6/25/2018 11:13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.

Slides:



Advertisements
Similar presentations
Deployment Planning Services
Advertisements

Make your app a native part of Office with Add-ins
Conduct a successful pilot deployment of Microsoft Intune
Secure Hyperconnectivity with TeamViewer and Windows technologies
Enterprise Security in Practice
5/21/2018 9:40 PM BRK3021 Learn about modern infrastructure roles in RDS: Next generation Windows desktop & app virtualization Clark Nicholson - Principal.
Deployment Planning Services
Manage Windows devices in the complex hybrid cloud world of today
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Azure Cloud Shell Magic of Modern Command-line Management
Developing Hybrid Apps on Microsoft Azure Stack
Windows 10 and the cloud: Why the future needs hybrid solutions
Modernizing your Remote Access
Where is your Windows support career going wrong?
Microsoft Virtual Academy
Optimizing Microsoft OneDrive for the enterprise
The power of common identity across any cloud
Protect sensitive information with Office 365 DLP
Secure Remote Access to on-premises Web Apps using Azure AD
7/29/2018 4:45 PM Manage SharePoint and OneDrive in Office 365: A field guide for administrators Chris Bortlik Modern Workplace Technical Architect Microsoft.
SQL Server on Linux on All-Flash Arrays
Microsoft Ignite /31/ :08 AM
Microsoft 365 Business: Under the Hood
Why WCD is WiCkeD for modern deployment
Workflow Orchestration with Adobe I/O
Windows 10 Subscription Activation
Azure Security in four steps
Automate all things! Microsoft Azure continuous deployment
Microsoft Teams Mobile Collaboration on the go
Agile Planning with Visual Studio Team Services (VSTS)
Microsoft Intune MAM without Device Enrollment
Servicing Windows 10 in the Real World
9/22/2018 3:49 AM BRK2247 Learn from MVPs: Panel discussion on all things SharePoint and OneDrive © Microsoft Corporation. All rights reserved. MICROSOFT.
Application Delivery & MAM Policy
Azure PowerShell Aaron Roney Senior Program Manager Cormac McCarthy
11/17/2018 6:41 PM BRK3392 Windows 10 servicing explained (WAAS) Deploying Windows as an inplace upgrade Adnan Hendricks Microspecialist
Microsoft Ignite /20/2018 2:21 PM
Continuous Delivery with Visual Studio Team Services
Azure Advisor: Optimization in the best way
Access and Information Protection Product Overview October 2013
Bring existing desktop apps to UWP with the Desktop Bridge
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Microsoft Virtual Academy
Microsoft products for non-profits
Five mistakes to avoid when deploying Enterprise Mobility + Security
Five cool things you can do with Windows PowerShell on Office 365
Microsoft To-Do Preview
Securely pass passwords into your deployment
Microsoft Virtual Academy
Microsoft Exchange: Through the eyes of MVPs (Panel discussion)
MDM Migration Analysis Tool (MMAT)
Overview: Dynamics 365 for Project Service Automation
Keep up with Office 365 evolution in the real world
Understand your Azure cloud assets dependencies with BMC Discovery
Surviving identity management in a hybrid world
System Center Marketing
Breaking Down the Value of A Yammer Post: 20 Things to Do
Cool Microsoft Edge Tips and Tricks
One Marketing Template
Getting the most out of Azure resources with Azure Advisor
“Hey Mom, I’ll Fix Your Computer”
Consolidate, manage, backup, and secure your cloud content
Designing Bots that Fit Your Organization
Ask the Experts: Windows 10 deployment and servicing
Passwordless Service Accounts
Azure Networking inside and out
Digital Transformation: Putting the Jigsaw Together
Diagnostics and troubleshooting in Azure App Service Support Center
Optimizing your content for search and discovery
Microsoft Virtual Academy
Presentation transcript:

6/25/2018 11:13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs IT Masterclasses © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Traditional IT environment 6/25/2018 11:13 PM Traditional IT environment © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Tech recap Kerberos authentication of computer and user account. 6/25/2018 11:13 PM Tech recap Kerberos authentication of computer and user account. Tokens granted for server access. Resources required by users are primarily on-premises. Devices are managed by Group Policy (and SCCM in larger enterprises). © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/25/2018 11:13 PM The proposition Windows devices can be more secure by not being part of a traditional IT infrastructure © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Azure AD Join Integration with O365 SSO with Edge or office apps 6/25/2018 11:13 PM Azure AD Join Integration with O365 SSO with Edge or office apps OneDrive access © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Cloud environment – AAD Join 6/25/2018 11:13 PM Cloud environment – AAD Join © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Demo Azure Active Directory 6/25/2018 11:13 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Registered devices vs. joined devices 6/25/2018 11:13 PM Registered devices vs. joined devices Registered Device Joined Device Personal Devices Company owned device BYOD scenario CYOD scenario Local user authentication AAD user authentication MDM capable Windows, iOS, Android Windows only Windows Hello Access Windows Store for Business © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

So how is this more secure? The cloud environment doesn’t run on Kerberos. Apps and services rely on OAUTH for cloud identities. Users may need 2 identities for on-premises and cloud resources. Ugh! Maintaining a single identity in a managed environment avoids password overlap. Cloud identities can be used inside/outside the organization.

Windows Hello for Business User authentication to an AAD account PIN, biometric or gesture is verified locally with TPM The TPM holds the private key that never leaves the device. AAD holds the public key and verifies identity against the device held private key. No passwords = more secure

Microsoft 365 Licences are out, subscriptions are in. Windows 10 & Office 365 & EMS. New kid on the block.

EMS – Enterprise Mobility & Security 6/25/2018 11:13 PM EMS – Enterprise Mobility & Security © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Azure Information Protection 6/25/2018 11:13 PM EMS breakdown AAD Premium Azure Information Protection Intune © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

AAD Premium security Adds MFA (multi-factor authentication) Self-service password reset Security reports – are your users being hacked? Cloud app discovery – understand what users actually use Bitlocker recovery Auto MDM enrolment – devices are secured from day 1

Conditional access Policies control access to cloud applications 6/25/2018 11:13 PM Conditional access Policies control access to cloud applications Example 1: AAD joined devices only Example 2: MFA required for user authentication Example 3: MDM controlled computers only Example 4: Compliant devices only may access apps © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Azure AD Identity Protection

6/25/2018 11:13 PM Intune Rich cloud-based management of Windows 10 ( as well as iOS, Android) Extends capabilities further with Enterprise Mobility Suite (EMS) Integration with Office 365 © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/25/2018 11:13 PM Intune Rich cloud-based management of Windows 10 ( as well as iOS, Android) Extends capabilities further with Enterprise Mobility Suite (EMS) Integration with Office 365 © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Intune Benefits Single admin portal to manage services 6/25/2018 11:13 PM Intune Benefits Single admin portal to manage services Same user identities (AAD) SMEs typically don’t deploy SCCM for management Field-based computers are always ‘in-touch’ © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Intune for MDM Assets can be viewed and managed in the cloud. Better understand apps and hardware. Allows for remote reset and selective wipe. Deploy VPN and Wi-Fi profiles.

So how is this more secure? 6/25/2018 11:13 PM So how is this more secure? Intune managed devices are controlled via CSPs. CSPs control device behaviour. Updates can be deployed without the IT infrastructure – great for road warriors. Defender and Windows updates can be deployed this way. Up to date device = more secure © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/25/2018 11:13 PM Humans are fallible Where do current practices allow for logon or data breach? Identify the gaps. Where can EMS plug the gaps? © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Azure Information Protection 6/25/2018 11:13 PM Azure Information Protection Known user/device to access to data. Protect company data better on managed devices. data is effectively ‘partitioned’ on devices. Devices can be used for work and play without fear. Better together – conditional access + data security © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/25/2018 11:13 PM Office 365 © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Office 365 MDM MDM exists in O365 subscriptions. 6/25/2018 11:13 PM Office 365 MDM MDM exists in O365 subscriptions. Devices managed in O365 portal. If you have M365, use Intune for more features. Lacks features like MAM, VPN profiles, app deployment. © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/25/2018 11:13 PM The proposition Windows devices can be more secure by not being part of a traditional IT infrastructure © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/25/2018 11:13 PM Related session BRK3260: Manage Windows devices in the complex hybrid cloud world of today Thursday 16:00–17:15 W307 © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Please evaluate this session Tech Ready 15 6/25/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite https://myignite.microsoft.com/evaluations Phone: download and use the Microsoft Ignite mobile app https://aka.ms/ignite.mobileapp Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/25/2018 11:13 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.