SlideShare a Scribd company logo
Microsoft Cloud Security
Fundamentals
Presented by JD Wade, Lead Technical Architect
Developed by Michael Weber, Cloud Solution Architect
Members of Horizons Consulting, Inc.
Test, Test, Test
• Get a test tenant
• Setup a test Active Directory
• Setup a test Azure AD Connect
• Setup a test AD FS (if needed)
Goals
• Maximize security posture with existing licenses
• Align with Microsoft’s way forward for cloud security
• Eliminate legacy security vulnerabilities
Unregulated,
unknown
Managed mobile
environment
How much control
do YOU have?
On-premises
Perimeter
protection
Identity, device
management protection
Hybrid data = new normal
It is harder to protect
Adopt Cloud Security Standards
• Only Allow Secure Authentication
• Only Allow Trusted Devices
• Classify, Protect and Limit Retention
• Establish Single Sign-On (SSO)
• Breach Monitoring and Reporting
Cloud Security Scenarios
Microsoft Secure Score
Only Allow Secure (Modern) Authentication
by Disabling Legacy (Basic) Authentication
Problems with Legacy Authentication
• Password is sent repeatedly, for each request (larger attack
window)
• Password is cached by the web browser
• Password may be stored permanently in the browser
• Vulnerable to man-in-the-middle SSL exploit
• Access cannot be security trimmed
Problems with Legacy Authentication
• Worked well behind corporate firewall but present many security
issues for cloud access
• Legacy protocols can circumvent security conditional access
settings and should be disabled. For example:
• POP3 and IMAP circumvent Intune conditional access to Exchange
• Azure AD conditional access is not supported with Basic Authentication
• Exchange Active Sync relies on Basic Authentication
Modern Authentication
• Modern Authentication allows customers to enable many modern security
features, such as Azure Active Directory Conditional Access or multi-
factor authentication.
• Authentication using Azure AD
• Leverages token based authentication (OAuth)
• Tokens and not passwords sent
• Access can be security trimmed
• Validation can be done by 3rd Party
• Access token has limited Time-To-Live (1 hour)
• Access can be revoked
• Applications must be written to support Modern Authentication
• Microsoft automation tools almost finished transitioning to Modern Auth
(PowerShell)
• It is Microsoft’s way forward for secure cloud access
Service Preparation
• SharePoint & OneDrive for Business: On by default
• Exchange Online: Off by default
• Skype for Business: Off by default
Client Preparation
• Desktop Office 2013 (GPO enabled but out of support in 2018)
• Desktop Office 2016
• Example Mobile Apps
• Outlook Mobile
• SharePoint & OneDrive
• Word / PowerPoint / Excel
• Workday, Salesforce and etc.
• Unsupported
• Desktop Office 2010
• Native Email Clients (except for IOS 11+ Native Mail)
• Exchange Activesync
Multifactor Authentication
• By default, organizations cannot leverage MFA despite being
licensed.
• Without it, susceptible to phishing attacks and stolen credentials.
• Services must be configured and clients must be deployed in order
to support MFA enablement (Modern Authentication clients).
• Can be based on IP location (on or off corporate network).
• Globally enabling MFA will disable Exchange Activesync
Only Allow Trusted Devices
The Problem: Unknown Devices
AAD Registration
• AAD can block based on “status” of the device
• Is the device known (registered with Azure AD)
• Examples
• Block all untrusted devices (non-AAD registered)
• Only allow OneDrive syncing on devices joined to certain
domains
• Block OWA on personal devices
AAD Registration vs AAD Domain Join
IMPORTANT: AAD Registration is NOT AAD Domain Join
• Both
• Device identity and authentication
• Device-based conditional access for ADFS, AAD and Intune MDM
• Provide SSO to cloud applications
• Provide strong authentication with AAD (Microsoft Passport)
• AAD Domain Join:
• Cannot be local AD joined and AAD Domain Joined
• Automatic Intune MDM Enrollment
• BitLocker Recovery Key in AAD
• Targets temporary, remote and BYOD (or organizations without local AD)
• Self-Service Password Reset on Windows Logon
• AutoPilot
Unlocking Modern Management
Automatic Device Registration
Platform Steps
Windows 10
Windows Server 2016
Non-ADFS: Automatically synced via AD Connect.
ADFS Scenarios: Use a Group Policy.
Registration will then occur in the next reboot or user sign-in to
Windows.
Windows 7
Windows 8.0
Windows 8.1
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Must be federated (ADFS).
Windows Installer package needs to be deployed to other older
computers (SCCM).
Task silently registers device.
Advantages of AAD Registration
• Device-based conditional access (Known devices only!)
• Device certificate-based authentication MFA
• Block device access
• User & device affinity
• Desktop SSO
• Registration MFA
• Detailed reporting and tracking (Microsoft Security Graph)
?
Requirement Corporate PC External PC
Authentication Kerberos
Certificate(s)
• Modern Authentication with MFA
• Weak authentication still possible
(EAS and Basic Auth)
Domain Join Local Domain Join
(AAD Device Registered)
None or possibly AAD Device Registered
Device Health Group Policies / SCCM / SCOM Unknown
Device Security Group Policies / SCCM
• Firewall
• Antivirus
• PIN/Password Complexity
• Device / Credential / Application Guard
Unknown
Updates WSUS/SCCM Unknown
Applications Group Policies / SCCM Unknown
Onboarding Imaging / Wipe & Load
Provisioning Packages
Unknown
?
?
• Create a Better End User Experience
• Enroll one time versus PIN every time
• Install apps automatically (Outlook, Authenticator, AIP, SharePoint)
• Advertise apps
• Zero touch configuration
• Company support info and branding
• Multiple Platform Support
• White/Black Listing Apps
• Security Hardening and Stolen Device Support
• Better Lifecycle Check-ins than MAM
• Deep Cloud Security Conditional Access (AIP/MCAS/DLP/Azure AD)
• Deep O365 Conditional Access (SharePoint/OneDrive/Exchange)
• Innovation from Apple and Google
Requirement Corporate PC Personal PC with Intune MDM
Authentication Kerberos
Certificate(s)
• AAD Modern Auth
• AAD Device Cert / NDES Certificate(s)
Domain Join Local Domain Join
(AAD Device Registered)
AAD Domain Join
(AAD Device Registered)
Device Health Group Policies / SCCM / SCOM • AAD Reports
• Device Attestation
(Firewall, Antivirus, Encryption)
Device Security Group Policies / SCCM
• Firewall
• Antivirus
• PIN/Password Complexity
• Device / Credential / Application Guard
• Windows Defender
• BitLocker (CSPs)
• PIN/Password Complexity
• Windows Hello
• Application Guard
• Windows Information Protection
Updates WSUS/SCCM Windows Update for Business
Applications Group Policies / SCCM • Windows Store
• MSI Deployments
Onboarding Imaging / Wipe & Load
Provisioning Packages
Company Portal / OOBE / AutoPilot
Provisioning Packages
Intune Mobile Device Management
Enroll
• Provide a self-service Company
Portal for users to enroll devices
• Deliver custom terms and
conditions at enrollment
• Bulk enroll devices using Apple
Configurator or service account
• Restrict access to Exchange
email if a device is not enrolled
Retire
• Revoke access to corporate
resources
• Perform selective wipe
• Audit lost and stolen devices
Provision
• Deploy certificates, email, VPN,
and WiFi profiles
• Deploy device security policy
settings
• Install mandatory apps
• Deploy app restriction policies
• Deploy data protection policies
Manage and Protect
• Restrict access to corporate
resources if policies are violated
(e.g., jailbroken device)
• Protect corporate data by
restricting actions such as copy, cut,
paste, and save as between Intune-
managed apps and personal apps
• Report on device and app
compliance
User IT
Conditional Access for Office 365
7
5
4
2
1
3
6
• User Convenience (SSO, roaming, less MFA)
• Conditional Access Integration
• Device Authentication (Another MFA)
• Always On Protection (on or off corporate network)
• Breach Prevention, Detection and Response
• Password-less Authentication (Biometrics)
• Device Health Attestation
• Wake of Innovation
Enforce corporate data
access requirements
Prevent data leakage
on the device
Enforce encryption
of app data at rest
App-level
selective wipe
Azure AD Join makes it possible to connect
work-owned Windows 10 devices to your
company’s Azure Active Directory.
With Azure AD Join, you can auto enroll
devices in Microsoft Intune for management.
Azure AD Join for Windows 10
Windows 10 Azure AD
Joined Devices
Intune/MDM
auto enrollment
Intune auto enrollment
Enterprise-compliant strong auth /
services / CA
Support for hybrid environments
Single sign-on from the desktop to cloud
and on-premises applications with no VPN
Windows 10 Cloud Integration
Windows 10 + Intune MDM
• Selective Wipe and Remote Management
• Auto-Registration and Auto-Enrollment
• AAD Conditional Access
• Policies
• Windows Defender
• Windows Hello for Business
• Windows Update for Business
• Windows Information Protection
• Deploy applications and MSIs
• Upgrade Windows 10
• BitLocker Management
• Device Health Attestation
Classify, Protect and Limit Retention
Reasons to Classify and Protect
• Identify and label sensitive data
• Track data type locations &
repositories
• Protect data in-transit and at rest
• Auditing and eDiscovery
Azure Information Protection
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
Respond
LABELINGCLASSIFICATION
Classify &
Label
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Data Loss Prevention
• Cloud detection of users sharing Exchange, SharePoint and OneDrive content
• Generate reports to track users who shared info
• Leverage the 80+ sensitivity types and other types (18 apply to GDPR)
• Policy tips who share sensitive information
• Email alerts when data is shared
• Detect AIP metadata classification using custom sensitivity types
Protecting data, identities, and devices using a 3-tier approach
Establish SSO
ADFS
Authentication occurs on-premises
Single Check-Point for security
Conditional access based on:
• User identity or group membership
• Network location
• Device (domain joined)
• Authentication state (MFA)
Azure AD Conditional Access
Requires Azure AD Premium (EMS).
Legacy authentication not supported (Basic Auth, EAS, POP3, IMAP).
Azure AD as the Control Plane
Azure Application Proxy
Breach Monitoring and Reporting
Cloud Monitoring
• AAD Reports
• Intune MDM and MAM Reports
• Power BI + Graph API Reports
• Exchange, SharePoint and OneDrive
Monitoring
• O365 Alerts, DLP Reports, Threat
Intelligence, Audit Log and Content Search
• AIP Tracking Portal
• Advanced Threat Protection
• Log Analytics
Microsoft Security Graph
Enterprise Mobility +Security
Microsoft
Intune
Azure Information
Protection
Protect your users,
devices, and apps
Detect threats early
with visibility and
threat analytics
Protect your data,
everywhere
Manage identity with hybrid
integration to protect application
access from identity attacks
Microsoft
Advanced Threat Analytics
Azure Active Directory
Premium
Broad Scope
Limited Scope
What to implement first? Questions?
File Classification & Protection
Azure Information Protection, Data Loss Prevention,
CASB
Trusted Identity
(Active Directory + Azure Active Directory), Single Sign-On, Azure MFA, Modern Auth
Trusted Devices
Corporate PC’s, Azure AD Registration, Intune MDM Enrolled
Trusted Cloud Applications
Azure AD for Cloud Apps + Conditional Access policies (e.g. – Box)
Trusted Cloud Applications
Azure AD for Cloud Apps + Conditional Access policies
Trusted Native Applications
Intune MAM + Office Mobile Apps
Azure AD is the Control Plane

More Related Content

What's hot

Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
AgileIT
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
David J Rosenthal
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
Peter De Tender
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft Azure
Sparkhound Inc.
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
Huy Pham
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
Olav Tvedt
 
Azure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD DeploymentAzure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD Deployment
Anthony Clendenen
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional access
Tad Yoke
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
Peter Daalmans
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
Gerard Konan
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
InTTrust S.A.
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
David J Rosenthal
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
Microsoft Education AU
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
Microsoft
 
1 modern desktop - shift to a modern desktop
1   modern desktop - shift to a modern desktop1   modern desktop - shift to a modern desktop
1 modern desktop - shift to a modern desktop
Andrew Bettany
 

What's hot (20)

Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft Azure
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
Azure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD DeploymentAzure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD Deployment
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional access
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
1 modern desktop - shift to a modern desktop
1   modern desktop - shift to a modern desktop1   modern desktop - shift to a modern desktop
1 modern desktop - shift to a modern desktop
 

Similar to Cloud Security Fundamentals - St. Louis O365 Users Group

Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Kenny Buntinx
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
Kumton Suttiraksiri
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
MVP Dagen
 
Citrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseCitrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile Enterprise
Digicomp Academy AG
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Max Fritz
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
Olav Tvedt
 
AzureAAD
AzureAADAzureAAD
AzureAAD
TonyHotko
 
20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium
Robin Vermeirsch
 
Azure AD Options
Azure AD OptionsAzure AD Options
Azure AD Options
Prem Kumar
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
Thomas Godsted Rysgaard
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
Ronny de Jong
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
Alert Logic
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
NCCOMMS
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?
Olav Tvedt
 
Atea ems roadshow - windows 10 management i en cloud first world
Atea   ems roadshow - windows 10 management i en cloud first worldAtea   ems roadshow - windows 10 management i en cloud first world
Atea ems roadshow - windows 10 management i en cloud first world
Per Larsen
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
BizTalk360
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivity
Diana Carolina Torres Viasus
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
kovec2684
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 

Similar to Cloud Security Fundamentals - St. Louis O365 Users Group (20)

Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Citrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseCitrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile Enterprise
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium
 
Azure AD Options
Azure AD OptionsAzure AD Options
Azure AD Options
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?
 
Atea ems roadshow - windows 10 management i en cloud first world
Atea   ems roadshow - windows 10 management i en cloud first worldAtea   ems roadshow - windows 10 management i en cloud first world
Atea ems roadshow - windows 10 management i en cloud first world
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivity
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 

More from J.D. Wade

What SharePoint Admins need to know about SQL-Cinncinati
What SharePoint Admins need to know about SQL-CinncinatiWhat SharePoint Admins need to know about SQL-Cinncinati
What SharePoint Admins need to know about SQL-Cinncinati
J.D. Wade
 
Connected at the hip for MS BI: SharePoint and SQL
Connected at the hip for MS BI: SharePoint and SQLConnected at the hip for MS BI: SharePoint and SQL
Connected at the hip for MS BI: SharePoint and SQL
J.D. Wade
 
Kerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointaloozaKerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointalooza
J.D. Wade
 
What SQL DBA's need to know about SharePoint
What SQL DBA's need to know about SharePointWhat SQL DBA's need to know about SharePoint
What SQL DBA's need to know about SharePoint
J.D. Wade
 
Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015
J.D. Wade
 
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
J.D. Wade
 
Kerberos survival guide-STL 2015
Kerberos survival guide-STL 2015Kerberos survival guide-STL 2015
Kerberos survival guide-STL 2015
J.D. Wade
 
SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...
SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...
SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...
J.D. Wade
 
SPS St. Louis: SharePoint 2013 upgrades: Notes from the Field
SPS St. Louis: SharePoint 2013 upgrades: Notes from the FieldSPS St. Louis: SharePoint 2013 upgrades: Notes from the Field
SPS St. Louis: SharePoint 2013 upgrades: Notes from the Field
J.D. Wade
 
SharePoint Saturday Kansas City - SharePoint 2013's Dirty Little Secrets
SharePoint Saturday Kansas City - SharePoint 2013's Dirty Little SecretsSharePoint Saturday Kansas City - SharePoint 2013's Dirty Little Secrets
SharePoint Saturday Kansas City - SharePoint 2013's Dirty Little Secrets
J.D. Wade
 
SharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival GuideSharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival Guide
J.D. Wade
 
SPS Kansas City: What SharePoint Admin need to know about SQL
SPS Kansas City: What SharePoint Admin need to know about SQLSPS Kansas City: What SharePoint Admin need to know about SQL
SPS Kansas City: What SharePoint Admin need to know about SQL
J.D. Wade
 
Horizons' Event: SharePoint 2013 upgrades-Notes from the Field
Horizons' Event: SharePoint 2013 upgrades-Notes from the FieldHorizons' Event: SharePoint 2013 upgrades-Notes from the Field
Horizons' Event: SharePoint 2013 upgrades-Notes from the Field
J.D. Wade
 
What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013
What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013
What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013
J.D. Wade
 
What SQL DBAs need to know about SharePoint-Indianapolis 2013
What SQL DBAs need to know about SharePoint-Indianapolis 2013What SQL DBAs need to know about SharePoint-Indianapolis 2013
What SQL DBAs need to know about SharePoint-Indianapolis 2013
J.D. Wade
 
What SQL DBA's need to know about SharePoint-St. Louis 2013
What SQL DBA's need to know about SharePoint-St. Louis 2013What SQL DBA's need to know about SharePoint-St. Louis 2013
What SQL DBA's need to know about SharePoint-St. Louis 2013
J.D. Wade
 
SPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival GuideSPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival Guide
J.D. Wade
 
Kerberos survival guide SPS Kansas City
Kerberos survival guide SPS Kansas CityKerberos survival guide SPS Kansas City
Kerberos survival guide SPS Kansas City
J.D. Wade
 
Kerberos Survival Guide SPS Chicago
Kerberos Survival Guide SPS ChicagoKerberos Survival Guide SPS Chicago
Kerberos Survival Guide SPS Chicago
J.D. Wade
 
Kerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .NetKerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .Net
J.D. Wade
 

More from J.D. Wade (20)

What SharePoint Admins need to know about SQL-Cinncinati
What SharePoint Admins need to know about SQL-CinncinatiWhat SharePoint Admins need to know about SQL-Cinncinati
What SharePoint Admins need to know about SQL-Cinncinati
 
Connected at the hip for MS BI: SharePoint and SQL
Connected at the hip for MS BI: SharePoint and SQLConnected at the hip for MS BI: SharePoint and SQL
Connected at the hip for MS BI: SharePoint and SQL
 
Kerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointaloozaKerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointalooza
 
What SQL DBA's need to know about SharePoint
What SQL DBA's need to know about SharePointWhat SQL DBA's need to know about SharePoint
What SQL DBA's need to know about SharePoint
 
Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015
 
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
 
Kerberos survival guide-STL 2015
Kerberos survival guide-STL 2015Kerberos survival guide-STL 2015
Kerberos survival guide-STL 2015
 
SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...
SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...
SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...
 
SPS St. Louis: SharePoint 2013 upgrades: Notes from the Field
SPS St. Louis: SharePoint 2013 upgrades: Notes from the FieldSPS St. Louis: SharePoint 2013 upgrades: Notes from the Field
SPS St. Louis: SharePoint 2013 upgrades: Notes from the Field
 
SharePoint Saturday Kansas City - SharePoint 2013's Dirty Little Secrets
SharePoint Saturday Kansas City - SharePoint 2013's Dirty Little SecretsSharePoint Saturday Kansas City - SharePoint 2013's Dirty Little Secrets
SharePoint Saturday Kansas City - SharePoint 2013's Dirty Little Secrets
 
SharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival GuideSharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival Guide
 
SPS Kansas City: What SharePoint Admin need to know about SQL
SPS Kansas City: What SharePoint Admin need to know about SQLSPS Kansas City: What SharePoint Admin need to know about SQL
SPS Kansas City: What SharePoint Admin need to know about SQL
 
Horizons' Event: SharePoint 2013 upgrades-Notes from the Field
Horizons' Event: SharePoint 2013 upgrades-Notes from the FieldHorizons' Event: SharePoint 2013 upgrades-Notes from the Field
Horizons' Event: SharePoint 2013 upgrades-Notes from the Field
 
What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013
What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013
What SQL DBAs need to know about SharePoint-Kansas City, Sept 2013
 
What SQL DBAs need to know about SharePoint-Indianapolis 2013
What SQL DBAs need to know about SharePoint-Indianapolis 2013What SQL DBAs need to know about SharePoint-Indianapolis 2013
What SQL DBAs need to know about SharePoint-Indianapolis 2013
 
What SQL DBA's need to know about SharePoint-St. Louis 2013
What SQL DBA's need to know about SharePoint-St. Louis 2013What SQL DBA's need to know about SharePoint-St. Louis 2013
What SQL DBA's need to know about SharePoint-St. Louis 2013
 
SPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival GuideSPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival Guide
 
Kerberos survival guide SPS Kansas City
Kerberos survival guide SPS Kansas CityKerberos survival guide SPS Kansas City
Kerberos survival guide SPS Kansas City
 
Kerberos Survival Guide SPS Chicago
Kerberos Survival Guide SPS ChicagoKerberos Survival Guide SPS Chicago
Kerberos Survival Guide SPS Chicago
 
Kerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .NetKerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .Net
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Cloud Security Fundamentals - St. Louis O365 Users Group

  • 1. Microsoft Cloud Security Fundamentals Presented by JD Wade, Lead Technical Architect Developed by Michael Weber, Cloud Solution Architect Members of Horizons Consulting, Inc.
  • 2. Test, Test, Test • Get a test tenant • Setup a test Active Directory • Setup a test Azure AD Connect • Setup a test AD FS (if needed)
  • 3. Goals • Maximize security posture with existing licenses • Align with Microsoft’s way forward for cloud security • Eliminate legacy security vulnerabilities
  • 4. Unregulated, unknown Managed mobile environment How much control do YOU have? On-premises Perimeter protection Identity, device management protection Hybrid data = new normal It is harder to protect
  • 5. Adopt Cloud Security Standards • Only Allow Secure Authentication • Only Allow Trusted Devices • Classify, Protect and Limit Retention • Establish Single Sign-On (SSO) • Breach Monitoring and Reporting
  • 8. Only Allow Secure (Modern) Authentication by Disabling Legacy (Basic) Authentication
  • 9. Problems with Legacy Authentication • Password is sent repeatedly, for each request (larger attack window) • Password is cached by the web browser • Password may be stored permanently in the browser • Vulnerable to man-in-the-middle SSL exploit • Access cannot be security trimmed
  • 10. Problems with Legacy Authentication • Worked well behind corporate firewall but present many security issues for cloud access • Legacy protocols can circumvent security conditional access settings and should be disabled. For example: • POP3 and IMAP circumvent Intune conditional access to Exchange • Azure AD conditional access is not supported with Basic Authentication • Exchange Active Sync relies on Basic Authentication
  • 11. Modern Authentication • Modern Authentication allows customers to enable many modern security features, such as Azure Active Directory Conditional Access or multi- factor authentication. • Authentication using Azure AD • Leverages token based authentication (OAuth) • Tokens and not passwords sent • Access can be security trimmed • Validation can be done by 3rd Party • Access token has limited Time-To-Live (1 hour) • Access can be revoked • Applications must be written to support Modern Authentication • Microsoft automation tools almost finished transitioning to Modern Auth (PowerShell) • It is Microsoft’s way forward for secure cloud access
  • 12. Service Preparation • SharePoint & OneDrive for Business: On by default • Exchange Online: Off by default • Skype for Business: Off by default
  • 13. Client Preparation • Desktop Office 2013 (GPO enabled but out of support in 2018) • Desktop Office 2016 • Example Mobile Apps • Outlook Mobile • SharePoint & OneDrive • Word / PowerPoint / Excel • Workday, Salesforce and etc. • Unsupported • Desktop Office 2010 • Native Email Clients (except for IOS 11+ Native Mail) • Exchange Activesync
  • 14. Multifactor Authentication • By default, organizations cannot leverage MFA despite being licensed. • Without it, susceptible to phishing attacks and stolen credentials. • Services must be configured and clients must be deployed in order to support MFA enablement (Modern Authentication clients). • Can be based on IP location (on or off corporate network). • Globally enabling MFA will disable Exchange Activesync
  • 17. AAD Registration • AAD can block based on “status” of the device • Is the device known (registered with Azure AD) • Examples • Block all untrusted devices (non-AAD registered) • Only allow OneDrive syncing on devices joined to certain domains • Block OWA on personal devices
  • 18. AAD Registration vs AAD Domain Join IMPORTANT: AAD Registration is NOT AAD Domain Join • Both • Device identity and authentication • Device-based conditional access for ADFS, AAD and Intune MDM • Provide SSO to cloud applications • Provide strong authentication with AAD (Microsoft Passport) • AAD Domain Join: • Cannot be local AD joined and AAD Domain Joined • Automatic Intune MDM Enrollment • BitLocker Recovery Key in AAD • Targets temporary, remote and BYOD (or organizations without local AD) • Self-Service Password Reset on Windows Logon • AutoPilot
  • 20. Automatic Device Registration Platform Steps Windows 10 Windows Server 2016 Non-ADFS: Automatically synced via AD Connect. ADFS Scenarios: Use a Group Policy. Registration will then occur in the next reboot or user sign-in to Windows. Windows 7 Windows 8.0 Windows 8.1 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Must be federated (ADFS). Windows Installer package needs to be deployed to other older computers (SCCM). Task silently registers device.
  • 21. Advantages of AAD Registration • Device-based conditional access (Known devices only!) • Device certificate-based authentication MFA • Block device access • User & device affinity • Desktop SSO • Registration MFA • Detailed reporting and tracking (Microsoft Security Graph)
  • 22. ?
  • 23. Requirement Corporate PC External PC Authentication Kerberos Certificate(s) • Modern Authentication with MFA • Weak authentication still possible (EAS and Basic Auth) Domain Join Local Domain Join (AAD Device Registered) None or possibly AAD Device Registered Device Health Group Policies / SCCM / SCOM Unknown Device Security Group Policies / SCCM • Firewall • Antivirus • PIN/Password Complexity • Device / Credential / Application Guard Unknown Updates WSUS/SCCM Unknown Applications Group Policies / SCCM Unknown Onboarding Imaging / Wipe & Load Provisioning Packages Unknown
  • 24. ?
  • 25. ?
  • 26. • Create a Better End User Experience • Enroll one time versus PIN every time • Install apps automatically (Outlook, Authenticator, AIP, SharePoint) • Advertise apps • Zero touch configuration • Company support info and branding • Multiple Platform Support • White/Black Listing Apps • Security Hardening and Stolen Device Support • Better Lifecycle Check-ins than MAM • Deep Cloud Security Conditional Access (AIP/MCAS/DLP/Azure AD) • Deep O365 Conditional Access (SharePoint/OneDrive/Exchange) • Innovation from Apple and Google
  • 27. Requirement Corporate PC Personal PC with Intune MDM Authentication Kerberos Certificate(s) • AAD Modern Auth • AAD Device Cert / NDES Certificate(s) Domain Join Local Domain Join (AAD Device Registered) AAD Domain Join (AAD Device Registered) Device Health Group Policies / SCCM / SCOM • AAD Reports • Device Attestation (Firewall, Antivirus, Encryption) Device Security Group Policies / SCCM • Firewall • Antivirus • PIN/Password Complexity • Device / Credential / Application Guard • Windows Defender • BitLocker (CSPs) • PIN/Password Complexity • Windows Hello • Application Guard • Windows Information Protection Updates WSUS/SCCM Windows Update for Business Applications Group Policies / SCCM • Windows Store • MSI Deployments Onboarding Imaging / Wipe & Load Provisioning Packages Company Portal / OOBE / AutoPilot Provisioning Packages
  • 28. Intune Mobile Device Management Enroll • Provide a self-service Company Portal for users to enroll devices • Deliver custom terms and conditions at enrollment • Bulk enroll devices using Apple Configurator or service account • Restrict access to Exchange email if a device is not enrolled Retire • Revoke access to corporate resources • Perform selective wipe • Audit lost and stolen devices Provision • Deploy certificates, email, VPN, and WiFi profiles • Deploy device security policy settings • Install mandatory apps • Deploy app restriction policies • Deploy data protection policies Manage and Protect • Restrict access to corporate resources if policies are violated (e.g., jailbroken device) • Protect corporate data by restricting actions such as copy, cut, paste, and save as between Intune- managed apps and personal apps • Report on device and app compliance User IT
  • 29. Conditional Access for Office 365 7 5 4 2 1 3 6
  • 30. • User Convenience (SSO, roaming, less MFA) • Conditional Access Integration • Device Authentication (Another MFA) • Always On Protection (on or off corporate network) • Breach Prevention, Detection and Response • Password-less Authentication (Biometrics) • Device Health Attestation • Wake of Innovation
  • 31. Enforce corporate data access requirements Prevent data leakage on the device Enforce encryption of app data at rest App-level selective wipe
  • 32. Azure AD Join makes it possible to connect work-owned Windows 10 devices to your company’s Azure Active Directory. With Azure AD Join, you can auto enroll devices in Microsoft Intune for management. Azure AD Join for Windows 10 Windows 10 Azure AD Joined Devices Intune/MDM auto enrollment Intune auto enrollment Enterprise-compliant strong auth / services / CA Support for hybrid environments Single sign-on from the desktop to cloud and on-premises applications with no VPN Windows 10 Cloud Integration
  • 33.
  • 34. Windows 10 + Intune MDM • Selective Wipe and Remote Management • Auto-Registration and Auto-Enrollment • AAD Conditional Access • Policies • Windows Defender • Windows Hello for Business • Windows Update for Business • Windows Information Protection • Deploy applications and MSIs • Upgrade Windows 10 • BitLocker Management • Device Health Attestation
  • 35. Classify, Protect and Limit Retention
  • 36. Reasons to Classify and Protect • Identify and label sensitive data • Track data type locations & repositories • Protect data in-transit and at rest • Auditing and eDiscovery
  • 37. Azure Information Protection DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & Respond LABELINGCLASSIFICATION Classify & Label ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT
  • 38. Data Loss Prevention • Cloud detection of users sharing Exchange, SharePoint and OneDrive content • Generate reports to track users who shared info • Leverage the 80+ sensitivity types and other types (18 apply to GDPR) • Policy tips who share sensitive information • Email alerts when data is shared • Detect AIP metadata classification using custom sensitivity types
  • 39. Protecting data, identities, and devices using a 3-tier approach
  • 41. ADFS Authentication occurs on-premises Single Check-Point for security Conditional access based on: • User identity or group membership • Network location • Device (domain joined) • Authentication state (MFA)
  • 42. Azure AD Conditional Access Requires Azure AD Premium (EMS). Legacy authentication not supported (Basic Auth, EAS, POP3, IMAP).
  • 43. Azure AD as the Control Plane
  • 46. Cloud Monitoring • AAD Reports • Intune MDM and MAM Reports • Power BI + Graph API Reports • Exchange, SharePoint and OneDrive Monitoring • O365 Alerts, DLP Reports, Threat Intelligence, Audit Log and Content Search • AIP Tracking Portal • Advanced Threat Protection • Log Analytics
  • 48. Enterprise Mobility +Security Microsoft Intune Azure Information Protection Protect your users, devices, and apps Detect threats early with visibility and threat analytics Protect your data, everywhere Manage identity with hybrid integration to protect application access from identity attacks Microsoft Advanced Threat Analytics Azure Active Directory Premium
  • 49. Broad Scope Limited Scope What to implement first? Questions? File Classification & Protection Azure Information Protection, Data Loss Prevention, CASB Trusted Identity (Active Directory + Azure Active Directory), Single Sign-On, Azure MFA, Modern Auth Trusted Devices Corporate PC’s, Azure AD Registration, Intune MDM Enrolled Trusted Cloud Applications Azure AD for Cloud Apps + Conditional Access policies (e.g. – Box) Trusted Cloud Applications Azure AD for Cloud Apps + Conditional Access policies Trusted Native Applications Intune MAM + Office Mobile Apps Azure AD is the Control Plane

Editor's Notes

  1. Security is a blurred line between Office 365 features, Azure AD features, many other security products, Enterprise Mobility Suite, and Microsoft 365. My goal is to equip you to be able to choose priorities and to help you make purchasing decisions
  2. Less MFA – if on a trusted device, no MFA Less Passwords – Trusted Applications SSO, Trusted Devices Desktop SSO Less VPN – Trusted Application proxies Always On – Intune MDM DLP Training -
  3. Password is cached by the web browser, at a minimum for the length of the window / process. (Can be silently reused by any other request to the server, e.g. CSRF). Password may be stored permanently in the browser, if the user requests. (Same as previous point, in addition might be stolen by another user on a shared machine). Access cannot be security trimmed. With Basic Auth, your account is either enabled or disabled. With Oauth, a token containing access claims can be sent and processed by application.
  4. Goal is the AAD Registered + Local AD Joined: https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access#device-based-conditional-access
  5. ADFS - Is Registered User - Azure AD Premium for Device Writeback - Is Local Domain Joined - Security Group AAD - AAD Conditional Access: Registered and locally domain joined Intune MDM - Registered with O365 services Microsoft Passport is a key based authentication system built into Windows 10. To use Microsoft Passport users create a gesture that they use to login to their Windows 10 device. The user gesture unlocks the device and it’s TPM. The TPM protects a private key that is used to sign authentication requests to Azure AD, eliminating the need to authenticate using a password.
  6. Conditional Access – only allow domain joined and/or compliant PCs.
  7. Domain Join @RuleName = "Issue account type for domain-joined computers" c:[ Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value =~ "-515$", Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$" ] => issue( Type = "http://schemas.microsoft.com/ws/2012/01/accounttype", Value = "DJ" );
  8. The user accesses the application through the Application Proxy service and is directed to the Azure AD sign-in page to authenticate. After a successful sign-in, a token is generated and sent to the client device. The client sends the token to the Application Proxy service, which retrieves the user principal name (UPN) and security principal name (SPN) from the token, then directs the request to the Application Proxy connector. If you have configured single sign-on, the connector performs any additional authentication required on behalf of the user. The connector sends the request to the on-premises application. The response is sent through Application Proxy service and connector to the user.