Download the Datasheet: Microsoft 365 Threat Protection Workshop

OVERVIEW

In the Daymark Microsoft 365 Threat Protection Workshop, Daymark will assess the organization’s current security posture, identify key threats and vulnerabilities, and demonstrate how Microsoft 365 Threat Protection solutions can enhance security across identities, endpoints, email, and cloud applications.

HIGHLIGHTS

  • Identify key security objectives and challenges
  • Perform a guided discovery of threats and vulnerabilities.
  • Demonstrate Microsoft Threat Protection capabilities using the customer’s existing or trial licenses.
  • Provide recommendations and a strategic roadmap for improving threat protection and response.

AGENDA

The Microsoft 365 Threat Protection Workshop is delivered over 3 days. The agenda includes:

Day 1: Discovery & Foundations

  • Identification of security priorities and goals
  • Review of Microsoft licensing and deployed solutions
  • Environment discovery and security assessment
  • Overview of Microsoft Threat Protection
  • Demonstration of Microsoft Defender Portal (XDR)

Day 2: Training & Demonstrations

Cloud Identity Protection

  • Overview of Entra ID Protection and Conditional Access
  • Explore identity risk levels and real-world attack techniques (token replay, MFA fatigue)
  • Demonstrate policy creation, risky detection logs, and remediation

Microsoft Defender for Office 365

  • Review types of threats stopped by Defender for O365
  • Review anti-phishing, anti-malware, Safe Links, and Safe Attachments features
  • Explore Threat Explorer and Attack Simulation Training

Microsoft Defender for Office 365

  • Explore risk-based vulnerability management and secure score integration
  • Explore attack surface reduction rules
  • Review incident correlation and device timeline for investigation

Microsoft Defender for Cloud Apps

  • Review incident correlation and device timeline for investigation
  • Review app governance and data loss prevention (DLP) policies
  • Monitor user behavior for anomalies and risky actions across cloud services

Microsoft Security Copilot Demonstration

  • Demonstrate natural language queries for incident analysis
  • Show example threat summaries and contextual data generation
  • Explore how Copilot can assist analysts with playbook automation and recommendations

Day 3: Training & Demonstrations

  • Threat discovery and gap review
  • Remediation and improvement roadmap
  • Executive summary and deliverables review
  • Feedback and next steps

Get Started Here