fix: Correct M365 E3 licensing capabilities across playbooks

E3 includes Entra ID P1 (conditional access, SSPR) and Defender for
Endpoint P1 (AV, device control, ASR audit mode), not just 'Free'/'AV only'.

Key corrections:
- m365-e3-hardening.md: Entra ID P1 with conditional access is now
  correctly listed as included; Intune is full not 'basic'; ASR audit
  mode is available in P1; risk-based gap reframed as 'No Entra ID P2'
- zero-budget-hardening.md: E3 comparison table now shows Entra ID P1
  and Defender for Endpoint P1 correctly; pitch text updated
- modular-engagements.md: MFA description now reflects conditional
  access availability in E3
- m365-antifragile-project.md: Conditional Access heading now correctly
  notes E3 includes P1; E3 baseline mentions conditional access
- endpoint-management-entry-vector.md: Intune described as full MDM/MAM
This commit is contained in:
2026-05-09 16:58:36 +02:00
parent 763da003d3
commit 3569cd7c45
5 changed files with 36 additions and 34 deletions

View File

@@ -13,10 +13,10 @@ E3 provides the foundation. The gaps are real but manageable. This document show
| Capability | E3 Inclusion | Notes |
|-----------|-------------|-------|
| Exchange Online Protection (EOP) | Yes | Anti-malware, anti-spam, basic anti-phishing |
| Azure AD Free / Entra ID Free | Yes | Basic identity, no conditional access, no PIM |
| Microsoft Defender Antivirus | Yes | Client-side AV, no EDR, no ASR |
| Entra ID P1 | Yes | Conditional access, per-user MFA, SSPR; no PIM, no risk-based policies |
| Microsoft Defender for Endpoint P1 | Yes | Next-gen AV, device control, ASR audit mode; no EDR, no automated investigation |
| Office 365 Audit Logging | Yes | Must be manually enabled |
| Basic Mobile Device Management (MDM) | Yes | Via Microsoft Intune limited enrollment |
| Microsoft Intune | Yes | Full MDM/MAM, device compliance, configuration policies |
| Self-Service Password Reset (SSPR) | Yes | Requires Azure AD Basic configuration |
| Teams, SharePoint, OneDrive | Yes | Data governance limited without Purview |
@@ -25,7 +25,7 @@ E3 provides the foundation. The gaps are real but manageable. This document show
| Capability | Missing in E3 | Business Impact |
|-----------|---------------|-----------------|
| Microsoft Defender for Endpoint P2 | No | No EDR, no ASR rules, no threat analytics, no automated investigation |
| Entra ID P2 / P1 Conditional Access | No | No risk-based policies, no device compliance gating, no location-based rules |
| Entra ID P2 (Identity Protection) | No | No PIM, no risk-based conditional access, no identity protection, no automated remediation |
| Entra ID PIM | No | No just-in-time admin elevation |
| Microsoft Defender for Office 365 P2 | No | No Safe Links, no Safe Attachments, no advanced anti-phishing |
| Microsoft Purview | No | No DLP, no sensitivity labels, no insider risk management |
@@ -49,14 +49,14 @@ We operate in three layers:
**Enable MFA for All Users**
E3 includes MFA via Azure AD Free/Entra ID Free, but it is **per-user MFA** (less flexible than conditional access). This is still mandatory.
E3 includes **Entra ID P1**, which supports both **per-user MFA** and **conditional access-based MFA**. Conditional access is the preferred approach because it provides more granular control.
- Navigate to Microsoft Entra admin center → Users → Per-user MFA
- Enable MFA for all administrative accounts first
- Roll out to all users within 14 days
- Enroll at least one backup method per user (authenticator app + phone)
**Document the Gap**: Per-user MFA cannot enforce risk-based step-up, device compliance, or location-based blocking. Document this as a risk for steering committee.
**Document the Gap**: E3 conditional access cannot enforce risk-based step-up or impossible-travel blocking (these require Entra ID P2). Document risk-based policies as a gap for steering committee.
**Disable Legacy Authentication**
@@ -149,9 +149,9 @@ Get-Mailbox -ResultSize Unlimited | Set-Mailbox -AuditEnabled $true
## Phase 2: Augment E3 (Week 3-4)
### Close the EDR Gap (No Defender for Endpoint P2)
### Close the EDR Gap (Defender for Endpoint P1, Not P2)
E3 includes Microsoft Defender Antivirus but **not** EDR. You need visibility.
E3 includes **Microsoft Defender for Endpoint P1** (next-gen AV, device control, ASR rules in audit mode, network protection in audit mode). It does **not** include full EDR, automated investigation, or threat analytics. You need visibility beyond what P1 provides.
| Option | Cost | Effort | When to Use |
|--------|------|--------|-------------|
@@ -167,24 +167,25 @@ E3 includes Microsoft Defender Antivirus but **not** EDR. You need visibility.
3. Upgrade **only privileged users** to Microsoft Defender for Endpoint P2 via add-on or E5 Security
4. This gives you EDR coverage where it matters most at ~10% of full E5 cost
### Close the Conditional Access Gap (No Entra ID P1/P2)
### Close the Risk-Based Identity Gap (No Entra ID P2)
Without conditional access, you cannot enforce:
- Device compliance gating
- Location-based blocking
- Risk-based step-up
- Block legacy auth per-protocol
E3 includes **Entra ID P1**, which provides robust conditional access: device compliance gating, location-based blocking, and per-protocol legacy auth blocking are all available. What E3 lacks is **risk-based intelligence**:
- Risk-based step-up (e.g., require MFA when sign-in risk is elevated)
- Impossible travel detection and blocking
- Identity protection and automated remediation
- PIM for just-in-time admin elevation
**Mitigations within E3**:
- **Per-user MFA**: Enforce for 100% of users (already covered above)
- **Block legacy auth tenant-wide**: Already covered above
- **Intune MDM enrollment**: E3 includes basic Intune; enroll all corporate devices
- **Third-party MFA with policy engine**: Duo, Okta (additional cost, but cheaper than full E5)
- **Conditional access policies**: Enforce MFA for all users, block legacy auth, require compliant devices for sensitive apps, and restrict by location—all with Entra ID P1
- **Intune MDM enrollment**: E3 includes full Intune; enroll all corporate devices to make them conditional access signals
- **Per-user MFA**: As a fallback if conditional access deployment is phased
- **Manual risk review**: Export sign-in logs weekly; flag anomalous locations, failed MFA attempts, and unknown devices
**The Strategic Conversation**:
> *"E3 gives us strong authentication but weak authorization. We can enforce MFA, but we cannot say 'only from a managed device in the Czech Republic.' If that is a requirement for your risk profile, the minimum viable upgrade is Entra ID P1 for conditional access, not a full E5 jump."*
> *"E3 gives us strong authentication and solid authorization. We can enforce MFA, block legacy auth, and require managed devices. What we cannot do is automatically step up authentication when a sign-in looks risky, or block access from impossible travel. If that is a requirement for your risk profile, the minimum viable upgrade is Entra ID P2 for identity protection, not a full E5 jump."*
### Close the Email Security Gap (No Defender for Office 365 P2)
@@ -282,7 +283,7 @@ There will come a point where E3 augmentation is no longer cost-effective. Frame
| E5 Capability | What It Solves | When to Recommend |
|--------------|----------------|-------------------|
| Defender for Endpoint P2 | EDR, ASR, threat analytics | Client has had malware incident or is in regulated industry |
| Entra ID P2 | Conditional access, PIM, identity protection | Client has admin compromise or needs device/location gating |
| Entra ID P2 | Risk-based conditional access, PIM, identity protection | Client has admin compromise or needs risk-based/impossible-travel blocking |
| Defender for Office 365 P2 | Safe Links, Safe Attachments, automated investigation | Client has had phishing-driven incident |
| Purview | DLP, sensitivity labels, insider risk | Client handles customer PII, financial data, or trade secrets |
| Sentinel | SIEM, SOAR, threat hunting | Client has dedicated SOC or regulatory SIEM requirements |