Microsoft Boosts Office 365 Security With Threat Detection, Visibility Tools

Microsoft is boosting the security of enterprise deployments of Office 365 with Advanced Security Management, a suite of tools that offers admins threat detection, policy making tools and insights into how the software is being used.

This, Microsoft says, will help protect corporate environments – particularly against Shadow IT – and help IT departments maximise their resources by seeing what how Office 365 is being used and which applications are interacting with it.

Advanced Security Management allows admins to set up anomaly detection policies that scan user activities and issue alerts if a potential breach of network is spotted. There are more than 70 different indicators, including failed logins and inactive accounts, and behavioural analytics to spot any unusual patterns.

Office 365 security

Admins can also track specific activities and set default actions for certain events, such as multiple failed logins, risky IP address. Offending accounts can be prevented from doing anything further or even suspended in extreme situations.

A new dashboard gives greater visibility into behaviour and can track about 1,000 applications. For example, it is possible to see how much data is being sent to cloud repositories such as OneDrive, Box or Dropbox.

The features are include in some Office 365 enterprise plans but in others cost $3 per user per month.

“The threat detection and activity policy creation features are rolling out to Office 365 E5 customers worldwide starting today,” said Microsoft. “The ability to view an application’s permissions into Office 365 and the application discovery dashboard will be available by the end of the third quarter of 2016.”

Microsoft Office 2016

Image 1 of 26

Microsoft Office 2016
Microsoft Word - Across Devices

Security drive

Recent research from Skyhigh networks found three quarters of enterprise users have a compromised account each month and more than 200 files called ‘password’. The average company sees 5.6 million ‘events’ each month, such as file uploads, logins and edits, of which 256 are described as ‘anomalous’.

These might be logins from two separate locations or unusual volumes of download traffic. Just 2.7 are genuine threats.

Earlier this year, Microsoft patched a vulnerability that could have allowed an attacker to gain access to any account at a business with a federated domain. The group of companies that use federated domains includes some of the biggest names in technology, such as IBM, Cisco, BT, Vodafone and Microsoft itself, and high profile firms like British Airways, PwC and KPMG.

Think you know all about Microsoft Office? Try our quiz!

Loading ...
Steve McCaskill

Steve McCaskill is editor of TechWeekEurope and ChannelBiz. He joined as a reporter in 2011 and covers all areas of IT, with a particular interest in telecommunications, mobile and networking, along with sports technology.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

3 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago