SlideShare une entreprise Scribd logo
1  sur  48
Microsoft Enterprise Mobility Suite | Getting started…
• Introduction
• What is EMS and why do you need it?
• How to get started
• Newly added features
Agenda
- Senior Consultant at Atea
- Soon to be a father
- Likes long walks on the beach….
- Email: Thomas.Godsted.Rysgaard@Atea.dk
- Twitter: @thomasrysgaard
Thomas Godsted Rysgaard
What's driving change?
User Devices Apps Data IT
Enterprise Mobility Suite
Azure Active Directory Premium
• Hybrid Identity Control panel
• Multifactor Authentication
• Password Reset
Microsoft Intune
• Mobile and Device Management
• Compliance settings
• Mobile Application Management
Azure Rights Management
• Information Protection
• Document tracking
• Bring your own key
First step - Identity
Azure Active Directory Premium
Self-service Single
sign on
•••••••••••
Username
Identity as the foundation
Azure AD
Connect
Cloud
SaaS
Azure
Office 365Public
cloud
Other
Directories
Windows Server
Active Directory
On-premises Microsoft Azure Active Directory
Azure AD Connect
Consolidated deployment
assistant for your identity
bridge components
• Express Settings
• Multi-forest support
• Password # Sync
• Streamlined fed setup with
ADFS
• Configurable Sync settings
DirSync
Azure AD Sync
FIM+Azure AD
Connector
Sync Engine
On-boarding to Azure AD & Office 365
ADFS
http://blogs.technet.com/b/ad/archive/2014/12/15/azure-ad-connect-one-simple-fast-lightweight-tool-to-connect-active-directory-and-azure-active-directory.aspx
ADFS
ADFS is optional, can addresses complex
enterprise deployments
Domain Join SSO, Enforcement of AD login policy,
Smart Card or 3rd party MFA
• Multi-factor authentication
• Group-based app access
• Advanced security reports and alerts
• Self-service Enablement
• Forefront Identity Manager (FIM)
• Enterprise SLA
A stand-alone Azure Identity and Access
management service also included in Azure Active
Directory Premium
Prevents unauthorized access to both on-premises
and cloud applications by providing an additional
level of authentication
Trusted by thousands of enterprises to authenticate
employee, customer, and partner access.
Azure Multi-factor Authentication
DEMO
Second step – Device Management
Microsoft Intune
Desktop
virtualization
Access &
information
protection
Mobile device &
application
management
Hybrid
identity
Simplified device enrollment and registration
Single console to manage all devices
Managed productivity with Office mobile apps
Conditional access to corporate resources
Desktop
Virtualization
Mobile devices and PCs Mobile devices
System Center
Configuration
Manager
Domain joined PCs
Configuration Manager integrated with Intune (hybrid)Intune standalone (cloud only)
Deployment flexibility
IT IT
Intune web console Configuration Manager console
Single management console for IT admins
Configuration Manager console (hybrid)Intune web console (cloud only)
© EG A/S 18
Consistent experience across:
Windows
Windows Phone
Android
iOS
Discover and install corporate apps
Manage devices and data
Ability to contact IT
Customizable terms and conditions
Raise of hands…
Conditional access to email
Policy
verification
•••••••••
Username
Microsoft Intune
Required settings
defined by IT admin:
Enrolled device
Encrypted device
Passcode set
Admin console
Not jailbroken/rooted
IT
ITUser
Demo
Conditional Access for Exchange Online (quickest
demo….. In the world!)
Corporate
Complete mobile application management
• Securely access corporate information using
Office mobile apps, while preventing company
data loss by restricting actions such as
copy/cut/paste/save in your managed app
ecosystem
• Extend these capabilities to existing line of
business apps using the Intune app wrapper
• Enable secure viewing of content using the
Managed Browser, PDF Viewer, AV Player, and
Image Viewer apps
Manage all of your corporate apps and
data with Intune’s mobile device and
application management solution
Personal
Managed
Browser &
Viewer Apps
Mobile Application Management with Microsoft Intune
Selective wipe
Personal apps
Managed apps Company Portal
Are you sure you want to wipe
corporate data and applications
from the user’s device?
OK Cancel
Perform selective wipe via self-service company portal or admin console
Remove managed apps and data
Keep personal apps and data intact
ITIT
Demo
Create and Deploy Mobile Application
Management Configuration
Conditional access policy
• Ability to restrict access to Exchange on-premises email based upon device enrollment
• Ability to restrict access to Exchange Online email based upon device enrollment and compliance policies
Mobile app management
• Management of Office mobile apps (Word, Excel, PowerPoint) for iOS devices, including ability to restrict actions such as
copy, cut, and paste outside of the managed app ecosystem
• Ability to extend application protection to existing line-of-business apps using the Intune App Wrapping Tool for iOS
• Managed Browser app for Android devices that controls actions that users can perform, including allow/deny access to
specific websites
• PDF Viewer, AV Player, and Image Viewer apps for Android devices that help users securely view corporate content
Configuration policies and
resource access
• Deployment of email, WiFi, VPN profiles as well as certificates
• Lockdown of Supervised iOS devices and devices using Samsung KNOX with Kiosk mode
• Targeting of policies and apps by device groups
• Enforcement of application install or uninstall
• Convenient access to internal corporate resources via per-app VPN configurations for iOS
• Application install allow/deny list
• Remote pin reset for Windows Phone 8.1 (currently supported for iOS and Android)
• Multi-factor authentication at enrollment for Windows 8.1 and Windows Phone 8.1 devices
• Ability to restrict administrator access to a specific set of user and device groups
• Ability to create configuration files using Apple Configurator and import these files into Intune to set custom iOS policies
• Lockdown of Windows Phone 8.1 devices with Assigned Access mode using OMA-URI settings
• Ability to set additional policies on Windows Phone 8.1 devices using OMA-URI settings
Ongoing support for device
platforms
• Service account enrollment
• Customizable terms and conditions
• Enhanced user interface for Intune administration console
• Ability to push free store apps to iOS devices
• Support for Apple Configurator
Conditional access policy
• Ability to restrict access to SharePoint Online (includes OneDrive for Business) based upon device enrollment and compliance
• Ability to restrict access to Exchange on-premises for Exchange ActiveSync clients on Android devices
Mobile app management
• Management of the Office Mobile app (access, view, and edit Word, Excel, and PowerPoint documents) for Android phones
• Management of OneNote and OneDrive apps
• Management of Work Folders app for iOS devices
Configuration policies and
resource access
• Ability to require encryption on Windows 8.1 (x86) devices
• Ability to set minimum classification of platform updates to be installed automatically on Windows 8.1 (x86) devices
• Ability to restrict the number of devices a user can enroll in Intune
• Support for Cisco AnyConnect per-app VPN configurations for iOS devices
• Deployment of WiFi profiles for Windows devices using XML import and Windows Phone devices using OMA-URI (currently supported for
iOS and Android)
• Ability to create WiFi profiles with pre-shared keys (PSK) for Android devices
• Ability to resolve certificate chains on Android devices without the need to deploy each intermediate certificate individually
• Ability to deploy .appx files and .appx bundles to Windows Phone 8.1 devices
Ongoing support for device
platforms
• Support for Apple Device Enrollment Program (DEP)
• Ability to browse and install apps on Windows Phone 8.1 devices using Intune Company Portal website
• Ability to manage Windows Defender on Windows 10 PCs running Windows 10 Technical Preview without need for separate Microsoft
Intune Endpoint Protection agent to be installed
• Combined Microsoft Intune Company Portal websites for PCs and mobile devices to provide a more consistent user experience across
platforms
• Enhanced user interface for overview pages within Intune admin console
Hybrid configuration (ConfigMgr)
• Restrict access to Exchange Online email only if device is managed and compliant
• Ability to create custom WiFi profiles with pre-shared keys (PSK) for Android devices
Conditional access policy • Ability to restrict access to Outlook app based on device enrollment and compliance
Mobile app management
• Intune App SDK for iOS
• Intune app Wrapping tool for Android
• Support for MAM in Outlooks app
• Multi-identity
Ongoing support for
device platforms
• Support of Apple Volume Purchase Program (VPP)
• Windows 10 support
• Mac OS X support
Roadmap
Settings management
Comprehensive security
policies are enforced on
each platform
Reporting available on
each setting whether it is
applicable, conformant or
has an error
Extensive configuration
settings are available for
each platform
Policies can be applied to
user and device groups
User
Third step – Data Protection
Azure Rights Management
Azure RMS is built on…
Encryption: documents are strongly encrypted at rest, in motion and in-use
Identity and access management: user identities are used to restrict access
Policy enforcement: granular rights control (who can print/edit/save/forward)
Access logging: a document access is logged whenever and whenever it is
used
Integration
BYO Key
Sync
Azure RMS
Connector
Azure Rights Management
Native Applications and Generic
protection using Protected File (PFILE)
Custom administrator
defined policies
I can protect and share information
securely across device types
RMS Application
DEMO
The Document Tracking site
User tracks a document he sends to his staff
Summary View
Timeline View
Map View
43
User wants to revoke the document
http://blogs.technet.com/b/rms/archive/2015
/06/03/rms-protection-tool-ga.aspx
$lic = New-RMSProtectionLicense -UserEmail thomas.godsted.rysgaard@atea.dk -Permission EDIT
Protect-RMSFile -License $lic -File "C:UsersthomasDesktopConfidential"
ITUser
Enterprise
Mobility Suite
Identify and authorize
user
Apply device policies
Apply application policies
Apply content
policies
Active Directory Premium
Rights Management
aka.ms/EnterpriseMobilitySuite
Q&A
© 2014 Atea A/S. All rights reserved.
This presentation is for informational purposes only. Atea A/S makes no warranties, express or implied, in this summary.
Specialists in IT infrastructure

Contenu connexe

Tendances

IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionLai Yoong Seng
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumLai Yoong Seng
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinarSentri
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Jan Ketil Skanke
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsRobert Crane
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 releaseDavid J Rosenthal
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0Huy Pham
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 

Tendances (20)

IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 

En vedette

Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprisePeter De Tender
 
Mct summit 2013 Windows RT in the enterprise
Mct summit 2013  Windows RT in the enterpriseMct summit 2013  Windows RT in the enterprise
Mct summit 2013 Windows RT in the enterprisePeter De Tender
 
Community day the power of certification
Community day  the power of certificationCommunity day  the power of certification
Community day the power of certificationPeter De Tender
 
Mct summit na exchange 2010 sp2 - what to expect
Mct summit na   exchange 2010 sp2 - what to expectMct summit na   exchange 2010 sp2 - what to expect
Mct summit na exchange 2010 sp2 - what to expectPeter De Tender
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60minPeter De Tender
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Introducing Microsoft Office 365 E5
Introducing Microsoft Office 365  E5    Introducing Microsoft Office 365  E5
Introducing Microsoft Office 365 E5 David J Rosenthal
 

En vedette (11)

Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprise
 
Mct summit 2013 Windows RT in the enterprise
Mct summit 2013  Windows RT in the enterpriseMct summit 2013  Windows RT in the enterprise
Mct summit 2013 Windows RT in the enterprise
 
Community day the power of certification
Community day  the power of certificationCommunity day  the power of certification
Community day the power of certification
 
Mct summit na exchange 2010 sp2 - what to expect
Mct summit na   exchange 2010 sp2 - what to expectMct summit na   exchange 2010 sp2 - what to expect
Mct summit na exchange 2010 sp2 - what to expect
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60min
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Introducing Microsoft Office 365 E5
Introducing Microsoft Office 365  E5    Introducing Microsoft Office 365  E5
Introducing Microsoft Office 365 E5
 

Similaire à Get started with Microsoft Enterprise Mobility Suite

Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Nordic Infrastructure Conference
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campOlav Tvedt
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceITProceed
 
Atea ems the next level
Atea   ems the next levelAtea   ems the next level
Atea ems the next levelPer Larsen
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaBipeen Sinha
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Microsoft Education AU
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineNCCOMMS
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupJ.D. Wade
 
July 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know WebinarJuly 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know WebinarRobert Crane
 
Enterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanEnterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanDavid J Rosenthal
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 

Similaire à Get started with Microsoft Enterprise Mobility Suite (20)

Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experience
 
Atea ems the next level
Atea   ems the next levelAtea   ems the next level
Atea ems the next level
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
desktop-central-it-admin.ppt
desktop-central-it-admin.pptdesktop-central-it-admin.ppt
desktop-central-it-admin.ppt
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users Group
 
July 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know WebinarJuly 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know Webinar
 
Enterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanEnterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and Atidan
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 

Dernier

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Get started with Microsoft Enterprise Mobility Suite

  • 1. Microsoft Enterprise Mobility Suite | Getting started…
  • 2. • Introduction • What is EMS and why do you need it? • How to get started • Newly added features Agenda
  • 3. - Senior Consultant at Atea - Soon to be a father - Likes long walks on the beach…. - Email: Thomas.Godsted.Rysgaard@Atea.dk - Twitter: @thomasrysgaard Thomas Godsted Rysgaard
  • 4. What's driving change? User Devices Apps Data IT
  • 5.
  • 6.
  • 7. Enterprise Mobility Suite Azure Active Directory Premium • Hybrid Identity Control panel • Multifactor Authentication • Password Reset Microsoft Intune • Mobile and Device Management • Compliance settings • Mobile Application Management Azure Rights Management • Information Protection • Document tracking • Bring your own key
  • 8. First step - Identity Azure Active Directory Premium
  • 9.
  • 10. Self-service Single sign on ••••••••••• Username Identity as the foundation Azure AD Connect Cloud SaaS Azure Office 365Public cloud Other Directories Windows Server Active Directory On-premises Microsoft Azure Active Directory
  • 11. Azure AD Connect Consolidated deployment assistant for your identity bridge components • Express Settings • Multi-forest support • Password # Sync • Streamlined fed setup with ADFS • Configurable Sync settings DirSync Azure AD Sync FIM+Azure AD Connector Sync Engine On-boarding to Azure AD & Office 365 ADFS http://blogs.technet.com/b/ad/archive/2014/12/15/azure-ad-connect-one-simple-fast-lightweight-tool-to-connect-active-directory-and-azure-active-directory.aspx ADFS ADFS is optional, can addresses complex enterprise deployments Domain Join SSO, Enforcement of AD login policy, Smart Card or 3rd party MFA
  • 12. • Multi-factor authentication • Group-based app access • Advanced security reports and alerts • Self-service Enablement • Forefront Identity Manager (FIM) • Enterprise SLA
  • 13. A stand-alone Azure Identity and Access management service also included in Azure Active Directory Premium Prevents unauthorized access to both on-premises and cloud applications by providing an additional level of authentication Trusted by thousands of enterprises to authenticate employee, customer, and partner access. Azure Multi-factor Authentication DEMO
  • 14. Second step – Device Management Microsoft Intune
  • 15. Desktop virtualization Access & information protection Mobile device & application management Hybrid identity Simplified device enrollment and registration Single console to manage all devices Managed productivity with Office mobile apps Conditional access to corporate resources Desktop Virtualization
  • 16. Mobile devices and PCs Mobile devices System Center Configuration Manager Domain joined PCs Configuration Manager integrated with Intune (hybrid)Intune standalone (cloud only) Deployment flexibility IT IT Intune web console Configuration Manager console
  • 17. Single management console for IT admins Configuration Manager console (hybrid)Intune web console (cloud only)
  • 18. © EG A/S 18
  • 19.
  • 20. Consistent experience across: Windows Windows Phone Android iOS Discover and install corporate apps Manage devices and data Ability to contact IT Customizable terms and conditions
  • 22. Conditional access to email Policy verification ••••••••• Username Microsoft Intune Required settings defined by IT admin: Enrolled device Encrypted device Passcode set Admin console Not jailbroken/rooted IT ITUser
  • 23. Demo Conditional Access for Exchange Online (quickest demo….. In the world!)
  • 24.
  • 25. Corporate Complete mobile application management • Securely access corporate information using Office mobile apps, while preventing company data loss by restricting actions such as copy/cut/paste/save in your managed app ecosystem • Extend these capabilities to existing line of business apps using the Intune app wrapper • Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Manage all of your corporate apps and data with Intune’s mobile device and application management solution Personal Managed Browser & Viewer Apps Mobile Application Management with Microsoft Intune
  • 26. Selective wipe Personal apps Managed apps Company Portal Are you sure you want to wipe corporate data and applications from the user’s device? OK Cancel Perform selective wipe via self-service company portal or admin console Remove managed apps and data Keep personal apps and data intact ITIT
  • 27. Demo Create and Deploy Mobile Application Management Configuration
  • 28. Conditional access policy • Ability to restrict access to Exchange on-premises email based upon device enrollment • Ability to restrict access to Exchange Online email based upon device enrollment and compliance policies Mobile app management • Management of Office mobile apps (Word, Excel, PowerPoint) for iOS devices, including ability to restrict actions such as copy, cut, and paste outside of the managed app ecosystem • Ability to extend application protection to existing line-of-business apps using the Intune App Wrapping Tool for iOS • Managed Browser app for Android devices that controls actions that users can perform, including allow/deny access to specific websites • PDF Viewer, AV Player, and Image Viewer apps for Android devices that help users securely view corporate content Configuration policies and resource access • Deployment of email, WiFi, VPN profiles as well as certificates • Lockdown of Supervised iOS devices and devices using Samsung KNOX with Kiosk mode • Targeting of policies and apps by device groups • Enforcement of application install or uninstall • Convenient access to internal corporate resources via per-app VPN configurations for iOS • Application install allow/deny list • Remote pin reset for Windows Phone 8.1 (currently supported for iOS and Android) • Multi-factor authentication at enrollment for Windows 8.1 and Windows Phone 8.1 devices • Ability to restrict administrator access to a specific set of user and device groups • Ability to create configuration files using Apple Configurator and import these files into Intune to set custom iOS policies • Lockdown of Windows Phone 8.1 devices with Assigned Access mode using OMA-URI settings • Ability to set additional policies on Windows Phone 8.1 devices using OMA-URI settings Ongoing support for device platforms • Service account enrollment • Customizable terms and conditions • Enhanced user interface for Intune administration console • Ability to push free store apps to iOS devices • Support for Apple Configurator
  • 29. Conditional access policy • Ability to restrict access to SharePoint Online (includes OneDrive for Business) based upon device enrollment and compliance • Ability to restrict access to Exchange on-premises for Exchange ActiveSync clients on Android devices Mobile app management • Management of the Office Mobile app (access, view, and edit Word, Excel, and PowerPoint documents) for Android phones • Management of OneNote and OneDrive apps • Management of Work Folders app for iOS devices Configuration policies and resource access • Ability to require encryption on Windows 8.1 (x86) devices • Ability to set minimum classification of platform updates to be installed automatically on Windows 8.1 (x86) devices • Ability to restrict the number of devices a user can enroll in Intune • Support for Cisco AnyConnect per-app VPN configurations for iOS devices • Deployment of WiFi profiles for Windows devices using XML import and Windows Phone devices using OMA-URI (currently supported for iOS and Android) • Ability to create WiFi profiles with pre-shared keys (PSK) for Android devices • Ability to resolve certificate chains on Android devices without the need to deploy each intermediate certificate individually • Ability to deploy .appx files and .appx bundles to Windows Phone 8.1 devices Ongoing support for device platforms • Support for Apple Device Enrollment Program (DEP) • Ability to browse and install apps on Windows Phone 8.1 devices using Intune Company Portal website • Ability to manage Windows Defender on Windows 10 PCs running Windows 10 Technical Preview without need for separate Microsoft Intune Endpoint Protection agent to be installed • Combined Microsoft Intune Company Portal websites for PCs and mobile devices to provide a more consistent user experience across platforms • Enhanced user interface for overview pages within Intune admin console Hybrid configuration (ConfigMgr) • Restrict access to Exchange Online email only if device is managed and compliant • Ability to create custom WiFi profiles with pre-shared keys (PSK) for Android devices
  • 30. Conditional access policy • Ability to restrict access to Outlook app based on device enrollment and compliance Mobile app management • Intune App SDK for iOS • Intune app Wrapping tool for Android • Support for MAM in Outlooks app • Multi-identity Ongoing support for device platforms • Support of Apple Volume Purchase Program (VPP) • Windows 10 support • Mac OS X support Roadmap
  • 31.
  • 32. Settings management Comprehensive security policies are enforced on each platform Reporting available on each setting whether it is applicable, conformant or has an error Extensive configuration settings are available for each platform Policies can be applied to user and device groups User
  • 33. Third step – Data Protection Azure Rights Management
  • 34. Azure RMS is built on… Encryption: documents are strongly encrypted at rest, in motion and in-use Identity and access management: user identities are used to restrict access Policy enforcement: granular rights control (who can print/edit/save/forward) Access logging: a document access is logged whenever and whenever it is used
  • 36. Native Applications and Generic protection using Protected File (PFILE) Custom administrator defined policies I can protect and share information securely across device types RMS Application DEMO
  • 38. User tracks a document he sends to his staff
  • 42. 43 User wants to revoke the document
  • 43.
  • 44. http://blogs.technet.com/b/rms/archive/2015 /06/03/rms-protection-tool-ga.aspx $lic = New-RMSProtectionLicense -UserEmail thomas.godsted.rysgaard@atea.dk -Permission EDIT Protect-RMSFile -License $lic -File "C:UsersthomasDesktopConfidential"
  • 45. ITUser Enterprise Mobility Suite Identify and authorize user Apply device policies Apply application policies Apply content policies Active Directory Premium Rights Management
  • 47. Q&A
  • 48. © 2014 Atea A/S. All rights reserved. This presentation is for informational purposes only. Atea A/S makes no warranties, express or implied, in this summary. Specialists in IT infrastructure