Orange County NC Website
Statement of Work <br />Orange County NC <br />v20221005 March 8, 2023 p. 11 of 26 <br />• Enabling Safe Links (including Safe Documents), Safe Attachments, anti-phishing, <br />pre-set security, and quarantine policies. <br />• Understanding reporting and threat analytics. <br />• Reviewing automation, investigation, and response. <br />• Using Attack Simulator. <br />• Configuring user-reported message settings. <br />• Understanding incident correlation in the Microsoft 365 Defender portal. <br /> <br />The following is out of scope: <br />• Project management of the customer's remediation activities. <br />• Ongoing management, threat response, and remediation. <br />• Supporting GCC-High or GCC-DoD (Office 365 US Government). <br />• Discussions comparing Defender for Office 365 to other security offerings. <br />• Deploying Defender for Office 365 as a proof of concept. <br />• Advanced delivery and enhanced filtering. <br />• Training or guidance covering advanced hunting. <br />• Integration with Microsoft Power Automate playbooks. <br />• Security information and event management (SIEM) or API integration (including <br />Azure Sentinel). <br /> <br />Microsoft Defender for Endpoint <br />Microsoft Defender for Endpoint is a platform designed to help enterprise networks prevent, <br />detect, investigate, and respond to advanced threats. <br />We provide remote guidance for: <br />• Assessing the OS version and device management (including Microsoft Endpoint <br />Manager, Microsoft Endpoint Configuration Manager, Group Policy Objects <br />(GPOs), and third-party configurations) as well as the status of your Windows <br />Defender AV services or other endpoint security software. <br />• Onboarding Microsoft Defender for Endpoint P1 and P2 customers (including those <br />with Windows 365 Cloud PC). <br />• Providing recommended configuration guidance for Microsoft traffic to travel <br />through proxies and firewalls restricting network traffic for devices that are not able <br />to connect directly to the internet. <br />• Enabling the Microsoft Defender for Endpoint service by explaining how to deploy <br />a Microsoft Defender for Endpoint endpoint detection and response (EDR) agent <br />profile using one of the supported management methods. <br />• Deployment guidance, configuration assistance, and education on: <br />o Threat and vulnerability management. <br />o Attack surface reduction.* <br />o Next-generation protection. <br />o EDR. <br />o Automated investigation and remediation. <br />o Secure score for devices. <br />o Microsoft Defender SmartScreen configuration using Microsoft <br />Endpoint Manager. <br />o Device discovery.** <br />o Providing Windows 365 Cloud PC security baseline guidance <br />specifically for: <br /> Attack surface reduction rules. <br />DocuSign Envelope ID: 4F8CE7A2-004B-4516-AE7C-0C68141E2FF6