Business Needs and IT Challenges How can IT maintain user productivity and protect against evolving threats How can IT reduce complexity and scale.

Slides:



Advertisements
Similar presentations
People Centric IT Unified Device Management with SCCM + Windows Intune
Advertisements

Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
SCCM 2012 Features and Benefits
? ? AreaPropertiesValues Information Privacy Personally Identifiable InformationHigh; Moderate; Low; Public; Not PII Protected Health InformationHigh;
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Windows Defender Next Generation Anti-malware
Plan Build Custom Image (Drivers, Apps, Updates) New Hardware In-Place (Refresh) WipeReimage New Windows Version or Major Image Revision.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
Desktop virtualization Access & information protection Mobile device & application management Hybrid identity Simplified device enrollment and.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Empowering people-centric IT Mobile Device Management Access and information protection Desktop Virtualization Hybrid Identity.
Resource App Resource App Resource authorization server authorization endpoint token endpoint A A R.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Howard A. Carter III Senior Consultant Microsoft Consulting Services
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Dynamic Access Control Overview Matthias Wollnik Program Manager, File Server Microsoft Corporation.
Tim Vander Kooi Systems
Harris Schneiderman Account Manager Kloud Solutions.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Desktop and Device Management Andy Taylor – Susan Smith –
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms is.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Empowering people-centric IT Patrick Rogers May 29, 2014.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Access resources in a federation partner organization.
Configuration Manager and InTune Gemeinsam oder einsam?
? ? AreaPropertiesValues Information Privacy Personally Identifiable InformationHigh; Moderate; Low; Public; Not PII Protected Health InformationHigh;
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
User and Device Management
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Windows Intune Cloud Based Management Speaker: Neil Phillips 13th August 2014.
Craig Pringle & Derek Moir
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
System Center 2012 Configuration Manager Service Pack 1 Overview.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Managing modern devices with System Center 2012 R2 Configuration Manager Niall Brady.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
Today’s challenges Data Users Apps Devices
Hybrid Management and Security
People-Centric Management
Microsoft Virtual Academy
Hybrid Management and Security
SaaS Application Deep Dive
Forefront Security ISA
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Cloud Connect Seamlessly
TechEd /14/ :11 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Access and Information Protection Product Overview October 2013
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
System Center Marketing
TechEd /6/ :24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Microsoft Virtual Academy
Microsoft Virtual Academy
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Business Needs and IT Challenges How can IT maintain user productivity and protect against evolving threats How can IT reduce complexity and scale back infrastructure requirements IT Needs Lower operational costs Business Needs Agility and Flexibility

Registering and Enrolling Devices IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the users identity. Multi-factor authentication can be used through Windows Azure Active Authentication. Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device Users can enroll devices which configure the device for management with Windows Intune. The user can then use the Company Portal for easy access to corporate applications As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device Data from Windows Intune is sync with Configuration Manager which provides unified management across both on- premises and in the cloud

IT Mac OS X Windows PCs (x86/64, Intel SoC), Windows to Go Windows Embedded Windows RT, Windows Phone 8 iOS, Android Single Admin Console Microsoft System Center 2012 R2 Configuration Manager

ConfigMgr MPBaseline ConfigMgr Agent WMIXML RegistryIISMSI ScriptSQL Software Updates File Active Directory Baseline Configuration Items Auto Remediate OR Create Alert (to Service Manager) ! Improved functionality Copy settings Trigger console alerts Richer reporting Enhanced versioning and audit tracking Ability to specify versions to be used in baselines Audit tracking includes who changed what Pre-built industry standard baseline templates through IT Governance, Risk & Compliance(GRC) Solution Accelerator Assignment to collections Baseline drift

VPN Profile Management Support for major SSL VPN vendors DNS name-based initiation support for Windows 8.1 and iOS Application ID based initiation support for Windows 8.1 Automatic VPN connection Support for VPN standards SSL VPNs from Cisco, Juniper, Check Point, Microsoft, Dell SonicWALL, F5 Subset of vendors have Windows Windows RT VPN plug-in PPTP,L2TP, IKEv2

Wi-Fi and Certificate Profiles Wi-Fi settings Manage and distribute certificates Deploy trusted root certificates Support for Security Center Endpoint Protection(SCEP) protocol Manage Wi-Fi protocol and authentication settings Provision Wi-Fi networks that device can auto connect Specify certificate to be used for Wi-Fi connection

Comprehensive Protection Stack Building enterprise grade platform security MANAGEMENT ANTIMALWARE Available only in Windows 8.x Endpoint Protection Management Software Updates + SCUP Operating System Deployment Settings Management Antimalware Dynamic Translation Behavior Monitoring Software Distribution Vulnerability Shielding Windows Defender Offline Internet ExplorerBitLockerAppLocker Address Space Layout Randomization Data Execution Prevention User Access Control Secure Boot through UEFI Windows Resource Protection Measured Boot Early Launch Antimalware (ELAM) Exchange Connector Enhanced in Windows 8.x (or Internet Explorer 10) ELAM & Measured Boot Cloud clean restore PLATFORM DYNAMIC CLOUD UPDATES Microsoft Malware Protection Center Dynamic Signature Service

Behavior Monitoring and Dynamic Signature Service Live system monitoring identifies new threats Tracks behavior of unknown processes and known bad processes Multiple sensors to detect operating system anomaly Updates for new threats delivered through the cloud in real time Real time signature delivery with Microsoft Active Protection Service Immediate protection against new threats without waiting for scheduled updates

Cloud Clean Restore Advanced system file cleaning through replacement Replaces infected system files with clean versions from a cloud source. Uses a trusted Microsoft cloud source for the replacement file Restart requirements orchestrated on system and wired to client UI (for in use file replacement).

Windows 7 Malware is able to boot before Windows and Anti-malware Malware able to hide and remain undetected Systems can be compromised before AM starts Secure Boot loads Anti-Malware early in the boot process Early Load Anti-Malware (ELAM) driver is specially signed by Microsoft Windows starts AM software before any 3rd party boot drivers Malware can no longer bypass AM inspection Trusted Boot: Early Load Anti- Malware Windows 8

Simplify BitLocker Deployment

Recovery Password Data Compliance Data HTTPS MBAM Client Group Policy: AD, AGPM Key Recovery Service Helpdesk UX for Key Recovery Compliance Reports Central Administration Compliance Service

User claims User.Department = Finance User.Clearance = High ACCESS POLICY Applies = High Allow | Read, Write | if AND == True) Device claims Device.Department = Finance Device.Managed = True Resource properties Resource.Department = Finance Resource.Impact = High AD DS 31 File Server

Expression based access control x 50 Country 50 Groups Branch x Groups Customers 100,000 Groups! x 100

PCIT-B212Design Considerations for BYOD PCIT-B214Using Dynamic Access Control and Rights Management for Information Protection PCIT-B213Access Control in BYOD and Directory Integration in a Hybrid Identity Infrastructure PCIT-B314Understanding Microsoft’s BYOD Strategy and an Introduction to New Capabilities in Windows Server 2012 R2 DCIM-IL201Implementing Desired State configuration