Microsoft 365 and Azure Security and Compliance Hackathon (MAZSECHCK) – Outline

Detailed Course Outline

Challenge 1

In this challenge, participants will start analyzing the Secure Score tool to identify key security recommended actions that will elevate security posture. They will provide secure access to the tenant enabling Multifactor authentication and review roles and organized them by least privileged principle.

Challenge 2

Building upon the previous challenge, participants will implement advanced security measures, such as activating Microsoft Defender for Cloud and enforcing conditional access policies that regulate user authentication and access based on their risk levels and departmental roles. They will also empower specific users with time-bound and role-specific privileges.

Challenge 3

Participants will create different policies to secure email and collaboration and policy rules to block domains and addresses and URLs. They will create phishing simulation using Microsoft 365 defender attack simulation and will analyze the results.

Challenge 4

In this challenge, participants will manage compliance needs using integrated solutions. They will deploy policies and configurations that support information protection, data loss prevention and insider risk management. 

Challenge 5

In this challenge, participants will enable granular access control and improve security with Azure Role-Based Access Control. They will also ensure consistent management and security across Azure resources using different Azure Policies. 

Challenge 6

Participants will create Azure Firewall to control inbound and outbound network traffic and protect Azure resources from unauthorized access and attacks. They will execute the attack simulation for local host infection and malicious behavior against one of the test devices. They will also implement Azure Sentinel and create an Azure Playbook and analytics rules. 

Challenge 7

During this challenge, participants will be dealing with endpoint protection. They will enroll devices to Intune, create policies, run simulated attack against a deployed device and investigate the attack.