Microsoft Defender
is a source of recommendations, alerts, and diagnostics.
Speaking at a recent Cybersecurity Summit, Microsoft CEO Satya Nadella explained that: “we've spent years building our zero trust approach internally at Microsoft… We are committed to sharing what we have learned to help every organization accelerate their progress”.
Microsoft Sentinel and Microsoft Defender for Cloud, and more recently Microsoft Copilot for Security, are tools the technology company has released to help companies “accelerate their progress” towards world-class security.
All three can be used in the development of an extremely successful Zero Trust security strategy, and so it can be unclear which you should use, or how. Let’s learn more about these two solutions, and how they work together to support Zero Trust.
Before comparing Microsoft solutions, it’s first helpful to understand their purpose. Essentially, both technologies can be used to support a Zero Trust security model.
Zero Trust means exactly what the name implies. It’s a security model where people (or devices) who enter your company’s IT network must continually prove that they are who they say they are. Just because they’ve correctly logged in once, they are not implicitly trusted.
To understand Zero Trust, it’s helpful to compare it with the traditional security model:
Someone enters your systems with a username and the correct password. You implicitly trust that this person is a ‘good actor’ because they’ve got the correct login credentials. Once they’re inside, they can do whatever they want on your network.
If a hacker has entered your systems, there are almost no checks to prevent them doing any more damage.
Someone enters your systems with the correct credentials. However, they are only given access to files or systems that they have been given permission to view. If they want to explore more of your network, they need to prove who they are again. They must regularly confirm their identity – often using very advanced authentication methods (such as with biometrics).
If a hacker has entered your system, their progress will continually be slowed or stopped.
Today, people often work outside the company network, using different devices and on networks with an unknown security level. Therefore, a more rigorous approach to security is required.
At the same time, attacks are increasingly heterogeneous, spanning different parts of the enterprise and various resource types. For example, they might start from an IoT device, proceed to an endpoint, spread to a cloud service or a database, and involve multiple user accounts or tenants, etc.
If your organizations primarily uses Microsoft technology, then Microsoft Defender, Microsoft Sentinel, and Microsoft Copilot for Security are three solutions that help support a Zero Trust model across your environment. They have several things in common, but also have a slightly different purpose from one another.
If you have not used Microsoft Sentinel, Copilot, or Microsoft Defender before, you might be unsure about the differences between the two products and how they should be used. Putting it simply:
is a source of recommendations, alerts, and diagnostics.
Helps with threat hunting, automated playbooks, and incident response, as well as assistance with manual incident investigations.
is a tool that supports cybersecurity staff to enact policies and discover issues.
Note that both products are highly complementary and can be easily enabled due to out-of-the-box integration.
Microsoft Sentinel is a cloud-native, Security Information and Event Management (SIEM) and Security Orchestration Automated Response (SOAR) solution.
Microsoft introduced Sentinel as a single solution for intelligent security analytics, event management, threat detection, threat visibility, proactive hunting (hunting query), and threat response. It allows your security team to focus on threat detection and mitigation, rather than running the service. The main advantage of Sentinel is its holistic view across the environment, providing intelligent security analytics. This allows:
Sentinel gives a birds-eye view of the events happening in the environment: events, active cases with their status, and trends. Using Microsoft threat intelligence and analytics, Sentinel correlates alerts into incidents and identifies attacks based on your data. It then places them on a visual map, so malicious traffic can be analyzed and quickly handled with built-in orchestration and automation of typical tasks.
The intelligent security graph forms the core of Sentinel, gathering relevant information from other Microsoft services (Azure Advanced Threat Protection, Microsoft Defender Advanced Threat Protection, etc.).
Microsoft Sentinel also includes user behavior analytics to help to identify anomalies, compromised identities, and malicious insider actions.
According to Forrester, “Microsoft Sentinel’s AI-driven correlation engine and behavior-based analytics reduced the number of false positives for the SOC team by up to 79%, and it reduced the amount of labor associated with advanced investigations by 80% resulting in an improved MTTR (Mean Time to Repair).”
Microsoft Defender, previously known as Azure Security Centre (ASC), is a unified infrastructure security management system. It provides real-time visibility across the workloads (cloud and on-premises), through monitoring of security configurations and health. It also enables cloud security posture management and cloud workload protection.
Defender provides security policies, continuous assessment, and proactive recommendations for Azure compute, data, identity and access, and networking resources. By collecting events from Azure or Log Analytics agents, Microsoft Defender makes a correlation in a security analytics engine and provides tools to strengthen security posture, protect against threads, harden your network, and secure the services.
The major differentiator for Microsoft Defender is its continuous discovery of new resources that are being deployed across workloads. It also performs an initial assessment if they are configured according to the best security practices. If abnormal behavior is detected, Microsoft Defender flags resources, prioritizes activities, and provides a list of recommendations for the users, driven by Azure Security Benchmark. This is an Azure-specific set of guidelines for security and compliance best practices, based on a common compliance framework. To make it even easier for users to priorities their security items, Microsoft Defender groups recommendations into security controls and assigns a secure score value to each of them.
And where does the all-new Microsoft Copilot for Security fit in?
What if we had the ability to protect at the speed and scale of AI? This is the concept behind Microsoft Copilot for Security. Fully Integrated with Microsoft Sentinel and Microsoft Defender, Copilot for Security enables organizations to:
Copilot natively levels up the capacity of cybersecurity teams to react to threats and accelerate Security Analysts’ tasks. In a recent study, security professionals with Copilot for Security presented 7% more accurate answers and 22% faster responses, which is a significant improvement.
If your organization is looking to implement a Zero Trust security model, then Microsoft Sentinel and Microsoft Defender can contribute towards that ambition. And Copilot for Security can accelerate your adoption and management. By configuring them to your organization's needs and context, all these technologies provide powerful methods for making a secure, Zero Trust model possible.
Looking to implement Zero Trust across your IT network? SoftwareOne can help. Our highly experienced teams can support you to configure Zero Trust solutions like Sentinel, Defender and Copilot - and ensure your systems are secure.
If you want to understand your current security score and how you can move towards a Zero Trust model, request a free one hour envision workshop with SoftwareOne.
If you want to understand your current security score and how you can move towards a Zero Trust model, request a free one hour envision workshop with SoftwareOne.