Frequently Asked Questions
Microsoft Enterprise Security
Technology and advisory
-
It provides organizations with a risk- and fact-based view of the challenges and opportunities associated with cybersecurity. In addition to addressing rapidly changing cybersecurity threats and risks, it also demonstrates to the relevant authorities that the organization is actively working to improve its security posture.
-
We will assess your security posture through interviews with the right stakeholders, supported by a non-intrusive security assessment tool that is based on two cybersecurity frameworks – CIS Controls and Quickscan.
The security assessment tool will collect all scanned data onto an assessment tool server, which is normally provided by the customer, ensuring no data is sent anywhere else.
After the assessment, we will perform an analysis on the assessment tool server itself, take a few screenshots, and then prepare the report. The server will then be decommissioned and the collected data destroyed.
-
The Microsoft 365 and Azure security assessment is a structured engagement to help customers understand their current security posture, identify gaps, and prioritize a roadmap for security controls that will reduce the risk of being breached.
Our security consultants will work closely with you to understand your security objectives. After interviews and detailed analysis, we will provide recommendations to balance security and productivity needs. We can then work with you to plan, prioritize, and implement the strategy and roadmap to close any Microsoft 365 and Azure security gaps.
-
During the assessment, our security consultants will work with you to complete an assessment questionnaire to better understand your security posture as it relates to people, processes, and technology.
We will use a native security analytics tool to quickly assess your current security settings and behaviors based on features that have been enabled within your Microsoft 365 and Azure environment.
Your questionnaire responses and the results of the security analytics tool will provide the basis for our consultants to develop an appropriate strategy and roadmap.
-
The Microsoft 365 security centre is a specialised workplace designed to meet the needs of security teams. It lets you monitor and manage security across your organisation’s Microsoft identities, data, devices, applications, and infrastructure. It is completely integrated with Microsoft 365 services to provide actionable intelligence, helping you mitigate risk and improve your overall security posture.
-
There are a few steps you can take to secure your Microsoft 365 applications:
- Enable multi-factor authentication (MFA) – one of the easiest and most effective ways to improve the security of your organisation
- Be selective of who you grant administrative privileges to
- Introduce and enforce a data loss prevention (DLP) policy for your organisation
-
Yes, you may choose to deploy any security feature we offer.
-
Yes, we may perform an assessment even for trial tenants.
-
You may opt for a 12-month contract or a monthly contract.
-
There are no penalties for early terminations. However, we will require 30-day advance notice if you’re on a monthly contract. If you’re on a 12-month contract, you will not receive a refund for the remaining period on your contract.
-
Please get in touch with your Maxis account manager to know more.
Threat Protection
-
Yes. Since computer accounts (as well as any other entities) can be used to perform malicious activities, Microsoft Defender for Identity monitors computer account behavior and all other entities in the environment.
-
By default, Microsoft Defender is enabled at the tenant level for all users within the tenant.
-
Microsoft Defender for Endpoint supports a wide range of Windows, macOS, and Linux operating systems.
-
The following Microsoft Volume Licensing products support Defender ATP:
- Windows 10 Enterprise E5
- Windows 10 Education A5
- Microsoft 365 E5 (M365 E5) (this includes Windows 10 Enterprise E5)
- Microsoft 365 E5 Security
- Microsoft 365 A5 (M365 A5)
-
Defender for Endpoint relies on the Microsoft Defender AV to provide metadata to the sensor and service. Defender will enter ‘passive mode’ when another AV tool is present, allowing these functions to operate normally. If your organization has fully disabled Defender via GPO or another method, you will need to re-enable Defender on machines scheduled for Defender for Endpoint enrollment.
-
Microsoft Defender ATP directly integrates with various Microsoft solutions, including:
- Intune
- Office 365 Defender
- Defender for Azure
- Azure Security Center
- Microsoft Cloud App Security
- Azure Sentinel
-
Yes, you may choose to deploy any security feature we offer.
-
You may opt for a 12-month contract or a monthly contract.
-
There are no penalties for early terminations. However, we will require 30-day advance notice if you’re on a monthly contract. If you’re on a 12-month contract, you will not receive a refund for the remaining period on your contract.
-
Please get in touch with your Maxis account manager to know more.
Need to get in touch with us?
Contact Maxis Business Customer Service