This blog post is an introduction of a series of blogs to cover the game changing risk-based approach Microsoft Defender ATP offers to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.

As mentioned in “The evolution of Microsoft Threat Protection” by Debraj Ghosh, PM of Microsoft Threat Protection, security comes
in general with two responsibilities: 1) Security Operations (SecOps) and 2) Security Administrations (SecAdmins).

SecOps act by incident response via a centralized alert view and powerful hunting capabilities enabling ad-hoc investigations.

SecAdmins will gain the visibility, control, and guidance necessary to understand and act on the threats currently impacting their organization, as well as information on past and future threats.

In this series of blogs I will focus exclusively on the responsibility of a SecAdmin and all aspects that Microsoft Defender ATP has to offer in regards. Therefore we kick off this serie starting with Configuration Management and Threat & Vulnerability Management.

 

Configuration Management

Configuration Management is another new kid of Microsoft Defender ATP. It helps you to ensure that every endpoint in your environment is managed. Configuration Management provides both security administrators and security operations teams with unique value, including:

  • Onboarding of Intune-managed Windows 10 devices to Microsoft Defender ATP.
  • Deployment of Microsoft Defender ATP Security baseline(s) to Intune-managed Windows 10 devices.
  • Management of machine attack surface rules for predictive analysis and tuning of attack surfaces to Intune-managed Windows 10 devices.

Threat & Vulnerability Management

Threat & Vulnerability Management is a new Microsoft Defender ATP component that helps effectively identify, assess, and remediate endpoint weaknesses. Threat & Vulnerability Management provides both security administrators and security operations teams with unique value, including:

  • Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities
  • Invaluable machine vulnerability context during incident investigations
  • Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager

The outline...

As mentioned I’ll elaborate in a number of blog post all the aspects starting from on-boarding your endpoints to what it takes to get in control and more important to stay in control.

  1. Fix the basics: Make sure rogue endpoints have no right to exist.
  2. Get secure, stay secure: Security baselines are your best friend.
  3. Threat resilience are the new norm: Reduce your vulnerable footprint before even threats being able to harm you.
  4. Improve your endpoint security posture: Raise the bar, measure up to the ‘golden’ standards.
  5. Automation as recipe for success: Automated remediation as the engine to get in control and stay in control.

What can you expect? I’ll explain which on-boarding options exists and how to on-board your endpoints following common-practices. We’ll consider the power of security baselines and how to implement them via Microsoft Intune (integration). Via Threat & Vulnerability Management you’ll discover vulnerabilities of your endpoints and how to mitigate them…preferably automated again, with the integration of Microsoft Intune or System Center Configuration Manager (SCCM).

By raising the security bar we’ll determine our starting point using Secure Score. These valuable insights will help us to make the right decisions and make the difference, based on priorities and impact. At last there are so many moving parts to keep up with (mis)configurations, (software) vulnerabilities & weaknesses. Therefore automation is indispensable to both security administrators and security operations teams.

Looking forward assuming you’re compro…eh assume you stay tuned! 😉

Previous articleAnco Stuij – Ring video doorbell meets Azure serverless
Next articleDigitale transformatie met Office 365
avatar
Ronny works as principal consultant for InSpark, the #1 Dutch Microsoft Partner specialized in Datacenter & Apps, Modern Workplace, Data/AI, Security & Managed Services. As principal consultant Ronny is member of the Technology Board, which is responsible for technology innovation, strategy & vision of InSpark. Ronny’s primary focus is on Microsoft 365 (Identity-, Modern Workplace-, Security & Threat protection. He‘s responsible for a great team of highly skilled consultant’s helping customers to accelerate by innovation. In his role as Microsoft Valuable Professional (MVP) he’s working closely with various Microsoft product groups to provide (customer) feedback, product improvements & most important, his contribution to the community by sharing knowledge & experience. His presence at various international (community) events like Tech Summit, Expertslive Europe, TechDays & various user group meetings are dedicated by meeting people & again sharing knowledge.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.