Addressing common threats with AAD
Attackers are constantly developing new threats. Microsoft 365 provides organizations with several tools, guidance, and built-in features (such as Secure Score at https://security.microsoft.com/securescore) that can be used to improve security.
In this next section, we will explore some examples of common threats and see which Microsoft 365 capabilities can be used to protect against them:
- Compromised accounts
- Compromised devices
- Phishing attempts
First, let's look at compromised user accounts.
Compromised accounts
Credential compromise is one of the most common threats an organization can face. This can happen through any number of mechanisms, such as brute-force password cracking attempts, malware, or social engineering. This can lead to several security issues in the organization, such as the loss of intellectual property or the exposure of customer data.
Microsoft 365 has several features that can be used...