Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

The System Center Family Microsoft. Mobile Device Manager 2008.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Chapter 13 Securing Windows Server 2008
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 7 HARDENING SERVERS.
4/17/2017 6:13 AM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Internet Protocol Security (IPSec)
Vik Thairani Mobility Technical Sales Consultant Mobile Communication Business -Microsoft Corp. WMB308.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Securing Microsoft® Exchange Server 2010
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 14: Configuring Server Security Compliance
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 11: Remote Access Fundamentals
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Delivering a Standard Mobile Operating Environment Don Kerr : Business Solutions Marketing – Windows Mobile Rick Anderson : Mobility Solution Sales.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
LegendCorp What is System Center Virtual Machine Manager (SCVMM)? SCVMM at a glance Features and Benefits Components / Topology /
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Walter Pitrof Technology Solution Professional Microsoft Switzerland.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enabling Secure Always-On Connectivity Gustav Kaleta Partner Technology Advisor Microsoft Corporation.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Secure Connected Infrastructure
Tech Ed North America /18/2018 1:18 PM Required Slide
Implementing Network Access Protection
Modernizing your Remote Access
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Forefront Security ISA
Goals Introduce the Windows Server 2003 family of operating systems
Module 1: Overview of Systems Management Server 2003
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Microsoft Virtual Academy
Microsoft Virtual Academy
Presentation transcript:

Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific security policies for device management, encryption, and remote device wipe Custom policies that can be created using Active Directory Management Templates

To enroll their devices, users simply need to: Access the company’s portal for self-service enrollment Enter their address Enter a one-time PIN code for enrollment

Target users in specific Active Directory groups Configure mobile applications such that users cannot uninstall them Eliminate the need to distribute CAB files via Flash drives Access powerful reporting systems for reviewing software distribution across a mobile device workforce

Manage and view all Windows Mobile devices via a single, convenient interface. With this, IT Pros can now: View a broad range of device characteristics like device settings, certificates installed, software installed etc. Reduce the learning curve since it is based on the familiar Microsoft Management Console (MMC)

Administrators can remotely access Windows Mobile devices using Mobile Device Manager to: Disable specific hardware functionality, such as the camera or Bluetooth connectivity Remotely wipe security- compromised devices

Single point of access to the corporate network Always-on, security-enhanced wireless communication Behind-the-firewall access to business applications

Smartcard Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile GW Back Firewall SSL Mutual User Auth SSL Auth (PIN+Corp Root) SSL Machine Mutual Auth and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD LHS NAP System Self Help Site Enrollment Service OMA Proxy CA Mobile VPN

MDM introduces three new server roles: Enrollment Server Proxies request to enroll device Mobile VPN Server Typically located in the network perimeter Entry point to corporate network Forwards network and device management communications between a corporate network and their devices Device Management Server Based on OMA DM standards Architecture Principles Security first Large scale distributed solution Transparent compatibility Extensibility & future proofing

Location: Location: Intranet based (domain joined server/service) Intranet based (domain joined server/service) Purpose: Purpose: Manage the process flow of enrollment Manage the process flow of enrollment Create domain objects Create domain objects Create certificates Create certificates Supply provisioning instructions Supply provisioning instructions Other: Other: Best practice: protected by a Proxy (e.g. ISA) Best practice: protected by a Proxy (e.g. ISA) Can co-exist on DM Server in integrated implementation Can co-exist on DM Server in integrated implementation

Create Acct. Issue Cert Negotiate SSL Root Submit Cert Request Receive Cert Public DNS Discovery

Private key and Enrollment Password never transmitted over the air All traffic between client and server uses SSL SSL negotiation does not require public root cert (e.g. VeriSign etc.)

Mobile VPN for both client and server Standards based IPSec Tunnel Mode MobIKEIKEv2 Enables access to corporate resources LOB Internet proxy servers

Location: Location: Corporate DMZ (non-domain joined) Corporate DMZ (non-domain joined) Purpose: Purpose: Authenticates incoming connections for authorized devices Assigns a stable internal IP address for the device Enables fast resume/reconnect features for devices and applications Negotiates keys to encrypt traffic over the internet Other: Other: IPSEC termination point IPSEC termination point Managed remotely Managed remotely

18 Double envelope security User Authentications: 1) Certificate 2) NTLM v2 3) Basic Kerberos delegation

Performance Technical features IPSec Tunnel Mode Aggregate all traffic through a single tunnel with a single NAT/Firewall Keep-Alive IKEv2 IETF Standard that includes address assignment (unlike IKEv1) MobIKE (Mobile IKE) IETF standard for transparent auto recovery of IPSec tunnels w/o re-negotiations of Sas Implications Extremely efficient, agile and self-healing connectivity solution Security Double envelope security VPN technology allows nested secure connections Outer layer – IPSec, IKEv2 tunnel from device to GW Inner layer – E-2-E Client-Server mechanisms (SSL, IPSec transport, etc) Defense in depth DMZ pre-auth Based on device identity and health (not user) End-to-End auth to corporate servers “Four factor” (2x2) authentication Back-end firewall filtering DMZ GW is not a vulnerability point

Security management Enrollment AD domain join Wipe Policy enforcement Service enablement/disablement Application deny/allow Software distribution Inventory and reporting

Location: Location: Intranet based (domain joined server/service) Intranet based (domain joined server/service) Purpose: Purpose: Primary administration and management service for all managed devices Functional hub for device Group Policy application, device software packages, and device data wipes Communicates with existing infrastructure servers, such as domain controllers, CA Proxies information and commands between core Windows Servers (AD/CA) and devices Other: Other: OMA-DM compliant OMA-DM compliant

23 DMZ WWAN Corpnet Internet

Required: Windows Server 2003 SP2 64 bit SQL Server 2005 Active Directory Microsoft CA Group Policy Not Required: Exchange Server (any version) Systems Management Server Systems Center ISA Server*

SecurityManagement DeviceManagement MobileVPN SCCMSCCM SCMDMSCMDM Std CAL Ent CAL System Center Configuration Manager System Center Mobile Device Manager Exchange Mobile Scenarios

Secure Mobile Messaging Only Mobile messaging with high security due to regulatory compliance requirements or internal security policies Key Messages Security management without Exchange Enterprise CAL Integration with AD/GP Inventory and reporting Secure Mobile Messaging Only Mobile messaging with high security due to regulatory compliance requirements or internal security policies Key Messages Security management without Exchange Enterprise CAL Integration with AD/GP Inventory and reporting LOB Only Rich LOB applications for task workers using ruggedized handhelds with no requirement for mobile messaging Key Messages Mobile VPN Over-the-air (OTA) app distribution Rich inventory and reporting App allow/deny LOB Only Rich LOB applications for task workers using ruggedized handhelds with no requirement for mobile messaging Key Messages Mobile VPN Over-the-air (OTA) app distribution Rich inventory and reporting App allow/deny LOB + Messaging Rich or lightweight LOB applications. Could also include high security requirements for mobile messaging Key Messages Mobile VPN Advanced device management features Security managemen t LOB + Messaging Rich or lightweight LOB applications. Could also include high security requirements for mobile messaging Key Messages Mobile VPN Advanced device management features Security managemen t Mobile Messaging Only Mobile messaging and PIM with lowest TCO and baseline security and manageability Key Message Exchange Standard CAL makes broad deployment straightforward and affordable Exchange Enterprise CAL adds server-side anti-virus and anti-spam + new management in Exchange Server 2007 SP1 Mobile Messaging Only Mobile messaging and PIM with lowest TCO and baseline security and manageability Key Message Exchange Standard CAL makes broad deployment straightforward and affordable Exchange Enterprise CAL adds server-side anti-virus and anti-spam + new management in Exchange Server 2007 SP1

© 2007 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.