📄️ Provision Security Copilot Units (SCUs)
Implementation Effort: Medium — Provisioning SCUs requires IT and Security Operations teams to configure and manage capacity through Azure or the Security Copilot portal.
📄️ Manage and Monitor Usage of Security Compute Units (SCUs)
Implementation Effort: Medium — Administrators only need to perform targeted actions in the Security Copilot or Azure portal to view usage or adjust capacity.
📄️ Manage Plugins in Microsoft Security Copilot
Implementation Effort: Medium — Admins must configure, approve, and govern plugin access, which requires a defined project effort.
📄️ Threat Hunting Agent (Microsoft Defender)
Implementation Effort: Medium – This requires IT and Security Operations teams to configure access and incorporate the Threat Hunting Agent into existing Defender XDR hunting workflows, which is a project rather than a long‑term operational program.
📄️ Defender Threat Intelligence Agent
Implementation Effort: Medium — IT and Security Operations teams must enable and integrate Microsoft Defender for Endpoint and Defender External Attack Surface Management so the agent has the required telemetry to operate effectively.
📄️ View Incident Summaries and Use Guided Response to Remediate
Implementation Effort: Low — Security administrators only need to perform targeted actions in Microsoft Defender XDR to view AI‑generated summaries and guided remediation steps.
📄️ Analyze Potentially Malicious Files, Scripts, and Code with Microsoft Security Copilot
Implementation Effort: Low — Security teams only need to enable and use built‑in Security Copilot capabilities, requiring targeted actions rather than ongoing programs.
📄️ Review and Understand Details About Identities and Devices Using Microsoft Security Copilot
Implementation Effort: Low — Only targeted actions by administrators are required; there is no large deployment project.
📄️ Enable Microsoft Defender for Cloud Apps
Implementation Effort: Low
📄️ Identity and Device Pillars of the Zero Trust Workshop
Identity Pillar
📄️ Discover Cloud Apps
Implementation Effort: Medium – Requires integration with network infrastructure (e.g., firewalls, proxies, Defender for Endpoint) and setup of log collection or API automation.
📄️ Enable App Governance
Implementation Effort: Low
📄️ Create File Policies with Microsoft Defender for Cloud Apps
Implementation Effort: Medium
📄️ Connect Apps to Microsoft Defender for Cloud Apps
Implementation Effort: High
📄️ Regulate apps with priority account consent
Implementation Effort Customer IT and Security Operations teams need to drive projects to set up and customize app governance policies based on organizational needs.
📄️ View the Cloud Discovery dashboard to see what apps are being used in your organization
Implementation Effort Customer IT and Security Operations teams need to drive projects to set up and configure the Cloud Discovery dashboard and manage ongoing monitoring and filtering of apps.
📄️ Create access policies - Microsoft Defender for Cloud Apps
Implementation Effort Creating access policies involves configuring multiple prerequisites, including licenses, onboarding apps, and setting up Conditional Access policies, which require ongoing management and monitoring.
📄️ Govern discovered apps - Microsoft Defender for Cloud Apps
Implementation Effort Customer IT and Security Operations teams need to drive projects to review, sanction, and unsanction apps, and potentially integrate with existing security appliances.
📄️ Get insights on and regulate access to sensitive content with app governance - Microsoft Defender for Cloud Apps
Implementation Effort This effort score was chosen because customer IT and Security Operations teams need to drive projects to customize policies and monitor app activities.
📄️ Block download of sensitive information with conditional access app control
Implementation Effort Customer IT and Security Operations teams need to implement programs that require ongoing time or resource commitment. This involves setting up and managing policies in Microsoft Defender for Cloud Apps and ensuring continuous monitoring and adjustments.
📄️ Conditional Access app control - Microsoft Defender for Cloud Apps
Implementation Effort Configuring Conditional Access app control requires setting up access and session policies, which involves project-level work by IT teams.
📄️ Create Defender for Cloud Apps anomaly detection policies
Implementation Effort Customer IT and Security Operations teams need to drive projects to configure and manage the anomaly detection policies effectively.
📄️ Microsoft Defender for Cloud Apps - EntraID Identity Protection integration and reporting
Implementation Effort Implementing visibility and control over cloud apps requires ongoing monitoring, configuration, and management by IT and Security Operations teams.
📄️ Require step-up authentication (authentication context) upon risky action
Implementation Effort This effort score is chosen because it involves creating and managing Conditional Access policies and session policies, which require ongoing time and resource commitment from IT and Security Operations teams.
📄️ App Discovery Policy in Microsoft Defender for Cloud Apps
Implementation Effort: Medium
📄️ Create policies to control OAuth apps - Microsoft Defender for Cloud Apps
Implementation Effort Creating an OAuth app policy involves configuring settings and permissions within the Microsoft Defender Portal, which requires project-level effort from IT teams.
📄️ Create session policies - Microsoft Defender for Cloud Apps
Implementation Effort Creating session policies requires configuring multiple settings and ensuring prerequisites are met, which involves project-level effort.
📄️ Integrate Microsoft Defender for Endpoint - Microsoft Defender for Cloud Apps
Implementation Effort Customer IT and Security Operations teams need to drive projects to integrate and configure the systems.
📄️ Deploy the Defender for Cloud Apps Log Collector on Your Firewalls and Other Proxies
Implementation Effort: Medium – This deployment requires IT teams to configure network devices (firewalls, proxies) and set up a log collector server, which involves coordination and testing.
📄️ SaaS Security Initiative - Microsoft Defender for Cloud Apps
Implementation Effort Customer IT and Security Operations teams need to drive projects to connect applications to Microsoft Defender for Cloud Apps and manage security recommendations.
📄️ Create a Custom Activity Policy to Get Alerts About Suspicious Usage Patterns
Implementation Effort: Low
📄️ Review Microsoft Defender for Cloud Apps Incidents for Suspicious Activity
Implementation Effort: Low — This is a targeted administrative task focused on reviewing and investigating alerts in the Defender for Cloud Apps portal, with no broader program or deployment required.
📄️ Review Conditional Access App Control Alerts Along With the Activity Log (Daily)
Implementation Effort: Low — This is a targeted daily task for administrators to review alerts and activity logs, requiring no major deployment effort.
📄️ Review the App Governance Overview Page and Create or Adjust App Governance Policies (Daily)
Implementation Effort: Low — This is a targeted daily action where administrators review insights and adjust app governance policies as needed.
📄️ Review Cloud App Policies and Make Any Necessary Updates (Monthly)
Implementation Effort: Low — This is a recurring administrative task where IT/SecOps reviews existing cloud app policies and adjusts them as needed.
📄️ Prepare to deploy Microsoft Defender for Endpoint
Implementation Effort: Medium – This deployment requires IT and Security Operations teams to coordinate licensing, tenant setup, network configuration, and onboarding tools, but it does not require ongoing programmatic changes.
📄️ Assign Roles and Permissions for Microsoft Defender for Endpoint
Implementation Effort: Low – This requires IT and Security Operations teams to plan and configure role-based access control (RBAC) or Unified RBAC (URBAC), including defining roles, mapping them to Microsoft Entra groups, and managing access reviews.
📄️ Identify your architecture and select a deployment method for Defender for Endpoint
Implementation Effort: Medium
📄️ Onboard Devices to Microsoft Defender for Endpoint
Implementation Effort: Medium – This task requires IT teams to plan and execute onboarding across multiple device types and platforms using tools like Microsoft Intune, Group Policy, or local scripts.
📄️ Set up Device Discovery in Microsoft Defender for Endpoint
Implementation Effort: Low – Setup involves enabling a feature and selecting discovery mode in the Microsoft Defender portal, with minimal ongoing maintenance.
📄️ Set Microsoft Defender Antivirus to Active Mode
Implementation Effort: Medium – This requires IT or Security Operations teams to configure Group Policy, Microsoft Intune, or other management tools to enforce Defender Antivirus as the primary AV solution.
📄️ Configure Behavioral, Heuristic, and Real-Time Protection
Implementation Effort: Medium
📄️ Enable EDR in Block Mode
Implementation Effort: Medium – While the feature is enabled through a simple configuration, it often requires coordination with security teams to validate compatibility with existing antivirus solutions and ensure proper monitoring is in place.
📄️ Enable Cloud Protection
Implementation Effort: Low – This is a straightforward configuration that can be deployed quickly using Group Policy, Intune, or other endpoint management tools.
📄️ Turn on Tamper Protection
Implementation Effort: Low- Turning on tamper protection is a targeted action that can be done via the Microsoft Defender portal, Intune, or directly on individual devices
📄️ Prevent users from seeing or interacting with the Microsoft Defender Antivirus user interface
Implementation Effort This feature can be enabled through targeted configuration changes using Group Policy or Intune, without requiring a broader program or ongoing resource commitment.
📄️ Prevent users from locally modifying Microsoft Defender Antivirus policy settings
Implementation Effort: Low
📄️ Enable Attack Surface Reduction Rules
Implementation Effort: High
📄️ Enable Application Control
Implementation Effort Requires ongoing management and monitoring by IT and Security Operations teams to ensure policies are correctly enforced and updated.
📄️ Device control in Microsoft Defender for Endpoint
Implementation Effort Customer IT and Security Operations teams need to drive projects to configure and manage device control policies using tools like Intune.
📄️ Turn on network protection
Implementation Effort Enabling network protection requires configuring endpoint security policies and potentially updating the Microsoft Defender anti-malware platform, which involves ongoing management and resource commitment.
📄️ Enable Web Protection in Microsoft Defender for Endpoint
Implementation Effort Customer IT and Security Operations teams need to drive projects to configure and maintain web protection settings.
📄️ Enable exploit protection
Implementation Effort Implementing exploit protection requires setting up monitoring for application crashes and hangs, enabling full user mode dump collection, and ensuring compatibility with existing applications. This involves ongoing resource commitment and careful deployment practices to avoid productivity outages
📄️ Review and Classify Your Critical Device Assets with Microsoft Security Exposure Management
Implementation Effort: Medium. Customer IT and Security Operations teams need to drive projects to classify and manage critical device assets.
📄️ Review & Action Auto Investigation & Remediation Recommendations (Defender for Endpoint)
Implementation Effort: Medium – IT and SecOps teams must configure automation levels and establish workflows to review and approve remediation actions based on automated investigations.
📄️ Enable controlled folder access
Implementation Effort Customer IT and Security Operations teams need to drive projects to configure and deploy controlled folder access using various methods.
📄️ Investigate Incident Details & Remediate as Necessary (Daily)
Implementation Effort: Medium — Security operations teams must perform daily review and triage of incidents, which requires ongoing analyst time but no major implementation projects.
📄️ Prioritize vulnerability remediation with attack paths
Implementation Effort Customer IT and Security Operations teams need to drive projects to integrate and analyze data sources for attack path visualization.
📄️ Prioritize Actions to Improve Your Endpoint Security Posture Based on Risk and Impact
Implementation Effort: Medium — Security and IT teams must drive ongoing review and improvement projects using prioritized recommendations from Defender for Endpoint and Microsoft Security Exposure Management, but these do not require broad operational restructuring.
📄️ Review the Device Health Report to Ensure All Devices Are Fully Protected; Update Devices That Are Out of Compliance (Daily)
Implementation Effort: Low — This is a targeted daily action where IT/SecOps reviews existing reports without needing long-term programs.
📄️ Review Threat Analytics Daily
Implementation Effort: Low — This is a targeted daily action performed by security teams using built‑in dashboards and requires no long-term implementation effort.
📄️ Lay the Groundwork for Microsoft Defender for Identity
Implementation Effort: Medium — While the deployment requires planning and coordination across teams, it follows a well-documented process and can be phased in gradually.
📄️ Install Microsoft Defender for Identity (MDI) Sensors on All Domain Controllers
Implementation Effort: High
📄️ Configure sensors for AD FS, AD CS, and Microsoft Entra Connect
Implementation Effort Installing and configuring sensors across multiple services (AD FS, AD CS, Microsoft Entra Connect) requires significant planning, coordination, and ongoing management by IT and Security Operations teams.
📄️ Security Assessment: Ensure privileged accounts are not delegated
Implementation Effort Customer IT and Security Operations teams need to drive projects to review and configure privileged accounts.