0
(0)

 Important

The improved Microsoft 365 Defender portal is now available. This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 Defender portal. Learn what’s new.

Applies to:

  • Microsoft 365 Defender

Your organization must establish ownership and accountability of the Microsoft 365 Defender licenses, configurations, and administration as initial tasks before any operational roles can be defined. Typically, the ownership of the licenses, subscription costs, and administration of Microsoft 365 and Enterprise Security + Mobility (EMS) services (which may include Microsoft 365 Defender) fall outside the Security Operations Center (SOC) teams. SOC teams should work with those individuals to ensure proper oversight of Microsoft 365 Defender.

Many modern SOCs assign its team members to categories based on their skillsets and functions. For example:

  • A threat intelligence team assigned to tasks related to lifecycle management of threat and analytics functions.
  • A monitoring team comprised of SOC analysts responsible for maintaining logs, alerts, events, and monitoring functions.
  • An engineering & operations team assigned to engineer and optimize security devices.

SOC team roles and responsibilities for Microsoft 365 Defender would naturally integrate into these teams.

The following table breaks out each SOC team’s roles and responsibilities and how their roles integrate with Microsoft 365 Defender.

TABLE 1
SOC team Roles and responsibilities Microsoft 365 Defender tasks
SOC Oversight
  • Performs SOC governance
  • Establishes daily, weekly, monthly processes
  • Provides training and awareness
  • Hires staff, participates in peer groups and meetings
  • Conducts Blue, Red, Purple team exercises
  • Microsoft 365 Defender portal access controls
  • Maintains feature/URL and licensing update wp-signup.php
  • Maintains communication with IT, legal, compliance, and privacy stakeholders
  • Participates in change control meetings for new Microsoft 365 or Microsoft Azure initiatives
Threat Intelligence & Analytics
  • Threat intel feed management
  • Virus and malware attribution
  • Threat modeling & threat event categorizations
  • Insider threat Attribute development
  • Threat Intel Integration with Risk Management program
  • Integrates data insights with data science, BI, and analytics across HR, legal, IT, and security teams
  • Maintains Microsoft Defender for Identity threat modeling
  • Maintains Microsoft Defender for Office 365 threat modeling
  • Maintains Microsoft Defender for Endpoint threat modeling
Monitoring
  • Tier 1, 2, 3 analysts
  • Log source maintenance and engineering
  • Data source ingestion
  • SIEM parsing, alerting, correlation, optimization
  • Event and alert generation
  • Event and alert analysis
  • Event and alert reporting
  • Ticketing system maintenance
Uses:

  • Security & Compliance Center
  • Microsoft 365 Defender portal
Engineering & SecOps
  • Vulnerability management for apps, systems, and endpoints
  • XDR/SOAR automation
  • Compliance testing
  • Phishing and DLP engineering
  • Engineering
  • Coordinates change control
  • Coordinates runbook updates
  • Penetration testing
  • Microsoft Defender for Cloud Apps
  • Defender for Endpoint
  • Defender for Identity
Computer Security Incident Response Team (CSIRT)
  • Investigates and responds to cyber incidents
  • Performs forensics
  • May often be isolated from SOC
Collaborate and maintain Microsoft 365 Defender incident response playbooks

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 8 times, 1 visits today)