Protect and secure your data from cyber attacks
Data Protection
Data Security
Data Insights
The 5 Steps to Cyber Resilience
Cloud & SaaS
Enterprise
Industries
Use new, industry-first enterprise security and threat scanning capabilities to protect SharePoint Online, Exchange, and OneDrive data.
With Exchange Online, OneDrive, and SharePoint Online, Microsoft 365 helps organizations collaborate and communicate. But that also makes it an attractive target for attackers seeking to compromise enterprise data.
Threat scanning plays a key role in cyber resilience. Scanning your secondary data for potential threats can provide an additional line of defense and helps prevent reinfection during recovery.
Cohesity helps thousands of organizations like Nasdaq, Ausenco, and many more to secure and protect their Microsoft 365 deployments—and we’re always innovating to help you stay ahead of bad actors. Today, we're introducing new threat scanning capabilities for Cohesity Data Cloud to detect indicators of compromise (IOCs) in OneDrive, Exchange, and SharePoint Online data.
You can choose from multiple sources of regularly updated detection content in Cohesity Data Cloud. These options include:
Here’s how to use our newest advanced threat detection capabilities for your Microsoft 365 environment.
Now that you know how to use our newest capabilities to secure your Microsoft 355 environment, here are some threat scanning best practices your teams can implement today.
1. Align and schedule scanning with risk and workload type.
Start by classifying your Microsoft 365 workloads by business criticality and risk. For example, a possible classification could be:
Use these classifications to inform how often and deeply you scan. High-risk critical workloads should be scanned after a new backup is captured, or at some other high frequency. Medium and lower-risk workloads can be tuned to your SLA and storage profile. Another benefit of performing scans on secondary data is that users won’t see performance degradation. Their experience working in production environments is unaffected.
2. Integrate secondary threat intelligence into incident response.
Threat intelligence from your data protection platform is a powerful “second opinion” alongside the telemetry from your endpoint, email, and network security tools. Seasoned security teams are increasingly treating findings from secondary data telemetry as crucial inputs into their cyber incident response process. You should consider the following integrations:
Threat intelligence findings from your secondary data are often cleaner and more complete. Why? Because it uses consistent, point-in-time copies of data—not live systems that are constantly changing and cannot be continuously scanned without disrupting users. In incident response scenarios, threat intelligence also helps security teams confirm what happened, narrow the blast radius, and directs them to known-safe recovery points.
3. Feed threat-scanning results into security tools.
Threat scanning on secondary data becomes exponentially more valuable when its output doesn’t live in a silo. Make sure your threat scan results from your data protection platform flow into the tools your security teams already live in. Forward alerts and findings into your SIEM so they can be correlated with endpoint, identity, and network events. For example, malware detection in a backup of an executive mailbox, correlated with anomalous sign-in activity and EDR alerts, paints a far clearer picture than any single signal alone.
Threats targeting Microsoft 365 aren’t slowing down. While Microsoft may provide basic native security capabilities, the shared responsibility model means your data—and your cyber resilience—are ultimately your responsibility. It’s critical that organizations reduce risk and regularly scan secondary data as an additional line of defense that can also prevent reinfection during recovery.
Security and IT teams are asking more nuanced questions: from “can we recover?” to “can we recovery safely?” Consistently detecting and investigating threats across your secondary data estate is a core pillar of cyber resilience. With Cohesity, you're able to move from basic recovery to proven cyber resilience for your Microsoft 365 workloads and beyond.
Want to learn more?
Written By
Isabelle Yang
Product Marketing Manager
Kamal Deka
Senior Product Manager