1-3d
Electronic
delivery
0%
Taxes
0%
Discount

General info

Microsoft 365 Security Beyond Service.

Useful links

Related files

Related products

Long description Microsoft 365 Security Beyond Service.
Active 1

We will perform all the necessary configurations of your tenant to set up basic secured environment.

Our objective is to provide a plan and design a way to enable core Microsoft 365 security features. The project will be considered successful when all user data is fully migrated from Gmail and Google Drive to the Microsoft 365 tenant.

We take time to understand your business needs and assess the best tools and solutions. Our company provides service to small and large organizations and across many industries, helping them create, implement, and manage their cybersecurity tools and processes.

Depending on your organization's size, business model, and regulatory environment, your endpoint solution must be tailored to your company.

Our team of experts is standing by to provide expertise and unbiased guidance on the best way to implement endpoint detection and response in your security architecture.

IT Partner responsibilities #

  1. Gather information about your current tenant and security configurations
  2. Perform core configuration of your Microsoft 365 tenant: a. Basic admin protections b. Logging and analytics configuration c. Basic identity protection setup
  3. Checking security score and configuring it up to 75%
  4. Enforcing Threat Protection, e.g. connecting M365 to MS Defender for Cloud Apps
  5. Configuring Azure Active Directory Identity Protection
  6. Configuring Teams with three tiers of protection (including sharing, classification, data loss prevention, and Azure Information Protection)
  7. Microsoft Sentinel Initial configuration (e.g. basic M365 connectors)
  8. At least monthly check ups of dashboards and reports in the Microsoft 365 Defender portal, Defender for Cloud Apps.
  9. Look for and implement software updates.
  10. Look for sharing risk by reviewing the built-in reports in Defender for Cloud Apps (on the Investigate tab).
  11. Configure Privileged Access Workstations (PAWs) for admin activity.
  12. Configure Azure AD Privileged Identity Management.
  13. Configure a security information and event management (SIEM) tool to collect logging data from Office 365, Defender for Cloud Apps, and other services, including AD FS. The audit log stores data for only 90 days. Capturing this data in SIEM tool allows you to store data for a longer period.
  14. Enable and enforce MFA for all users.
  15. Implement a set of conditional access and related policies.
  16. Conduct attack simulations for spear-phishing, password-spray, and brute-force password attacks using Attack simulation training (included with Office 365 Threat Intelligence.
  17. Look for sharing risk by reviewing the built-in reports in Defender for Cloud Apps (on the Investigate tab).
  18. Continue to regularly review dashboards and reports in the Microsoft 365 Defender portal, Defender for Cloud Apps, and SIEM tools.
  19. Continue to look for and implement software updates.
  20. Integrate eDiscovery into your legal and threat response processes.
  21. Implement Secure Privileged Access (SPA) for identity components on premises (AD, AD FS).
  22. Use Defender for Cloud Apps to monitor for insider threats.
  23. Discover shadow IT SaaS usage by using Defender for Cloud Apps.
  24. Refine policies and operational processes.

Use Azure AD Identity Protection to identify insider threats.

Client responsibilities #

  1. Coordinate Client resources and staff schedules
  2. Provide a dedicated point of contact responsible for working with IT Partner
  3. Coordinate any outside vendor resources and schedules
  4. Perform changes to internal and external DNS, as required
  5. Configure all network equipment, such as load balancers, routers, firewalls, and switches
  6. Review and approve engagement deliverables in a timely manner
  7. Assist with identification of high-risk users (admins, top executives and VIP users)
  8. End user support

Additional cost items not provided by the project #

  1. Additional licenses that may be required
  2. Customer team training (could be added as an additional service)
  3. Corporate documents migration to SharePoint Online (could be added as an additional service)
  4. Desktop software settings
  5. Information Security Advisory services (could be added as an additional service)

Upon completion of the project, we will provide a project closeout report. This document will indicate the final project status, including acceptance criteria matching, outstanding issues (if any), and the final budget. If you require more extensive documentation, it can be provided for an additional fee. 

This service offers a simple, secure, and cost-effective way to enable a secured environment.

Prerequisites #

  1. You must have a Microsoft 365 tenant

Plan #

The plan may vary depending on your needs.

  1. Kickoff meeting
  2. Security scope check and current configuration assessment
  3. User creation or AD connect tool configuration
  4. Security configuration start
  5. Security settings verification
  6. Security score verification
  7. Final email
  8. Verification and fixing of issues, if any

Success Criteria #

  1. Security score 75%. User can access Security Portal and confirm this.
  2. Validated Threat protection settings
  3. Validated Identity and access management settings
  4. Exchange Online Protection is configured and working
  5. Teams protection is configured

SKU ITPWW050SECOT

Manufacturer IT Partner
Product
Licensing SRV
Vertical
Duration 30 days
Add to card
- +
$ 6,000.00 per project
To top