Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.

Slides:



Advertisements
Similar presentations
Azure AD & Office Logon with Username / Password 2. MFA challenge 3. Reply to MFA challenge -1-way or 2-way SMS -Phone call -Mobile Application.
Advertisements

Microsoft Ignite /16/2017 3:28 PM
SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access.
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Business Productivity Online Suite Enterprise class software delivered via subscription services hosted by Microsoft and sold with partners.
Cloud app Cloud app Cloud app Separate username/password sign-in Manual or semi-automated provisioning Active Directory App Separate username/password.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Charlie Russel Microsoft MVP. Enabling Flexible Workstyles.
5 | Microsoft Confidential 6 | Microsoft Confidential.
Empowering Your Users-Security & Mobility Bil Martin 1.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Bronze Sky customer premises AD MS Online Directory Sync Provisioning platform Provisioning platform Lync Online Lync Online SharePoint Online SharePoint.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Andrew Hennessy Automating Server Application migrations to the Cloud – Goodbye Server INF21 3.
Chris Hewitt Adding magic to your business with Perceptual Intelligence ARC323 B.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Vakhtang Assatrian Asia Communications TSP Lead, Microsoft Architecture options for implementing Skype for Business PRD32 7.
Kevin Francis Azure Media Services Architecture Deep Dive CLD31 2.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Jeff Alexander & Andrew McMurray Runtime Provisioning in Windows 10 WIN327.
Michael Niehaus Using the Windows Store for Business: New Capabilities for Managing Apps in the Enterprise WIN335.
User and Device Management
Orin Thomas 30 Bad Habits of Server Administrators INF32 3.
Fai Lai Global IoT Tech Specialist, C+E Specialist Sales Seamless communication between devices and Azure IoT Hub via Azure IoT Protocol Gateway MOB31.
Orin EDP, EFS, BitLocker, RMS, DAC, and IPsec: Protect your files at rest and in transit. WIN341 A.
Craig Pringle & Derek Moir
Basil Apostolou & Craig Pringle The why and how of hybrid cloud CLD22 3.
Clint Wyckoff | Microsoft Product Strategy Veeam Software: Availability Strategies for Microsoft Azure and Hyper-V, A Deep Dive.
James Bannan The Cloud That Chuck Norris Built: Resilient Architecture in Azure ARC44 3.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Jhong Catane Exchange Hybrid Deployment PRD34 2.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
A deep dive into Azure AD B2C
What's New in System Center Configuration Manager, Current Branch and Intune INF324a Steven Hosking.
Microsoft Ignite /27/2018 9:00 AM THR2016
Now, let’s implement/trial Windows Defender Advanced Threat Protection
Cloud-First, Modern Windows Management and Security
Building Business Application with Office 365 and Other Line Business Systems
Conduct a successful pilot deployment of Microsoft Intune
Secure Remote Access to on-premises Web Apps using Azure AD
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Microsoft Intune MAM without Device Enrollment
What’s new in Visual Studio in 2015?
Protect your OneDrive and SharePoint files on mobile devices
Microsoft Ignite /20/2018 2:21 PM
Rob Farley, LobsterPot Solutions
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Modern cloud PaaS for mobile apps, web sites, API's and business logic apps
Deep Dive into Azure API Apps and Logic Apps
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
UI test automation of MVC apps with Microsoft Edge WebDriver
Empower your users with Azure Active Directory Premium
Securing ASP.NET in an Azure Environment
Microsoft Virtual Academy
Presentation transcript:

Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1

Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they love while helping ensure corporate assets are secure

SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access Filter or block mobile app access Block unmanaged devices Prevent downloads Force multi-factor authentication Require domain joined Force traffic via proxy/VPN

SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNETDMZ Active Directory The perimeter can not help protect data Challenge Solution Access control and data containment integrated natively in the apps, devices, and the cloud.

Native Mail Managed Browser LoB SharePoint Exchange CORPORATE NETWORK DMZ AD Azure ADAccess Control, MFA, SSO IntuneDevice policy, data containment Azure RMSFile level protection & policy Enterprise Mobility Suite Data Protection Layers

Containers 1.Depend on specific DMZ infrastructure 2.Work on premise only SharePoint Server Exchange Server CORPORATE NETWORK DMZ Active Directory SDK/wrapper, helper apps Managed browser, viewers Mobile application management Custom app Custom file app Custom collab app Native device MDM

SDK/wrapper, helper apps Managed browser, viewers Managed Office productivity SharePoint Server Exchange Server CORPORATE NETWORK DMZ Active Directory

The more IT control, the more “as appropriate” access for employees Unknown DevicePersonal DeviceManaged DeviceShared Device Example Kiosk at a hotelPersonal iPad or home PCCompany provided phoneMobile retail point of sale tablet Type of user Information Worker Task Worker What can you access Employees can access corporate data only within a protected browser session Employees can use mobile productivity apps controlled by IT to prevent leakage Employees can access all mobile apps, access the corporate network, and sync corporate documents Employees use the specific shared apps needed for their tasks What you can’t access Employees can’t download anything Employees can’t access the corporate network, sync data, use private apps Employees get full access per IT policy Anything else What’s managed Browser sessionMobile productivity apps and a managed browser All mobile devices or PC plus all the apps A locked down device with specific apps Key features Web CA Web session protection MFA Desktop and MAM CA MAM Service, RMS, ARA, MFA Device CA MDM + MAM RMS, ARA, MFA Win 10 provision profile DEP/Configurator Kiosk Mode New

Intune Device Management Office 365 Productivity Azure AD Identity and Access

Intune Config Mgr (on-premise) Deployment choices

Cloud-hosted corporate data protection Best end-user experience for mobile productivity World-class engineering and security with a single support system and 3 rd -party ecosystem Complete solution for application and device management, access, identity, productivity, and data protection

Continue your Ignite learning path Visit Microsoft Virtual Academy for free online training visit Visit Channel 9 to access a wide range of Microsoft training and event recordings Head to the TechNet Eval Centre to download trials of the latest Microsoft products

Microsoft Confidential - Shared under NDA

Continue your Ignite learning path Visit Microsoft Virtual Academy for free online training visit Visit Channel 9 to access a wide range of Microsoft training and event recordings Head to the TechNet Eval Centre to download trials of the latest Microsoft products