Insider Risk in Conditional Access | Microsoft Entra + Microsoft Purview Adaptive Protection

In the rapidly evolving digital era, organizations face an uphill battle in securing sensitive data – as evidenced by our recent Microsoft “Rethinking Security from the Inside Out” report where 87% of organizations stated that they experienced data breaches in the past year. A substantial 63% of these incidents stem from inadvertent or malicious insiders with access to sensitive information.

Organizations struggle to keep up with the dynamic nature of risks due to their reliance on fragmented tools and one-size-fits-all security policies, causing friction for users who need to use and access data for legitimate purposes. We continue to hear from customers that they need a user and data-centric approach that enables them to dial up and dial down data security controls based on evolving insider risk levels.

Enter Adaptive Protection, a powerful capability in Microsoft Purview designed to improve overall data security. Adaptive Protection helps you protect your organization’s data by integrating dynamic insider risk levels, determined by data related activities, with various policy engines to automatically moving users in and out of policies as their risk levels change over time.

In February 2023, we announced, enabling users to be automatically included in the scope of data loss policies based on insider risk levels. For example, a DLP policy integrated with insider risk levels will prevent high-risk users from printing sensitive data, while allowing low-risk users to do so. This balances security and productivity and avoids blanketed policies that can be both very noisy and difficult to manage, while also hindering the end user experience.

Today, we are excited to announce Adaptive Protection is now also integrated with Conditional Access. You can now create Conditional Access polices to automatically add users to policies in response to insider risks levels.

Adaptive Protection integrated with Conditional Access

One of the challenges organizations face when trying to implement data security measures is the reliance on fragmented and siloed solutions. These solutions can make it difficult to roll out new data security controls consistently and can create gaps in protection that can be exploited by insiders. With the integration of Adaptive Protection and Conditional Access, Microsoft provides a seamless and easy solution for organizations to automatically move users in and out of policies based on their risk levels. This eliminates the need for organizations to manage multiple, siloed solutions and provides a more streamlined and effective approach to data security.

One of the key components of this integrated solution is Conditional Access, which plays a crucial role in enhancing an organization’s security by enforcing access to applications, data, and infrastructure, thereby minimizing the risk of external threats. It evaluates signals like user identity, location, device, user-risk, and sign-in risk to determine access to resources. And depending on the identity’s risk level, a range of controls is applied, be it implementing Multi-Factor Authentication (MFA), necessitating a password change, or outright blocking access to the application.

Now consider a scenario where a once-trusted employee on your sales team becomes a high-risk user, having submitted their resignation and starting to engage in data exfiltration activities. The Adaptive Protection and DLP integration allows you to prevent unauthorized use of data, but preventing access in the first place to critical applications like Salesforce adds another layer of defense.

With Adaptive Protection integrated with Conditional Access, you can now also configure a policy to automatically add the high-risk employee to the policy and block access to stealing data from your Salesforce application. Admins simply need to toggle the insider risk configuration switch to Yes and activate policy controls, such as mandating a terms of use agreement or outright blocking access. In the scenario above, you could seamlessly prevent a high-risk salesperson from accessing Salesforce – an application housing their beloved client list, while enabling a low-risk salesperson to access the application.

thumbnail image 1 captioned Figure 1: New ‘insider risk’ condition in Conditional AccessFigure 1: New ‘insider risk’ condition in Conditional Access

The synergy between compromised user risk and insider risk provides your organization with a more comprehensive solution to safeguarding your data against both external threats and internal risks. This comprehensive and multi-layered approach protects your organization against unauthorized access, data leaks, and data theft – ultimately strengthening your overall data security. With a united front against both external and insider risks, your data remains safe, reinforcing your organization’s resilience in the face of evolving cyber threats.

Read our ”Rethinking Security from the Inside Out” Report

We recently surveyed more than 500 data security and identity and access management professionals to gain deep insights into the data security landscape, the challenges organizations face with existing tools, and best practices for protecting against data breaches. Download our report!

Get started

Thank you,
Erin Miyake, Principal Product Manager, Microsoft Purview
Poulomi Bandyopadhyay, Sr. Product Manager, Microsoft Entra

Real-Time Collaboration | Microsoft Loop Updates for Admins

Synchronize collaboration across your favorite app experiences and devices with Microsoft Loop, our Microsoft 365 co-creation app. Use Loop components to work fluidly with others, while staying in your favorite collaboration app for a connected and interactive experience. Content is always live and up-to-date. View and organize all your loop activity, and provide a collaborative shared workspace for everyone to work together across projects using the Loop app. Generative AI with Microsoft 365 Copilot is integrated throughout the experience to help generate content without starting from scratch. Derek Liddell, Principal PM Manager for Microsoft Loop shares the latest user updates, and configuration, data security, and compliance controls for Microsoft 365 admins.

► QUICK LINKS: 00:00 – New co-creation app, Microsoft Loop 01:10

– Loop app experience 02:43

– Sharing experience in Loop 04:13

– Loop-powered collaborative notes in Teams 04:53

– Project management experience 05:52

– Admin experience 07:06

– Controls and policies, and Conditional Access 08:56

– Wrap up ► Link References Try it out at https://loop.microsoft.com Stay up to date on admin capabilities at https://aka.ms/LoopCompliance ► Unfamiliar with Microsoft Mechanics? As Microsoft’s official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube:    / microsoftmechanicsseries   • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t… • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com… ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter:   / msftmechanics   • Share knowledge on LinkedIn:   / microsoft-mechanics   • Enjoy us on Instagram:   / msftmechanics   • Loosen up with us on TikTok:   / msftmechanics  #MicrosoftLoop#Microsoft365#Copilot#GenerativeAI

Microsoft Teams Devices

Microsoft Teams DeviceA Microsoft Teams device is a piece of hardware that has been tested and verified to provide high-quality audio and video experiences with Microsoft Teams1These devices are designed to enhance the Teams experience and can be used for personal or shared use cases2.

There are several types of Microsoft Teams devices:

  1. Headsets: These are engineered to keep you agile and provide superior wireless audio performance. Examples include the Jabra Evolve2 65 mono USB-A Black, Yealink WH6 Premium Series, and EPOS ADAPT 300 Series3.
  2. Speakerphones: These are personal, USB, and Bluetooth smart speakerphones. Examples include Poly Sync 20, Yealink CP700, and Jabra Speak 7503.
  3. Teams Panels: These are touch screen wall mounts designed specifically to run Microsoft Teams. Examples include Crestron 10.1 Inch room scheduling touch screen and Yealink RoomPanel for Teams3.
  4. Desk Phones & Teams Displays: These are native Microsoft Teams Total Touch high-end business phones with a large color touch screen and full UC integration. An example is Audio.

The Yealink MP54, MP56, and MP58 are Microsoft Teams phones powered by Android 1212. They offer an upgraded user experience with faster response times and seamless interactive experiences12.

Android 12’s enhanced security features protect sensitive data from malicious attacks, ensuring a secure and stable operating environment12. These phones are designed to provide a friendly Microsoft Teams experience with a 4-inch capacitive touch screen and dedicated Teams button for intuitive call controls1.

The MP54, MP56, and MP58 also support professional management platforms such as Teams Admin Center (TAC) and Yealink Management Cloud Service (YMCS), allowing for bulk phone upgrades, updates, and real-time alarms for issues like poor call quality or firmware upgrade failure1.

These devices are part of Yealink’s commitment to providing reliable voice device solutions and Teams phone systems2. They are designed to support the workforce, upgrade and update phones in bulk, and provide real-time alarms such as poor call quality or firmware upgrade failure1.

Copilot for Security: Customize your Copilot | Microsoft Secure Tech Accelerator

Explore the latest ways to customize Microsoft Copilot for Security for your team. Now generally available, Copilot for Security is a generative AI-powered assistant for daily security operations, and it is more effective when integrated with your workflows. We start with a deep dive and walk you through creating custom promptbooks, adding your organization’s knowledge bases, and using logic apps to write back updates to your tools. Lastly, get answers to commonly asked questions in the second half of this session. ————————————————————————————————————————————– ❓ See the Q&A at https://aka.ms/Accelerate/CopilotForS… ▶️ Skill up at the Microsoft Secure Tech Accelerator: https://aka.ms/Secure/TechAccelerator 🔖 Bookmark the Security, Compliance, and Identity Blog: https://aka.ms/Blog/SCI 🌐 Join the Security, Compliance, and Identity community: https://aka.ms/Community/SCI

This session is part of the *Microsoft Secure Tech Accelerator*. Get deep dives into the announcements from the Microsoft Secure digital event. You’ll have an opportunity to learn technical information that will help you and your team implement Copilot, learn how to secure your AI, see demonstrations, and get answers to your questions from the product team.

Here’s what’s covered: 0:00 – Intro 2:20 – Recap learnings & news from Secure 5:10 – Create and share custom promptbooks 9:35 – Upload and use knowledge bases 14:10 – Create a custom plugin for Copilot 20:55 – I’ve set up CfS using the Microsoft Copilot for Security portal, but I can’t find any Microsoft copilot for security compute resources in any of my Azure Subscriptions, how do I find it? 22:30 – Do I need any KQL query plugins if I don’t have any queries already stored in my environment? 27:50 – Can I use prompt books to read and interpret security logs? 30:15 – What’s the Hallucination rate for the AI? 34:20 – Microsoft Defender for threat intelligence 36:50 – How does Microsoft envision the evolution of Security Copilot over the next few years, and what are the key areas of focus for expanding its capabilities? 48:20 – The cost model is based on SCU. Is it possible to throw some light on how 1 SCU maps to a real-world use case? 54:05 – How does snow play into the plugin ecosystem? 54:30 – Closing thoughts

Defender Experts in-depth: Running a Modern SOC in the age of LLMs

Large language models (LLMs) and Security Copilot are changing how security operations work gets done. Take a behind-the-scenes tour! See how our Microsoft Defender Experts team runs a modern security operations center (SOC) and leverage LLMs and Copilots to supercharge our operations.

Microsoft Defender XDR, Copilot for Security & Microsoft Sentinel now in one portal

Security, Compliance & IdentityManage SIEM, XDR, and threat intelligence from one place with new updates in the Microsoft Defender portal. Interact with all of your security data using generative AI with Microsoft Copilot for Security. View incidents across your digital estate—whether they’re related to endpoints, SaaS services, your network in the cloud or on prem. This unified approach eliminates the inefficiency of SOC teams having to switch between multiple systems and manually piece together incident details, while maintaining all the current functionalities of each connected service. Rob Lefferts joins Jeremy Chapman to discuss how the Defender experience has evolved into a unified security operations platform that combines threat detection, prevention, investigation, and response. ► QUICK LINKS: 00:00 – How Microsoft Defender has evolved 01:47 – Increase your SOC’s efficiency and speed 02:30 – GPT-based Copilot for Security 03:54 – See an active incident 05:45 – Attack disruption 06:48 – High-level recap with Security Copilot 07:39 – Unified advanced hunting 08:51 – Set it up 09:32 – Wrap up ► Link References For more information, and to join our private preview go to https://aka.ms/SOCPlatform ► Unfamiliar with Microsoft Mechanics? As Microsoft’s official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube:    / microsoftmechanicsseries   • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t… • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com… ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter:   / msftmechanics   • Share knowledge on LinkedIn:   / microsoft-mechanics   • Enjoy us on Instagram:   / msftmechanics   • Loosen up with us on TikTok:   / msftmechanics  #SIEM#XDR#MicrosoftDefender#MicrosoftSentinel