IT is changing faster and faster and users requires completely different approach – especially millennials. Microsoft reacts to these IT needs by introducing EMS – most complex security and management suite on the market. We will cover how to manage and secure user identity, devices and documents. Discussion will cover not only Microsoft’s operating systems but iOS and Androids as well. As traditional IT assets needs to be maintained as well, SCCM and cloud management can be combined very easily. Join us on this presentation to see today’s possibilities of IT.
9. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
* Forrester Research: “BT Futures Report: Info workers will erase boundary between enterprise & consumer technologies,” Feb. 21, 2013
** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report
*** Verizon 2013 data breach investigation report
****Forrester Application Adoption Trends: The Rise Of SaaS
*****CEB IT Impact Report: Five Key Findings on Driving Employee Productivity Q1 2014.
World has changed (already) - Mobile First | Cloud First
of employees use
personal devices
for work
purposes.*
of employees
admit to using
non-approved
software-as-a-
service (SaaS)
applications in
their jobs.**
percent of network
intrusions exploited
weak or stolen
credentials.***
of employees that
typically work on
employer
premises, also
frequently work
away from their
desks.*****
of all software will
be available on a
SaaS delivery by
2020.****
66%
Millennials (93%) >80% >70% 25%
33%
Millennials (88%)
14. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Unified device management – IT view
IT Single Admin
Console
Android
Windows 8 RT
Windows 8.1
Windows 10
Windows 10 Mobile
Windows Phone 8.1
iOS
Mac OS X
Windows Computers
(x86, x64, Intel SoC),
Windows to Go
Windows Embedded
Linux and
UNIXSystem Center Configuration
Manager
15. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Mobile application management
Personal apps
Managed apps
Maximize productivity while preventing leakage of company
data by restricting actions such as copy, cut, paste, and save
as between Intune-managed apps and unmanaged apps
User
16. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Conditional Access & Limited Session
Application
Per app policy
Client type
User attributes
Group membership
Devices
Domain Joined
Compliant
Platform type (OS)
Location
IP Range
Risk
Session risk
User risk
ENFORCE MFA
ALLOW
LIMIT SESSION
BLOCK
Access P rox y + S ession P rox y
Cloud and
On-premises
applications
PROTECT
ACCESS
18. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Cloud App Discovery / Security
Discovery
• Use traffic logs to discover and
analyze which cloud apps are in use
• Manually or automatically upload log
files for analysis from your firewalls
and proxies
Sanctioning and un-sanctioning
• Sanction or block apps in your
organization using the cloud app
catalog
App connectors
• Leverage APIs provided by various
cloud app providers
• Connect an app and extend
protection by authorizing access to
the app. Cloud App Security queries
the app for activity logs and scans
data, accounts, and cloud content
App connectors
Cloud discovery
Protected
Cloud apps
Cloud
traffic
Cloud
traffic logs
Firewalls
Proxies
Your organization from any location
API
Cloud App Security
19. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Azure Information Protection (RMS)
Client integration
User
Authentication
Integration
Authentication and
collaboration
BYO/HYO Key
Client integration
20. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Microsoft Advanced Threat Analytics
Detect threats fast
with Behavioral
Analytics
Adapt as fast as
your enemies
Focus on what is
important fast
using the simple
attack timeline
Reduce the fatigue
of false positives
No need to create rules or policies, deploy
agents or monitoring a flood of security
reports. The intelligence needed is ready to
analyze and continuously learning.
ATA continuously learns from the
organizational entity behavior (users,
devices, and resources) and adjusts itself
to reflect the changes in your rapidly-
evolving enterprise.
The attack timeline is a clear, efficient,
and convenient feed that surfaces the
right things on a timeline, giving you the
power of perspective on the “who-what-
when-and how” of your enterprise. It
also provides recommendations for next
steps
Alerts only happen once suspicious
activities are contextually aggregated,
not only comparing the entity’s behavior
to its own behavior, but also to the
profiles of other entities in its interaction
path.
21. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
How Microsoft Advanced Threat Analytics works
Abnormal Behavior
▪ Anomalous logins
▪ Remote execution
▪ Suspicious activity
Security issues and risks
▪ Broken trust
▪ Weak protocols
▪ Known protocol vulnerabilities
Malicious attacks
▪ Pass-the-Ticket (PtT)
▪ Pass-the-Hash (PtH)
▪ Overpass-the-Hash
▪ Forged PAC (MS14-068)
▪ Golden Ticket
▪ Skeleton key malware
▪ Reconnaissance
▪ BruteForce
▪ Unknown threats
▪ Password sharing
▪ Lateral movement
22. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Identity management Azure AD Join
Intune auto enrollment
Self Service Password Reset
Azure Multi Factor Authentication
SSO for SaaS apps (twitter,…)
SSO for on-prem apps
Self Service Bitlocker Key Recovery
Self Service Groups
Dynamic groups
Detailed (not only security) repoting
Azure AD Premium
Identity Manager
AAD Connect
23. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
One identity? YES!
HR system
MIM
Manager
Windows Server
Active Directory
LDAP
Oracle DB
Finance
Exchange
Online
SharePoint
Online
Azure
SaaS app
Microsoft Azure
Active DirectoryAzure AD Connect
24. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
2500+ pre-integrated SaaS apps
https://azuremarketplace.microsoft.com/en-us/marketplace/apps/category/azure-active-directory-apps
26. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Microsoft Solution3rd party Solution
Okta
Ping Identity
Centrify
Salesforce Identity
Google
Amazon Web Services
AirWatch MobileIron
GoodKaseyaSymantec
Seclore
FasooAdobe LiveCycle
Azure Active
Directory
Premium
Microsoft
Intune
Azure Rights
Management
service
File protection
Mobile device &
app management
Cloud identity
management
And what about the others?
Desktop
management
Symantec LANdesk
CA BMC
System Center
Config Mgr
Intune
EnterpriseMobilitySuite
27. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
C Core CAL a Enterprise CAL Suite komponenty
E Enterprise CAL Suite komponenty
Access to the cloud services
Access to On-premises products
Windows Enterprise Windows SA per User
Skype for Business Plus CAL
Office Professional Plus 2013
Exchange Server Standard CAL
SharePoint Server Standard CAL
Skype for Business Standard CAL
Skype for Business Enterprise CAL
SharePoint Server Enterprise CAL
Exchange Server Enterprise CAL
Exchange Online Archiving for ES
SC Client Management Suite
Windows RMS CAL
SCCM CML
SC Endpoint Protection SL
Windows Server CAL
E1
E3
EM+S
E3
Office 365 ProPlus
Exchange Online Plan 1
SharePoint Online Plan 1
Skype for Business Online Plan 1
Skype for Business Online Plan 2*
SharePoint Online Plan 2*
Exchange Online Plan 2*
Exchange Online Archiving for EO*
Azure RMS
Microsoft Intune
Azure AD Premium
C
E
C
C
E
E
E
E
E
C
C
C
SecureProductiveEnterprise
MIM CAL
PowerBI a Delve Analytics
Skype for Business Voice
E5
Advanced Threat Analytis
Cloud App Security
Azure Information Protection
EM+S
E5
Office Teams
Office Planner
28. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Advanced Threat Protection
Windows Defender ATP
Azure Active Directory
Azure Information Protection
Advanced Threat Analytics
Cloud App Security
Intune
29. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Build on Azure, secure
and scalable by design
No investment needed,
pay-as-you go, even free (forever)
Focus on most important
leverage expert knowledge
Targeting GDPR, Security,
IT operations
Detailed report every week
Any server, any cloud