Skip to content

about

This is basically note on how to setup, work with and improve microsoft defender suite I steal a lot of this from GSD, a very comprehensive guide!

more stuff on ms. entra and ms. purview

high level stuff

graph LR

A[MDE] --> |detect app|B[MDCA]
B --> |via XDR|C[sentinel]
A --> |via XDR|C
B --> |govern app|A
assets govern identify protect detect respond recover
identity MDI MDI, CA MDI MDI
endpoint MDE MDE MDE MDE
cloud MDCA policy MDCA, MDE MDCA, MDE MDCA, MDE
apps

stuff to learn

  • [ ] try azure
  • [ ] az 500 microsoft or microsoft or this roadmap?
  • [ ] try ms graph https://www.youtube.com/watch?v=9qIgyYLjHnU
  • [ ] try purview
  • [ ] read purview, MIP
  • [ ] read MDI, MDE, MDO
  • [ ] find baseline for azure
  • [ ] read azure vs aws https://nira.com/aws-security-vs-azure-security/#:~:text=AWS%20and%20Azure%20are%20almost,services%20and%20options%20than%20Azure. https://www.aquasec.com/cloud-native-academy/cspm/azure-security-vs-aws-security/ https://www.wiz.io/academy/azure-security-vs-aws-security https://medium.com/@leasepacket/aws-security-vs-azure-security-a-comprehensive-cloud-security-comparison-1b182104c40e
  • [ ] a bunch of youtube https://www.youtube.com/watch?v=7jUSFpsKj1E https://www.youtube.com/watch?v=WyGm28gHp3M https://www.youtube.com/watch?v=L5N9S8pKpOw
  • [ ] sending logs https://www.youtube.com/watch?v=BLqNvaF5nXg

azure and sentinel

XDR

also see high level above

image

capabilities

unified alert from various platform. deception in XDR

MDI

what

if you have domain controller, install MDI sensor. Defender for Identity uses data from across your environment, including domain controllers, Active Directory Federation Services (AD FS), and Active Directory Certificate services (AD CS), to provide you with a complete view of your identity environment.

full list of alert here

setup

from dcaddick prereq, plan, sizing tool, service account, download and install sensor, last config.

for adfs

validate

select Settings > Identities > check if all DC have MDI sensors. validate sensor instlal common error: Directory Services Object Auditing is not configured as required: https://aka.ms/mdi/objectauditing

work with

how to investigate the alert and remediate aside from that also available reports

improve

hardened MDI, and better your posture

MDE

what

end point protection. aside from server

setup

prepare mde
  1. Check license state: check license from azure portal license, or billing > subscription
  2. Cloud Service Provider validation: check which license is provisioned and the state of the license. CSP is MS partner that help you when you buy MS product.
  3. Tenant Configuration: Initiate Microsoft Defender for Endpoint tenant
  4. Data center location: Microsoft Defender for Endpoint stores and process data in the XDR
  5. Network configuration: follow the steps to ensure access to MDE

good resource on MDE settings explanation and advice

role & permission

how to assign role is here and here. least privilege principles when assigning role.

architecture & deployment method

Identify your architecture and choose your deployment method: Identify your architecture and the deployment method that best suits your organization. pdf guide here depends on how you are setup, below is the recommended deployment. in short: use Intune if you are cloud native. use config manager if you are hybrid or on-prem. or use a local script if you do not manage your device.

deploy

onboard device

onboard device by first choosing method, use the ring approach method, based your previous step/ architecture. among others are Intune and config manager

also deployment in linux

validate

check it is working with scenarios and test with demo

work with

device discovery

improve

set up automated investigation and response - AIR set up attack surface reduction rules (ASR rules), and see the report, improve upon it. see MDE device health report and fix unhealthy sensors see MDE device firewall report

MDCA

what

It's a Cloud Access Security Broker (CASB) solution. focuses on SaaS application security and user behaviors.

setup

getting started MDCA

best practice

dcaddick and microsoft

  • Discover and assess cloud apps
  • Apply cloud governance policies
  • Limit exposure of shared data and enforce collaboration policies
  • Discover, classify, label, and protect regulated and sensitive data stored in the cloud
  • Enforce DLP and compliance policies for data stored in the cloud
  • Block and protect download of sensitive data to unmanaged or risky devices
  • Secure collaboration with external users by enforcing real-time session controls
  • Detect cloud threats, compromised accounts, malicious insiders, and ransomware
  • Use the audit trail of activities for forensic investigations
  • Secure IaaS services and custom apps
connect apps

this is basically posture assessment using MDCA for SaaS. see also MDC (more appropriate for azure infra as opposed to SaaS)

workflow: 1. Defender for Cloud Apps scans and saves authentication permissions. 2. Defender for Cloud Apps requests the user list. The first time the request is done, it may take some time until the scan completes. After the user scan is over, Defender for Cloud Apps moves on to activities and files. As soon as the scan starts, some activities will be available in Defender for Cloud Apps. 3. After completion of the user request, Defender for Cloud Apps periodically scans users, groups, activities, and files. All activities will be available after the first full scan.

capabilities (depends on CSP): - Account information - Visibility into users, accounts, profile information, status (suspended, active, disabled) groups, and privileges. - Audit trail - Visibility into user activities, admin activities, sign-in activities. - Account governance - Ability to suspend users, revoke passwords, etc. - App permissions - Visibility into issued tokens and their permissions. - App permission governance - Ability to remove tokens. - Data scan - Scanning of unstructured data using two processes -periodically (every 12 hours) and in real-time scan (triggered each time a change is detected). - Data governance - Ability to quarantine files, including files in trash, and overwrite files.

how to here

set up dlp

read on file policies and purview below

set up cloud discovery

you can set up MDCA to discover apps, guide here

Cloud discovery analyzes your traffic logs against the Microsoft Defender for Cloud Apps catalog of over 31,000 cloud apps.

you can have snapshot (one time upload of your traffic to be analyzed) or continuous report (use log collector, connector or cloud API to continuously upload).

set up policies

policy guide

Policies allow you to define the way you want your users to behave in the cloud. If necessary, you can integrate remediation work flows to achieve complete risk mitigation. The following types of policies can be created:

Policy type icon Policy type Category Use
activity policy icon. Activity policy Threat detection Activity policies allow you to enforce a wide range of automated processes using the app provider's APIs. These policies enable you to monitor specific activities carried out by various users, or follow unexpectedly high rates of a certain type of activity. Learn more
anomaly detection policy icon. Anomaly detection policy Threat detection Anomaly detection policies enable you to look for unusual activities on your cloud. Detection is based on the risk factors you set to alert you when something happens that is different from the baseline of your organization or from the user's regular activity. Learn more
OAuth app policy icon. OAuth app policy Threat detection OAuth app policies enable you to investigate which permissions each OAuth app requested and automatically approve or revoke it. These are built-in policies that come with Defender for Cloud Apps and can't be created. Learn more
Malware detection policy icon. Malware detection policy Threat detection Malware detection policies enable you to identify malicious files in your cloud storage and automatically approve or revoke it. This is a built-in policy that comes with Defender for Cloud Apps and can't be created. Learn more
file policy icon. File policy/ DLP Information protection File policies enable you to scan your cloud apps for specified files or file types (shared, shared with external domains), data (proprietary information, personal data, credit card information, and other types of data) and apply governance actions to the files (governance actions are cloud-app specific). Learn more
access policy icon. Access policy Conditional Access Access policies provide you with real-time monitoring and control over user logins to your cloud apps. Learn more
session policy icon. Session policy Conditional Access Session policies provide you with real-time monitoring and control over user activity in your cloud apps. Learn more
cloud discovery policy icon. App discovery policy Shadow IT App discovery policies enable you to set alerts that notify you when new apps are detected within your organization. Learn more
###### activity policy
how to
  • To ensure that you only include results where the specified filter field has a value, we recommend adding the same field again using the is set test. For example, when filtering by Location does not equal a specified list of countries/regions, also add a filter for Location is set. You can also preview the filter results by selecting Edit and preview results.
  • When a filter is set to does not equal and the attribute does not exist on the event, the event will not be filtered out. For example, filtering on Device Tag does not equal Microsoft Entra hybrid joined doesn't filter out events that do not contain Device tag, even if the device is Microsoft Entra joined.
  • In case of a guest user, there may be cases where the User From Group filter doesn't recognize the account by its domain. To make sure all guest users are included, use the External users as the group, if it meets your needs for the policy.
file policy

how to You are limited to 50 file policies in Defender for Cloud Apps. also read common data protection policy

best practice 1. Avoid resetting the file policy (by using the Reset results and apply actions again checkbox) in production environments unless it's absolutely necessary, as doing so will initiate a full scan of the files covered by the policy, which can have a negative impact on its performance. 2. When applying labels to files in a specific parent folder and its subfolders, use the Apply to -> Selected folders option. Then add each of the parent folders. 3. When applying labels to files in a specific folder only (excluding any subfolders), use the file policy filter Parent Folder with the Equals operator. 4. File policy is faster when narrow filtering criteria are used (as compared to wide criteria). 5. Consolidate several file policies for the same service (such as SharePoint, OneDrive, Box, and so on) to a single policy. 6. When enabling file monitoring (from the Settings page), create at least one file policy. When no file policy exists, or is disabled for seven consecutive days, file monitoring is autodisabled.

integrating with other services
purview

Microsoft Defender for Cloud Apps lets you automatically apply sensitivity labels from Microsoft Purview. These labels are applied to files as a file policy governance action, and depending on the label configuration, can apply encryption for additional protection. You can also investigate files by filtering for the applied sensitivity label within Defender for Cloud Apps. Using labels enables greater visibility and control of your sensitive data in the cloud. how to

prerequisite - a Defender for Cloud Apps license and a license for Microsoft Purview. - To work with Microsoft Purview integration, you must enable the App connector for Microsoft 365.

MDE

summary: function as detect and protect for shadow IT/ unsanction app access through end point telemetry sent by MDE. prerequisite: MDCA and MDE license

how it work: detect - endpoint log sent to MDCA (device/user info, traffic) - check risky device/ user -> pivot using that user/ device or detected app - investigate and govern protect govern via MDE

how to: guide here

MDI

guide and capabilities here

work with

investigate threat investigate dashboard tune sus action risky oauth MDE investigation discover and govern Gen AI app: - The cloud app catalog now contains hundreds of new Generative AI apps that enable security teams to discover and understand the risk associated with each app. - Configure policies to automatically trigger alerts when new Generative AI apps are used within your organization. - For organizations using Defender for Endpoint integration, apps tagged as “unsanctioned” will be instantly blocked on onboarded devices. govern gen AI tutorial: youtube

improve

Investigate Apps discovered by MDE https://learn.microsoft.com/en-us/defender-cloud-apps/mde-investigation

Governance for Connected Apps https://learn.microsoft.com/en-us/defender-cloud-apps/governance-actions 

Governance for discovered Apps https://learn.microsoft.com/en-us/defender-cloud-apps/governance-discovery Now we can take this one step further and we can now determine which of the 26,000 SaaS Apps I want to allow or block - the only real limitation (to a certain extent) is that the user is using corporate credentials from our AAD via an endpoint enabled with MDE

use it with gen AI

office 365 cloud app security vs MDCA

Office 365 Cloud App Security is a subset of Microsoft Defender for Cloud Apps that provides enhanced visibility and control for Office 365. source

Capability Feature Microsoft Defender for Cloud Apps Office 365 Cloud App Security
Cloud discovery Discovered apps 31,000 + cloud apps 750+ cloud apps with similar functionality to Office 365
Deployment for discovery analysis - Manual upload

- Automated upload - Log collector and API

- Native Defender for Endpoint integration
Manual log upload
Log anonymization for user privacy Yes
Access to full cloud app catalog Yes
Cloud app risk assessment Yes
Cloud usage analytics per app, user, IP address Yes
Ongoing analytics & reporting Yes
Anomaly detection for discovered apps Yes
Information Protection Data Loss Prevention (DLP) support Cross-SaaS DLP and data sharing control Uses existing Office DLP (available in Office E3 and above)
App permissions and ability to revoke access Yes Yes
Policy setting and enforcement Yes
Integration with Microsoft Purview Yes
Integration with third-party DLP solutions Yes
Threat Detection Anomaly detection and behavioral analytics For Cross-SaaS apps including Office 365 For Office 365 apps
Manual and automatic alert remediation Yes Yes
SIEM connector Yes. Alerts and activity logs for cross-SaaS apps. For Office 365 alerts only
Integration to Microsoft Intelligent Security Graph Yes Yes
Activity policies Yes Yes
Conditional access app control Real-time session monitoring and control Any cloud and on-premises app For Office 365 apps
Cloud Platform Security Security configurations For Azure, AWS, and GCP For Azure
### MDO

Defender for Office

MIP

microsoft information protection

guides here

graph query, grap api, azure graph

so many graph

Azure Resource Graph: Azure Resource Graph - This is used for querying resources that exist in Microsoft Azure, and their basic properties GraphQL - GraphQL is an open source language used in applications for communication between the client and the server Microsoft Graph Security API - This is just one of the underlying APIs that targets a particular service via the Microsoft Graph,

Microsoft Cybersecurity Reference Architecture

these are from MCRA

adopting principles
  • End to End Security: Consider the whole problem
  • Ruthlessly Prioritize: Identify top gaps + quick wins
  • Get started: Start somewhere & continuously improve

sentinel data lake

https://learn.microsoft.com/en-us/azure/sentinel/best-practices-data

purview

purview DLP insider risk ediscovery

https://setup.cloud.microsoft/purview

o365 security

https://learn.microsoft.com/en-us/microsoft-365/security/security-posture-solution-overview?view=o365-worldwide

https://www.youtube.com/watch?v=y7m-X8AGBlM

licensing and feature

image

m365map and m365matrix

https://infusedinnovations.com/blog/secure-modern-workplace/complete-office-365-and-microsoft-365-licensing-comparison

logs

expand here

Unified Audit Log (UAL) - The backbone of forensic investigations in Microsoft 365, capturing activity across Exchange, SharePoint, Teams, and more. → Sign-in & Audit Logs - Essential for tracking account takeovers, MFA bypass attempts, and privilege escalation. Defender for Office 365 - Analyzing phishing, email delivery, and malicious attachments. Defender XDR - Mapping user behavior, anomalies, and lateral movement.

aws security

native aws stuff

cloudtrail

guardduty

security hub

tooling for aws security

prowler

steampipe

XSIAM

https://www.youtube.com/watch?v=wqXsCMc5lzQ&list=PLBpoVs10QWXI_gjH5_gNAFDhl_dDwE0oR&index=1

infosec-compendiums marks list GSD -> very good and complete steps jeffreyappel blog ms. entra and ms. purview