https://store-images.s-microsoft.com/image/apps.16303.cbeaf0e2-934f-43a8-a8a6-8ba0908aaf18.7b223716-b54a-402c-aaad-b2e9405d0fa7.a5d1c91c-d2de-4351-bede-210ed809f102

Threat Protection Envisioning Workshop

TECH HEADS INC

Learn how to put next-generation Microsoft Security tools to work for you.

Engagement Overview

Here’s what you can expect from this engagement:

  • Discover threats: Help the customer gain visibility into threats to their Microsoft 365 and Azure clouds and on-premises environment across email, identity, endpoints, servers and data in order to better understand, prioritize and mitigate potential cyberattack vectors.
  • Understand how to mitigate threats: Help the customer understand how the included Microsoft Security products can help them mitigate and protect against the threats found during the period of this engagement.
  • Discover and understand how to address vulnerabilities: Help the customer understand how to discover, prioritize and address vulnerabilities and misconfigurations across their organization.
  • Define next steps: The customer will work together with the delivery resource to define a list of next steps based on their needs, objectives, and results from the Threat Protection Engagement.
  • Security Strategy Documentation: Comprehensive documentation of your security strategy for key stakeholders.

Engagement Approach

The Threat Protection Engagement can be grouped into the following phases that are delivered over a 4-week period:

  • Pre-engagement
    • Pre-engagement Call
    • Prepare, Send and Review the Threat Protection Engagement Questionnaire
  • Data Security Check
    • Kick-off meeting
    • Define Scope
    • Change Management (Optional)
    • General Setup
    • Mandatory and Selectable Modules Configuration
  • Microsoft Purview Portfolio Overview
    • Results Presentation and Next Steps Discussion
  • Engagement Decommissioning

In-scope activities for the Threat Protection Engagement

The standard scope of this part of the engagement includes:

  • Deployment of Threat Protection Engagement Microsoft 365 trial licenses in the customer tenant.
  • Configuration of following mandatory modules and each of the included products:
    • Exchange Online
    • SharePoint Online
    • Teams
    • Insider Risk Management
  • Selection and configuration of at least one of following selectable modules:
    • Compliance Manager
      • On-permises data stores
      • Windows 10/11 Endpoints
      • Communication Compliance
      • Data Security for Generative AI
    • Remediation of potential technical issues during the deployment.
    • Threat exploration to discover threats actively attacking the customer.
    • Vulnerabilities exploration to discover and prioritize vulnerabilities and misconfigurations.
    • Mapping threats discovered to a recommended method of mitigation.
    • Demonstration of how the relevant Microsoft security products work, going through key scenarios that will help land product value and key differentiators.
    • Decommissioning of configuration and licenses at the end of engagement.
  • At a glance

    https://store-images.s-microsoft.com/image/apps.8108.cbeaf0e2-934f-43a8-a8a6-8ba0908aaf18.7b223716-b54a-402c-aaad-b2e9405d0fa7.9a4c9b44-6fe7-464d-a72c-e0758f21a68a
    https://store-images.s-microsoft.com/image/apps.9628.cbeaf0e2-934f-43a8-a8a6-8ba0908aaf18.7b223716-b54a-402c-aaad-b2e9405d0fa7.cd7146d6-1fd7-4763-b408-f8bfef94b90f
    https://store-images.s-microsoft.com/image/apps.12569.cbeaf0e2-934f-43a8-a8a6-8ba0908aaf18.7b223716-b54a-402c-aaad-b2e9405d0fa7.7967ac5a-662f-4425-a890-8e7647f01bed