Prevent targeted attacks at the point of entry! Cloud-based e-mail security that evolves by the second
Managed Security Service for Office 365 Advanced Threat Protection
Office 365 Advanced Threat Protection (Office 365 ATP) is a security product that can provide wide and deep protection against a wide range of targeted attack e-mails. JBS operates this product on your behalf and supports enhanced security and reduced damage for your assets.
Service Overview
Office 365 Advanced Threat Protection is a sophisticated e-mail filtering service that protects Exchange Online using cloud-based threat information that is updated in real time. JBS security experts conduct monitoring and analysis to support on-target and sustained safe cloud usage.
Microsoft 365 E5
Windows 10 Enterprise | Enterprise Mobility + Security | Office 365 Enterprise |
---|---|---|
Microsoft Defender Advanced Threat Protection(EDR) End point detection and handling |
Azure Active Directory Identity Protection ID protection / privilege management |
Office 365 Advanced Threat Protection Plan 2 Email filtering and link protection |
Microsoft Cloud App Security Visualization and control of cloud application and services |
||
Azure Advanced Threat Protection Detection of ID attacks on Azure |
- Azure Active Directory Identity Protection is a function included in Azure Active Directory Premium P2.
What is Office 365 Advanced Threat Protection (Office 365 ATP)?
Office 365 ATP is a cloud-based e-mail filtering service. By providing robust zero-day protection based on a database that gathers threat information from around the world and continues to evolve, the service can protect an organization from unknown malware and viruses. It makes it possible to quarantine files and hyperlinks attached to e-mails that are sent or received as well as detect spoof e-mails, among other things.
Service Merits
In order to monitor and control e-mails, it is not only necessary to have expert skills. Regular analysis and coordination are also necessary. Therefore, in order to maximize use in the long term, it is essential to conduct system maintenance and operation. JBS provides one-stop services from consultation for implementing Office 365 ATP to post-implementation operation and management.
Detection and Handling
JBS analysts monitor suspicious e-mails and protect the organization from various threats such as domain or user impersonation, e-mails with fraudulent files or URLs, attack e-mails from within the organization due to account breaches, etc.
Investigation and Analysis
We compile a report from multifaceted logs and report them on a monthly basis. The report provides the information that you want including threat trends for the month and general comments on the environment in an easy to read manner.
Recurrence Prevention and Response
JBS conducts sustained monitoring necessary for e-mail security and regularly reviews policies in order to prevent the recurrence of attacks. Additionally, we implement effective measures against the latest attacks and attacks that stand out within the organization.
Service Menu
In addition to the basic standard service, we have also prepared optional services such as investigating the occurrence background and impact range of incidents and permanent response support.
Standard
Security monitoring
- Event monitoring
Incident countermeasure support
- Incident countermeasure support (automatic control and escalation by policy)
Reporting (basic)
- Monthly reports (List of SaaS applications, operation logs, incident handling results, alert detection results, general comments)
- Office 365 ATP detection log (suspicious e-mails received, fraudulent attachments, etc.)
Policy setting changes (once a month)
- Activate / disable functions, change thresholds
Options
Reporting (advanced)
- Monthly report (detailed)
- On-site debriefing session
Policy setting changes (as needed) *Ticket system
- In addition to activating / disabling functions, and changing thresholds
- Set protected users
- Ad trusted senders and domains
- Immediate policy changes by request such as setting blocked URLs, etc., during business hours on weekdays.
Service Flow
The service starts about ten business days from application.