Brief introduction to ATP

Posted by

I’m sure that most of the people have been listening the word ATP, but what it is? In this blog post, I will try to introduce it…

But first things first, what is ATP? is a new cloud-based solution from Microsoft to provide advanced threat detection. So being said that, let’s begin with the explanation:

Working in IT, we know that attacks are becoming more and more complicated, therefore to achieve good security, three things security professionals need to do:

  • Understand how advance attacks work on-premises and on the cloud (tools, techniques…)
  • Once the attack happened successfully, how the attacker start moving inside the network, and whether the attack propagates from on-premises to cloud resources (what is known as Lateral Movement)
  • Build a security model or strategy to address those advance attacks.

To protect ourselves from those kind of attacks, Microsoft responded with their new Advance Threat Protection Security Model consisting of Office 365 ATP, Azure ATP and Windows Defender ATP.

  • Office 365 ATP (let’s thinks as a 1st line of protection): Zero-day attack and malware inspection received via email or uploaded to SharePoint online using Safe Attachment and Safe Links features.
  • Windows ATP (2nd line of protection): device level protection on machines to detected advanced persistent malware, and provide post breach investigation and automated responses.
  • Azure ATP (3rd line of protection): Allows IT Admins to monitor attackers who are inside a network (not malware), what they are doing/what they did and actions to take.

The problem (for most companies) is that all those features are licensed under E5 suite (or M365) and they work together to protect your enterprise. These products provide defense in depth mechanism as per the following:

  • Since most malware attacks come from email, then Office 365 ATP can be considered the first line of support.
  • If Office 365 ATP fails to identify the malware, then the device endpoint Windows Defender ATP will try to catch the malware by identifying unusual right elevation or strange behavior on the machine.
  • If identity theft was successful, then you can monitor how the attacker is using that identity to move from machine to another, through Azure ATP. That is, after successful credential theft, what activities the attacker is performing using that stolen identity

That’s all, till next post!

One comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s