IDR solutions focus on monitoring and securing identities within an organization's network, particularly user identities associated with access to systems, applications, and sensitive data.

Training

M365 Security Boost

In this lecture-style class developed and presented by Marcus Pettersson (Senior Consultant), together with Daniel Chronlund (Senior Consultant), you will learn how to protect and defend identities, devices, and data using the latest features in Microsoft 365. By understanding how the different products work and integrate with each other, you will see several new opportunities you may already have access to in your M365 subscriptions.

The training is divided into four sessions, each covering different aspects of M365. The Sessions are held online at 3 pm to 5 pm CET. All sessions are presented in Swedish and recorded. For late registrations, the recorded sessions will be sent out immediately.

First session will focus on Entra ID, where we will talk about the importance of Zero trust and why you need to change many of the default settings in Entra ID to secure your identities.

Second session will cover how to protect your infrastructure using Microsoft Defender XDR. We will cover the different defender services to ensure that we can protect our endpoints and identities from threats and how we can use the capabilities of MD XDR to investigate suspicious activity in the environment.

Third session, we will look at the compliance features within Microsoft 365. Many organizations store sensitive information in Office 365, which makes it important to ensure that the information does not end up in the wrong place. We will use Microsoft Purview services to classify and protect sensitive information.

Fourth session will focus on endpoints and how we can ensure that our devices can be secure and managed in the new hybrid work era. We will look at how Intune can help us secure both desktop and mobile operating systems.

After these sessions, you will have a unique and deep understanding of the threat-protection and compliance stack in Microsoft 365, how you can leverage it in your own environment, and prepare for when the worst happens.

Course description:

Session 1 – Securing Entra ID

Entra ID is the identity platform used by all Microsoft 365 services. In this module you will learn why it’s so important to have good security controls in place and how to configure Entra ID to ensure your users and sign-ins are protected.

  1. Why the default settings in Entra ID needs to be changed.
  2. Start your Zero Trust journey with Conditional Access.
  3. Secure your MFA registrations.
  4. Understand the possibilities (and dangers) with Enterprise Applications.
  5. Protect your sign-ins with Identity Protection.
  6. Protect your administrative roles with Privileged Identity Management.
  7. Understand why logging is so important and how Entra ID logs will help your investigations.

Session 2 – Understanding Microsoft Defender XDR

Microsoft 365 contains a lot of powerful security features. Microsoft Defender XDR is a collection of multiple security services aimed at different parts of your IT infrastructure. In this module, you will learn how the Defender XDR suite help to secure your modern workplace and how to get the most out of the services.

  1. Protect your Endpoints with Defender for Endpoint.
  2. Get insight in your domain controller traffic with Defender for Identity.
  3. Ensure that your organization is protected from e-mail originating threats with Defender for Office365.
  4. Monitor and control your cloud application usage with Defender for Cloud Apps.

Session 3 – Compliance in Microsoft 365

With a lot of potential sensitive information used and stored within Microsoft 365, it’s important as an organization to ensure that this information does not end up in the wrong hands. In this module you will learn how to use the available Purview compliance features to protect your sensitive data.

  1. How Microsoft Purview Information Protection will classify and protect your documents and email messages.
  2. Use Purview Data Loss Protection to prevent information leakage to external parties.
  3. What is in-place and litigation hold and when should you use it.
  4. Understand how eDiscovery will help you to investigate mailbox, Teams, and SharePoint activities in your own environment.

Why it is so important to enable the Unified Audit Log, and how should you use it in case of a breach.

Session 4 – Protect your endpoints with Microsoft Intune

With the new hybrid-work era, it’s important to have good management abilities on your endpoints wherever in the world they are located and weather you are using Windows, Mac, iOS, or Android devices. All of them needs to be managed and monitored so your users can feel safe while performing their day-to-day work. In this module, you will learn how Intune can be used to properly manage and enforce security controls across your device platform.

  1. Configure Windows Autopilot.
  2. Onboard your mobile devices.
  3. What is Apple Business Manager and why is it important?
  4. Enforce security settings to your devices.
  5. Safeguard your corporate data on private and corporate owned mobile devices.
  6. Use your devices to strengthen your Zero Trust configuration.
  7. Ensure that only the devices you approve can be enrolled.

 

Quick facts / FAQ:

  • What language will be used?
    All sessions are held in Swedish.
  • How much does the training cost?
    The price is 7900 SEK.
  • Will you receive a recording after the sessions?
    Yes, a recording of the session will be available for download after the session.
  • We are a couple of colleagues who would like to participate, can we purchase one ticket and join from a conference room?
    Tickets are priced per person, so all participants need to purchase their own. But joining from a conference room with colleagues sounds great!
  • Can you join onsite at Truesec premises?
    No, this is a remote only session.

Sign up here!

Price: 7900 SEK