Skip to content

Latest commit

 

History

History
79 lines (58 loc) · 5.74 KB

ransomware-protection-microsoft-365-devices.md

File metadata and controls

79 lines (58 loc) · 5.74 KB
title author f1.keywords ms.author manager ms.date audience ms.topic ms.service ms.localizationpriority ms.collection ms.custom keywords description
Step 4. Protect devices
dansimp
NOCSH
dansimp
dansimp
08/20/2021
ITPro
article
o365-solutions
high
highpri
M365-security-compliance
Strat_O365_Enterprise
ransomware
m365solution-ransomware
seo-marvel-jun2020
ransomware, human-operated ransomware, human operated ransomware, HumOR, extortion attack, ransomware attack, encryption, cryptovirology, zero trust
Use Windows Intune as an MDA and MAM provider and Windows 10 security features to protect your Microsoft 365 resources from ransomware attacks.

Step 4. Protect devices

To help protect devices (endpoints) against the initial access part of a ransomware attack:

Windows 11 or 10 devices

To help protect against the lateral movement part of an attack from a Windows 11 or 10 device:

To reduce the impact of the attack:

To help protect against an attacker evading your security defenses:

To help protect against an attacker executing code as part of an attack:

Impact on users and change management

As you implement these protections, perform change management for the following:

Resulting configuration

Here's the ransomware protection for your tenant for steps 1-4.

Ransomware protection for your Microsoft 365 tenant after Step 4

Next step

Step 5 for ransomware protection with Microsoft 365

Continue with Step 5 to protect information in your Microsoft 365 tenant.