Most organizations that migrate to Office 365 have done so in a hybrid environment—on-premises AD and Azure AD. Perhaps the most challenging aspect is managing and securing the entire surface area. Many organizations begin the process by creating systems that allow them to:
Are you familiar with the four pillars of securing a cloud or hybrid AD environment? Download the Quest e-book Surviving Common Office 365 Security Pitfalls for your free IT survival guide.
The final pillar to securing a cloud or hybrid AD environment is investigating security incidents and quickly recovering as quickly as possible to minimize the damage.
Once a security irregularity occurs, the first step is to investigate the access lifecycle of users and groups. This requires 360-degree forensics and full-text search to correlate events, access activities and security configurations across multiple indexed repositories to reveal the most-likely paths to the incident. This includes:
The next step is taking the necessary steps to recover from unauthorized changes to on-premises AD, Azure AD and Office 365. Every contingency plan must cover the basics, with as much automation as is practical:
By employing the appropriate investigation and recovery strategies—along with assessment, detection/reporting and remediation/mitigation best practices—you’ll be in position to secure your cloud or hybrid AD environment and keep it that way moving forward.
To learn more about maintaining security within your cloud or hybrid AD environment, download the complimentary Quest e-book Surviving Common Office 365 Security Pitfalls.