.
63
-
64
60
For a security architect, Conditional Access App Control is a critical capability that bridges identity-based access decisions with real-time data protection. It extends Zero Trust principles into SaaS application sessions.
65
61
66
62
### Continuous threat protection through Microsoft Defender XDR
@@ -79,15 +75,14 @@ When you evaluate Defender for Cloud Apps, consider the following:
79
75
80
76
## Evaluate AI-specific threat protection
81
77
82
-
Defender for Cloud Apps plays a central role in discovering and governing generative AI applications across your organization. The cloud app catalog includes a **Generative AI** category covering more than a thousand AI apps, including ChatGPT, Google Gemini, and other large language model tools. Each app receives a risk score based on more than 90 risk factors spanning security, compliance, and legal criteria.
78
+
Defender for Cloud Apps plays a central role in discovering and governing generative AI applications across your organization. The cloud app catalog includes a **Generative AI** category covering more than a thousand AI apps, each scored against the same 90+ risk factors used for all cataloged applications.
83
79
84
80
For security architects, the key design decisions around AI app governance include:
85
81
86
-
-**Shadow AI discovery**: Deploy cloud discovery to identify which generative AI apps employees use. Filter on the Generative AI category to see usage patterns, user counts, and traffic volumes for each app.
82
+
-**Shadow AI discovery**: Deploy cloud discovery to identify which generative AI apps employees use. Filter on the Generative AI category to see usage patterns, user counts, and traffic volumes. Create app discovery policies to trigger alerts when new AI apps appear in your environment.
87
83
-**App sanctioning and blocking**: Based on risk scores and compliance requirements, sanction approved AI apps and unsanction those that don't meet your security standards. Unsanctioned apps are automatically blocked on devices onboarded to Defender for Endpoint.
88
-
-**Discovery policies for new AI apps**: Create app discovery policies that trigger alerts when new Generative AI apps appear in your environment. This ensures continuous monitoring as new AI tools enter the market.
89
-
-**Session controls for AI apps**: Apply [Conditional Access App Control](/defender-cloud-apps/proxy-intro-aad) session policies to sanctioned AI apps to monitor and restrict how data flows between your organization and these services.
84
+
-**Session controls for AI apps**: Apply Conditional Access App Control session policies to sanctioned AI apps to monitor and restrict data flows between your organization and AI services.
90
85
91
-
Defender for Cloud Apps also provides dedicated threat detections for [Microsoft 365 Copilot](/defender-cloud-apps/release-notes#new-threat-detections-for-microsoft-copilot-for-microsoft-365). Security teams receive alerts when users interact with Copilot under suspicious conditions, such as access from risky IP addresses. These signals integrate with Microsoft Defender XDR incidents, giving your security operations team visibility into AI-related threats alongside traditional attack patterns.
86
+
Defender for Cloud Apps also provides threat detections for Microsoft 365 Copilot, alerting security teams when users interact with Copilot under suspicious conditions such as access from risky IP addresses. These signals integrate into Defender XDR incidents, providing visibility into AI-related threats alongside traditional attack patterns.
0 commit comments