Microsoft 365 Defender Features
Microsoft Defender for Office 365 (formerly Office 365 Advanced Threat Protection - ATP)
This component focuses on protecting against advanced threats by providing features such as Safe Attachments, Safe Links, and anti-phishing capabilities.
Microsoft Defender for Identity (formerly Azure Advanced Threat Protection - ATP)
This is designed to detect and investigate advanced threats, identity compromises, and insider attacks within an organization's environment.
Microsoft Defender for Endpoint (formerly Microsoft Defender Advanced Threat Protection - ATP)
This endpoint security solution is designed to prevent, detect, investigate, and respond to advanced threats on endpoints, such as computers and servers.
Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security)
This provides visibility into cloud app usage within an organization, enforces data governance policies, and protects against threats across cloud applications, including those in the Office 365 suite.
Microsoft Defender for Identity (formerly Azure Advanced Threat Protection - ATP)
This component focuses on identity security, helping to detect and respond to advanced attacks targeting on-premises identity infrastructure.
Scenario: Protection Against Phishing and Advanced Threats
Microsoft 365 Defender
Threat Detection: An organization receives an email that appears to be from a trusted source but contains malicious links or attachments.
Safe Attachments: Microsoft Defender for Office 365 scans email attachments in real-time using machine learning to identify and block any potentially malicious content.
Safe Links: URLs within emails are checked in real-time, and if any are identified as malicious, users are prevented from accessing the harmful content.
Microsoft Defender for Cloud Apps
Cloud App Visibility: The organization uses various cloud applications, including Office 365. Defender for Cloud Apps provides visibility into user activity across these apps.
Data Governance Policies: Policies are configured to monitor and control the sharing of sensitive information within cloud applications, ensuring compliance with data protection regulations.
Microsoft Defender for Endpoint
Endpoint Protection: A user inadvertently clicks on a malicious link within an email and unknowingly downloads malware onto their computer.
Endpoint Detection and Response (EDR): Defender for Endpoint detects the unusual behavior of the downloaded malware, immediately isolates the affected device, and initiates an investigation to understand the scope of the threat.
Microsoft Defender for Identity
Identity Compromise Detection: The investigation reveals that the initial compromise occurred due to a compromised user account.
Behavioral Analytics: Defender for Identity uses behavioral analytics to identify unusual patterns of activity, such as unauthorized access or privilege escalation.