{"id":8234,"date":"2024-08-23T00:57:12","date_gmt":"2024-08-23T00:57:12","guid":{"rendered":"https:\/\/pariswells.com\/blog\/?p=8234"},"modified":"2024-08-23T00:57:14","modified_gmt":"2024-08-23T00:57:14","slug":"microsoft-claim-partner-incentives","status":"publish","type":"post","link":"https:\/\/pariswells.com\/blog\/research\/microsoft-claim-partner-incentives","title":{"rendered":"Microsoft Claim Partner Incentives"},"content":{"rendered":"\n<p><strong>What we require from you is a specific description with a fair amount of details as to what exactly you do in regard to each of these products. Usually 2-3 Sentences per product as sufficient. <\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Hey Customer,<\/p>\n\n\n\n<p>I hope you are well , we are submitting proof to Microsoft about the following work conducted by %MSP NAME % \u00a0in your Environment for our Security Designation per list below\u00a0<\/p>\n\n\n\n<p>Can you\u00a0 reply to this email that  %MSP NAME % has implemented all these for you?<\/p>\n\n\n\n<p><strong>Exchange Online<\/strong><\/p>\n\n\n\n<p>We have used Microsoft Online to host all\u00a0%CUSTOMER% mailboxes into Microsofts cloud as well as Distribution groups. We used Connectors to relay emails in and out of %CUSTOMER% exchange Online Enviroment as well as setup of Security Policies.<\/p>\n\n\n\n<p><strong>Microsoft 365 Apps<\/strong><\/p>\n\n\n\n<p>We helped deploy the roll out of Office 365 Apps via Intune to upgrade existing Users to the latest version of Office.<\/p>\n\n\n\n<p><strong>Teams Phone Enabled Users<\/strong><\/p>\n\n\n\n<p>We have onboarded\u00a0%CUSTOMER% into a Direct Routing Partnership with a VOIP carrier setting up Hunt Groups and Call Policies for Reception Offices.<\/p>\n\n\n\n<p><strong>Azure Active Directory Premium Conditional Accesss<\/strong><\/p>\n\n\n\n<p>We Deployed Conditional Access Policies to Enforce MFA \\ Block Counteries outside of Certain Allow Lists and Also Block Legacy Authenticaiton<\/p>\n\n\n\n<p><strong>Microsoft for Defender for Cloud Apps<\/strong><\/p>\n\n\n\n<p>We have used Microsoft for Defender for Cloud Apps to report shadow IT Applications for\u00a0%CUSTOMER%monthly as well application governance for high risk enterprise applications.<\/p>\n\n\n\n<p><strong>Microsoft Defender Endpoint<\/strong><\/p>\n\n\n\n<p>We onboarded all Workstations and Servers to Microsoft Defender Endpoint and used ASR rules to improves\u00a0%CUSTOMER% Secure Score.<\/p>\n\n\n\n<p><strong>Microsoft Defender For Identity<\/strong><\/p>\n\n\n\n<p>We enrolled both\u00a0%CUSTOMER% domain controllers to Defender For Identity with the Agent and deployed a new GMSA account for deployment. We use this to notify\u00a0%CUSTOMER% of any identity issues in the environment.<\/p>\n\n\n\n<p><strong>Microsoft Defender for Office<\/strong><\/p>\n\n\n\n<p>We have created new default Policies in Defender for Office to block Spam and Malware for&nbsp;PCA&nbsp;as well as protecing Microsoft Teams<\/p>\n\n\n\n<p><strong>Intune<\/strong><\/p>\n\n\n\n<p>We have onboarded all workstations to Microsoft Intunes and created new Applications for Deployment as well as new Secure Score Device Configuration.<\/p>\n\n\n\n<p><strong>Azure Active Directory Premium 2<\/strong><\/p>\n\n\n\n<p>We have used Conditional access policies to block and monitor users with High and Medium Risk Sign in&#8217;s and at Risk Users&nbsp;<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Thanks<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>What we require from you is a specific description with a fair amount of details as to what exactly you do in regard to each of these [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8234","post","type-post","status-publish","format-standard","hentry","category-research"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/8234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/comments?post=8234"}],"version-history":[{"count":1,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/8234\/revisions"}],"predecessor-version":[{"id":8235,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/8234\/revisions\/8235"}],"wp:attachment":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/media?parent=8234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/categories?post=8234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/tags?post=8234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}