Managing and Securing Devices using Exchange, System Center, and Intune LAWRENCE NOVAK MICHAEL INDENCE DMVMUG Reston, VA

Slides:



Advertisements
Similar presentations
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Advertisements

Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Meraki Mobile Device Management
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Desktop virtualization Access & information protection Mobile device & application management Hybrid identity Simplified device enrollment and.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Exchange Exchange Connecter with Configuration Manager Configuration Manager with Intune Protect and Manage Devices and Infrastructure.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Howard A. Carter III Senior Consultant Microsoft Consulting Services
Lack of control for mobile devices Different tools for phone & PC Policy conflict Inconsistent user experience… Granular mobile device mgmt Converged.
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
Securing Microsoft® Exchange Server 2010
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Solution Benefits Of Adopting Unified Solution Goals Management support for Windows 8.x and heterogeneous devices Improve user productivity on.
Microsoft NDA Confidential Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Empowering people-centric IT Mobile Device Management Access and information protection Desktop Virtualization Hybrid Identity.
The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms is.
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Empowering people-centric IT Patrick Rogers May 29, 2014.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Gary Gruba Systems Engineer Absolute Manage MDM Managing iPhones, iPads, iPod Touches and Android Dougald MacNaughton Account Executive.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Devices & Platforms Single admin console.
Configuration Manager and InTune Gemeinsam oder einsam?
Managing iOS Device Using ConfigMgr and Intune Hybrid MDM John Presenter #2 Twitter Handle Blog or address.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Michael Niehaus Using the Windows Store for Business: New Capabilities for Managing Apps in the Enterprise WIN335.
Windows Intune Cloud Based Management Speaker: Neil Phillips 13th August 2014.
Craig Pringle & Derek Moir
Windows 8 tablets with Intel Core 64-bit processors Windows 8 tablets with Intel Atom 32-bit processors Windows RT tablets with ARM processors.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Managing modern devices with System Center 2012 R2 Configuration Manager Niall Brady.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
MaaS360 MDM for iOS, Android & Windows Phone 7
CudaLaunch for Barracuda NG Firewall.
Preparing for the Windows 8.1 MCSA
System Center 2012 Configuration Manager
Conduct a successful pilot deployment of Microsoft Intune
Microsoft Virtual Academy
Microsoft Virtual Academy
Exam Prep : Section 2: Design for Device Access and Protection
Mobile Device Management options in Office 365 and beyond
Microsoft Intune MAM without Device Enrollment
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Azure AD Application Proxy
A beginners guide to Mobile Device Management
Microsoft Ignite /20/2018 2:21 PM
Getting Started.
Getting Started.
Microsoft Virtual Academy
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Microsoft 365 Business Technical Fundamentals Series
Getting Started With LastPass Enterprise
Presentation transcript:

Managing and Securing Devices using Exchange, System Center, and Intune LAWRENCE NOVAK MICHAEL INDENCE DMVMUG Reston, VA

Protect and Manage Devices and Infrastructure  Exchange  Exchange Connecter with Configuration Manager  Configuration Manager with Intune

Exchange - Protecting your Infrastructure  Set-ActiveSyncOrganizationSettings  New-ActiveSyncDeviceAccessRule  Set-ActiveSyncDeviceAccessRule

Exchange - Protecting your Infrastructure  Set-ActiveSyncOrganizationSettings Set-ActiveSyncOrganizationSettings -DefaultAccessLevel Quarantine - AdminMailRecipients

Exchange - Protecting your Infrastructure  New-ActiveSyncDeviceAccessRule New-ActiveSyncDeviceAccessRule -QueryString iPhone -Characteristic DeviceModel -AccessLevel Block New-ActiveSyncDeviceAccessRule -QueryString NokiaE521/2.00()MailforExchange -Characteristic UserAgent -AccessLevel Allow

Exchange - Protecting your Infrastructure  Set-ActiveSyncDeviceAccessRule Set-ActiveSyncDeviceAccessRule 'ContosoPhone(DeviceModel)' - AccessLevel:Quarantine Get-ActiveSyncDeviceAccessRule | Where {$_.AccessLevel -eq 'Allow'} | Set-ActiveSyncDeviceAccessRule -AccessLevel:Quarantine

Exchange - Protecting your Infrastructure DEMO

Exchange – Managing and Securing Devices  Mobile Device Mailbox Policies When you install Exchange 2013, a default mobile device mailbox policy is created. All users are automatically assigned this default mobile device mailbox policy.

Exchange – Managing and Securing Devices  New-ActiveSyncMailboxPolicy New-ActiveSyncMailboxPolicy -Name 'All Users' - AllowNonProvisionableDevices $false -DevicePasswordEnabled $true - AlphanumericDevicePasswordRequired $false - MaxInactivityTimeDeviceLock '00:15:00' -MinDevicePasswordLength '4' -PasswordRecoveryEnabled $false -RequireDeviceEncryption $true - AttachmentsEnabled $true -AllowSimpleDevicePassword $true - DevicePasswordExpiration '30.00:00:00' -DevicePasswordHistory '0'

Exchange – Managing and Securing Devices  New-ActiveSyncMailboxPolicy New-ActiveSyncMailboxPolicy -Name 'All Users' - AllowNonProvisionableDevices $false -DevicePasswordEnabled $true - AlphanumericDevicePasswordRequired $false - MaxInactivityTimeDeviceLock '00:15:00' -MinDevicePasswordLength '4' -PasswordRecoveryEnabled $false -RequireDeviceEncryption $true - AttachmentsEnabled $true -AllowSimpleDevicePassword $true - DevicePasswordExpiration '30.00:00:00' -DevicePasswordHistory '0'

Exchange – Managing and Securing Devices DEMO

Exchange – Managing and Securing Devices Current list of available settings per device OS ts

Exchange – Managing and Securing Devices  The enterprise feature pack will include:  S/MIME to sign and encrypt  Access to corporate resources behind the firewall with app aware, auto-triggered VPN  Enterprise Wi-Fi support with EAP-TLS  Enhanced MDM policies to lock down functionality on the phone for more enterprise control, in addition to richer application management such as allowing or denying installation of certain apps  Certificate management to enroll, update, and revoke certificates for user authentication

Exchange Connector – Managing and Securing Devices Use the Exchange Server connector in System Center 2012 Configuration Manager when you want to manage mobile devices that connect to Exchange Server (on-premises or online) by using the Microsoft Exchange ActiveSync protocol, and you cannot enroll them by using Configuration Manager.

Exchange Connector – Managing and Securing Devices  Settings you can control  General  Password  Management  Security  Application

Exchange Connector – Managing and Securing Devices  Option to control settings  Exchange Access rules control  Allow, Block, or Quarantine  Remotely Wipe via ConfigMgr  Self Wipe via Application catalog  On-premise automatically added to catalog on sync  Hosted requires manual user device affinity before visible in catalog.

Exchange Connector – Managing and Securing Devices When you manage mobile devices by using the Exchange Server connector, this does not install the Configuration Manager client on the mobile devices. Some management functions are therefore limited. For example, you cannot install software on these devices or use configuration items to configure these devices.

Exchange Connector – Managing and Securing Devices When you use the Exchange Server connector, the mobile devices can be managed by the settings that you configure in Configuration Manager instead of being managed by the default Exchange ActiveSync mailbox policies.

Exchange Connector – Managing and Securing Devices Define the settings that you want to use in the following group settings: General, Password, Management, Security, and Application. For example, in the Password group setting, you can configure whether mobile devices require a password, the minimum password length, password complexity, and whether password recovery is allowed.

Exchange Connector – Managing and Securing Devices Decide which account will connect to the Exchange Client Access server to manage the mobile devices. The account can be the computer account of the site server or a Windows user account. The following Exchange Server management roles include the required cmdlets: Recipient Management, View-Only Organization Management, and Server Management.

Exchange Connector – Managing and Securing Devices DEMO

System Center Intune - Managing and Securing Devices System Center Intune has various access points and knowing each one is important to not confuse users and get the most of the subscription.  Portal.Manage.Microsoft.com (Users)  Account.Manage.Microsoft.com (Subscription Administration)  Manage.Microsoft.com (Intune Administration)

System Center Intune - Managing and Securing Devices There are various pre-requisites that must be confgiiured and working before Intune can manage mobile devices or be connected to System Center Configuration Manager.  Intune Account  Verified Public Domain  Domain UPN  Dirsync/SSO  DNS Alias (CNAME)  Certificate Keys

System Center Intune - Managing and Securing Devices Certificates are used with System Center Intune to secure software deployments to devices that are either company developed or push or to allow Notifications. Below is a list by OS type of cert required.  Windows Phone 8 – Code Sign Cert (Symantec)  Support Tool for Windows Intune Trial (temp cert for testing)  Windows devices (Side loading Keys)  IOS – Apple Push Notification (APN)  Android (None)

System Center Intune - Managing and Securing Devices System Center Intune support many Mobile devices in Direct Managed mode or connected with System Center Configuration Manager 2012 R2.  Windows Phone 8 Devices  Windows 8 RT  Windows 8.1 RT  Windows 8.1  iOS 5.0, 6.0, and 7.0  Android Devices 2.3 and Later

System Center Intune - Managing and Securing Devices When integrating System Center Intune with System Center Configuration Manager there is a few configuration changes and system roles to be setup.  Subscription Connector Setup  Windows Intune Connector Role  Logs  ConnectorSetup  CloudMgr  CloudUsersSync  dmpDownloader  dmpuploader

Intune Connector – Managing and Securing Devices DEMO

Managing Devices – Managing and Securing Devices  Company Applications  Deeplinking (Store Apps)  User Enrollment

Deeplinking – Managing and Securing Devices  Method to deploy Vendor store apps via System Center Configuration Manager.  ITunes  Google Play  Windows Phone  Windows (Use reference computer)

Software Deployment – Managing and Securing Devices DEMO

User Enrollment – Managing and Securing Devices  Windows Phone (Settings - Company apps)  Windows RT (System Configuration – Company Apps)  Windows 8.1 and RT 8.1 (Workplace)  iOS (ITunes –Windows Intune Company Portal)  If sp1 (m.manage.Microsoft.com)  Android – ( Google Play - Windows Intune Company Portal)

User Enrollment – Managing and Securing Devices DEMO

Protect and Manage Devices and Infrastructure  Exchange  Exchange Connecter with Configuration Manager  Configuration Manager with Intune

Questions?