460 likes | 478 Views
Learn about the comprehensive set of security features in Office 365 for SharePoint admins. Discover how to protect information, manage identities and access, stop threats, and ensure compliance.
E N D
Office 365 Security Features For SharePoint Admins Dean Gross
Diamond Platinum Gold Silver
Agenda • Protect Information (Data/Files) • Identity and Access Management (User Accounts) • Stop Threats • Ensure Compliance (Regulatory support)
Comprehensive set of capabilities CONDITIONAL ACCESS AZURE INFORMATION PROTECTION MICROSOFT CLOUD APP SECURITY OFFICE APPS OFFICE 365 DATA LOSS PREVENTION SHAREPOINT & GROUPS MICROSOFT INFORMATION PROTECTION OFFICE 365 MESSAGE ENCRYPTION AZURE SECURITY CENTER INFORMATION PROTECTION Discover | Classify | Protect | Monitor WINDOWS INFORMATION PROTECTION SDK FOR PARTNER ECOSYSTEM & ISVs OFFICE 365 ADVANCED DATA GOVERNANCE ADOBE PDFs
Protect Information Inside and Outside of SharePoint
Recommendations • Use Azure AD device-based conditional access to block or limit access on unmanaged devices like airport or hotel kiosks • Create policies to sign users out of Office 365 web sessions after a period of inactivity • Evaluate the need for IP-based sessions • Simulate the access model of an on-premises deployment • Empower workers to share broadly but safely • Require sign-in or use links that expire or grant limited privileges • Prevent accidental exposure of sensitive content • Create DLP policies to identify documents and prevent them from being shared
SharePoint Device Access Policies • Block or limit access to SharePoint and OneDrive content from unmanaged devices (those not hybrid AD joined or compliant in Intune). • All users in the organization or only some users or security groups. • All sites in the organization or only some site collections. • Use SPO Admin Center w/Azure AD Portal • PowerShell • Set-SPOTenant –ConditionalAccessPolicyAllowLimitedAccess • AllowDownlownloadingNonWebViewableFiles is Discontinued (DO NOT USE)
Demo • Block access using the new SharePoint admin center • Limit access using the new SharePoint admin center • Limit access using PowerShell • Block or limit access to a specific SharePoint site collection or OneDrive
Control Access – Network Location • Define Trusted Network Boundaries • One or more authorized IP ranges • Need to consider • External Sharing – users will be blocked • Access from 1st and 3rd party apps • SPO only recognizes Yammer, Teams and Exchange • Access from dynamic IP ranges • Not supported • Use SPO Admin Center or PowerShell • To AVOID Lockout - Include your own IP Address • Set-SPOTenant -IPAddressAllowList "131.102.0.0/16"
Azure AD B2B – Managing Guests • Provides more control of invitation process • With Azure AD B2B, users are added immediately on invitation so that they show up everywhere • OneDrive/SharePoint Online adds users to the directory after users have redeemed their invitations • Ability to customize invitations • Can provide access to other apps • Can enforce privacy terms & conditions and Terms of Use • In SPO Admin Center, use “Allow sharing only with the external users that already exist in your organization's directory”
Azure Information Protection (AIP) • Labels can be applied in many clients • Office Desktop add-in, Windows Explorer, Adobe Acrobat • Not yet available in Office Web apps • Scanner finds sensitive information in SP Server
Demo SPO with sensitive labels
Preview EOY Classifying SharePoint sites and Groups
Preview EOY Classifying SharePoint sites and Groups
Demo SPO with retention labels
Configure the AIP scanner Discovery mode! Constantly monitoring!
Information Protection Recommendations • Create multi-disciplinary team • Map sharing, retention and classification policies to M365 technologies • DLP/AIP - Unified Labels • Create custom Sensitive Information Types • Cloud App Security – SharePoint and thousands of others • Policies and Alerts
Identity & Access Management User Accounts are Valuable
Identity and Access Management Recommendations • Enable Azure Active Directory Identity Protection. • For federated identity environments, enforce account security (password length, age, complexity, etc.). • Enable and enforce MFA for all users. • Implement a set of conditional access and related policies.
Stop Threats They come from everywhere
Alerts Policies • Malware campaign detected in SharePoint and OneDrive • Unusual external user file activity • Unusual volume of external file sharing • Unusual volume of file deletion
Office 365 Advanced Threat Protection (1 of many ATPs) • Safe Attachment Policies
Cloud App Security • Policies
Ransomware Protection • OneDrive for Business- Files Restoration • Coming to SharePoint
SPO Conditional Access • Evaluate users • Location • Machine – phone, tablet or computer • Identity
Threat Protection Recommendations Connect Office 365 to Microsoft Cloud App Security • start monitoring using the default threat detection policies for anomalous behaviors Implement protection for admin accounts:• Use dedicated admin accounts for admin activity• Enforce multi-factor authentication (MFA) for admin accounts• Use a highly secure Windows 10 device for admin activity Implement enhanced protections for admin accounts:• Configure Privileged Access Workstations (PAWs) for admin activity• Configure Azure AD Privileged Identity Management.• Configure a security information and event management (SIEM) tool to collect logging data from Office 365, Cloud App Security, and other services, including AD FS.
Ensure Compliance Regulations are Complicated
Compliance Features • Customer Lockbox – E5 or Advance Compliance • No more than 4 hours of access • SharePoint, OneDrive, Exchange • Audit Log Reports • Finding Personal Data (GDPR Requirement) • Retention Labels and Policies • Manual or automatic • Default label for a document library, folder or document set • Consistent across application workloads • Use same Sensitive Information Types as DLP • Deleted files in OneDrive moved to hidden libraries • Replace Records Center, Information Policies, in-place records management
Compliance Manager • Assessments • ISO, NIST & GDPR • Progress indicators • Compliance score – preventive, detective, or corrective measures • Customer Managed Controls – recommended actions • Reporting
E-Discovery Cases • Place holds on ODfB and SPO Sites (and mailboxes) • Can take up to 24 hours • Infinite or date range for time period • Can use keywords or document properties, such as file names