SlideShare a Scribd company logo
Exploring Conditional Access to
content in Office 365
Paul Hunt
SharePoint Saturday Central Europe 31.08.2019
#SPSCentralEurope
A big thank you to our sponsors!
Who am I?
Who am I?
What is this session about?
Access Layers in Microsoft 365
Encryption
RBAC
Conditional Access
Azure AD PIM
PAM in Office 365
Prevent unauthorized
illegitimate access
Govern
legitimate
access
Role & risk based
Standing access
(Permissions)
JIT & JEA
With Approval
(Elevation of Privilege)
RBAC & Conditional Access
RBAC
Conditional Access
Role & risk based
Standing access
(Permissions)
Access Reviews
&
Conditional Access
Govern
legitimate
access
Authentication Versus Authorisation
Authentication Versus Authorisation
When are they accessing?
What do we mean by conditional access?
When are they accessing?
What do we mean by conditional access?
When are they accessing?
What do we mean by conditional access?
Additional options – EM+S E5
Additional options EM+S
What can be achieved with ADFS
What can be achieved with ADFS
What can be achieved with ADFS
What can be achieved with ADFS
What CAN’T be achieved with ADFS?
@tenant.onmicrosoft.com
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
What can be achieved with E1/E3/E5
MFA Pro Tip!
SharePointPerimeterBlocking&MFA
What can be achieved with EM+S E3
What can be achieved with EM+S E3*
SharePointSiteCollectionScoped
Policies
Site Classification Label
Central Admin Control
BRK3101 – Securing your SharePoint and OneDrive
content with access policies and labels – Sesha Mani
Watch the Ignite Session for Demos
What can be achieved with EM+S E5
What can be achieved with EM+S E5
What can be achieved with EM+S E5
What can be achieved with EM+S E5
What can be achieved with EM+S E5
What can be achieved with EM+S E5
What can be achieved with EM+S E5
RiskBasedPolicies,IdentityProtection
andEntitlementPackages
Access Layers in Microsoft 365
Encryption
RBAC
Conditional Access
Azure AD PIM
PAM in Office 365
Prevent unauthorized
illegitimate access
Govern
legitimate
access
Role & risk based
Standing access
(Permissions)
JIT & JEA
With Approval
(Elevation of Privilege)
Access Reviews
&
Conditional Access
PIM & PAM
Azure AD PIM
PAM in Office 365
JIT & JEA
With Approval
(Elevation of Privilege)
Govern
legitimate
access
Access Reviews
Comparing PIM/PAM
Requires EM+S E5 (Or Azure AD P2)
Permits Role based control
Available for 32 Admin Roles
Available for Azure Resources
Ignite – BRK3248
Person Focussed
GA Announced 25/09 @ Ignite
Requires Office 365 E5 (or Advanced
Compliance Sku)
Permits TASK/ROLE based control
Only available for EXCHANGE
initially.
Ignite – BRK3222
Task Focussed
Azure PIM Office 365 PAM
PIMinaction
Configuring Office 365 PAM
Configuring Office 365 PAM
Configuring Office 365 PAM
Configuring Office 365 PAM
Configuring Office 365 PAM
Configuring Office 365 PAM
Configuring Office 365 PAM
Configuring Office 365 PAM
PAMinaction
Useful Resources
Access Control Policies
Access Control Policies
AD Risk Events
https://aka.ms/mfasetup
Docs
Preview Docs
Docs
Docs
Thank you

More Related Content

What's hot

Modelando y Asegurando Servicios
Modelando y Asegurando ServiciosModelando y Asegurando Servicios
Modelando y Asegurando Servicios
mascodigo
 
CIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIs
CloudIDSummit
 
API as-a-Product with Azure API Management (APIM)
API as-a-Product with Azure API Management (APIM)API as-a-Product with Azure API Management (APIM)
API as-a-Product with Azure API Management (APIM)
Bishoy Demian
 
DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010
Spencer Harbar
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
Dan Brinkmann
 
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...
Eric Shupps
 
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
David Brossard
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
jeremysbrown
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
Salesforce Developers
 
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Yury Bondarau
 
Evaluate Drupal & Symfony - Yuriy Gerasimov & Taras Omelianenko
Evaluate Drupal & Symfony - Yuriy Gerasimov & Taras OmelianenkoEvaluate Drupal & Symfony - Yuriy Gerasimov & Taras Omelianenko
Evaluate Drupal & Symfony - Yuriy Gerasimov & Taras Omelianenko
DrupalCamp Kyiv
 
Azure API Management - Global Azure Bootcamp 2019
Azure API Management - Global Azure Bootcamp 2019Azure API Management - Global Azure Bootcamp 2019
Azure API Management - Global Azure Bootcamp 2019
Sam Fernando
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
Daniel Toomey
 
Azure API Management Update
Azure API Management UpdateAzure API Management Update
Azure API Management Update
BizTalk360
 
Salesforce Integration
Salesforce IntegrationSalesforce Integration
Salesforce Integration
Joshua Hoskins
 
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...
Eric Shupps
 
Secure and Optimize APIs using Azure API Management
Secure and Optimize APIs using Azure API ManagementSecure and Optimize APIs using Azure API Management
Secure and Optimize APIs using Azure API Management
BizTalk360
 
Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...
Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...
Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...
Edureka!
 
Power BI - Dynamic role level security
Power BI - Dynamic role level securityPower BI - Dynamic role level security
Power BI - Dynamic role level security
Lorenzo Vercellati
 

What's hot (20)

Modelando y Asegurando Servicios
Modelando y Asegurando ServiciosModelando y Asegurando Servicios
Modelando y Asegurando Servicios
 
CIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIsCIS14: Enterprise Identity APIs
CIS14: Enterprise Identity APIs
 
API as-a-Product with Azure API Management (APIM)
API as-a-Product with Azure API Management (APIM)API as-a-Product with Azure API Management (APIM)
API as-a-Product with Azure API Management (APIM)
 
DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...
 
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
 
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
 
Evaluate Drupal & Symfony - Yuriy Gerasimov & Taras Omelianenko
Evaluate Drupal & Symfony - Yuriy Gerasimov & Taras OmelianenkoEvaluate Drupal & Symfony - Yuriy Gerasimov & Taras Omelianenko
Evaluate Drupal & Symfony - Yuriy Gerasimov & Taras Omelianenko
 
Azure API Management - Global Azure Bootcamp 2019
Azure API Management - Global Azure Bootcamp 2019Azure API Management - Global Azure Bootcamp 2019
Azure API Management - Global Azure Bootcamp 2019
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
Azure API Management Update
Azure API Management UpdateAzure API Management Update
Azure API Management Update
 
Salesforce Integration
Salesforce IntegrationSalesforce Integration
Salesforce Integration
 
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...
 
Secure and Optimize APIs using Azure API Management
Secure and Optimize APIs using Azure API ManagementSecure and Optimize APIs using Azure API Management
Secure and Optimize APIs using Azure API Management
 
Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...
Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...
Amazon Lex Chatbot Tutorial | Amazon Lex Chatbot Demo | AWS Certification Tra...
 
Power BI - Dynamic role level security
Power BI - Dynamic role level securityPower BI - Dynamic role level security
Power BI - Dynamic role level security
 

Similar to Exploring conditional access to content stored in office 365 spsce

O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
NCCOMMS
 
SpUnite17 Exploring Identity Management Options in Office 365
SpUnite17 Exploring Identity Management Options in Office 365SpUnite17 Exploring Identity Management Options in Office 365
SpUnite17 Exploring Identity Management Options in Office 365
NCCOMMS
 
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...
Nikki Chapple
 
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
Ajay Iyer
 
Securing Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 InvestmentsSecuring Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 Investments
Chris Bortlik
 
May 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarMay 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know Webinar
Robert Crane
 
Introduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDKIntroduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDK
Peter Selch Dahl
 
How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...
How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...
How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...
Kumton Suttiraksiri
 
Succeeding with Hybrid SharePoint and search
Succeeding with Hybrid SharePoint and searchSucceeding with Hybrid SharePoint and search
Succeeding with Hybrid SharePoint and search
Jeff Fried
 
Succeeding with Hybrid SharePoint
Succeeding with Hybrid SharePointSucceeding with Hybrid SharePoint
Succeeding with Hybrid SharePoint
Jeff Fried
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
Robert Crane
 
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
Rencore Webinar: Securing Office 365 and Microsoft Azure like a RockstarRencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
Rencore
 
Rencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
Rencore Webinar: Advanced Security Management within Office 365 with Liam ClearyRencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
Rencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
Rencore
 
20181220 diwug setting up a secure office 365 environment
20181220   diwug setting up a secure office 365 environment20181220   diwug setting up a secure office 365 environment
20181220 diwug setting up a secure office 365 environment
Arjan Cornelissen
 
20191010 - O365 connect setting up a secure office 365 environment
20191010 - O365 connect setting up a secure office 365 environment20191010 - O365 connect setting up a secure office 365 environment
20191010 - O365 connect setting up a secure office 365 environment
Arjan Cornelissen
 
What small businesses need to know about Azure AD premium
What small businesses need to know about Azure AD premiumWhat small businesses need to know about Azure AD premium
What small businesses need to know about Azure AD premium
Miguel Tena
 
Share point online 미리보기
Share point online 미리보기Share point online 미리보기
Share point online 미리보기
Jeong-woo Choi
 
#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...
#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...
#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...
Vincent Biret
 
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
NCCOMMS
 
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Max Fritz
 

Similar to Exploring conditional access to content stored in office 365 spsce (20)

O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
O365Con18 - Exploring Conditional Access to content stored in Office 365 - Pa...
 
SpUnite17 Exploring Identity Management Options in Office 365
SpUnite17 Exploring Identity Management Options in Office 365SpUnite17 Exploring Identity Management Options in Office 365
SpUnite17 Exploring Identity Management Options in Office 365
 
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...
Preparing for Microsoft 365 Copilot - Best Practices for Governance and Data ...
 
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
 
Securing Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 InvestmentsSecuring Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 Investments
 
May 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarMay 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know Webinar
 
Introduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDKIntroduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDK
 
How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...
How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...
How to secure and audit O365(Azure AD) by K.Suttipan (MVP) & K.Wisanu // Azur...
 
Succeeding with Hybrid SharePoint and search
Succeeding with Hybrid SharePoint and searchSucceeding with Hybrid SharePoint and search
Succeeding with Hybrid SharePoint and search
 
Succeeding with Hybrid SharePoint
Succeeding with Hybrid SharePointSucceeding with Hybrid SharePoint
Succeeding with Hybrid SharePoint
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
Rencore Webinar: Securing Office 365 and Microsoft Azure like a RockstarRencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
 
Rencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
Rencore Webinar: Advanced Security Management within Office 365 with Liam ClearyRencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
Rencore Webinar: Advanced Security Management within Office 365 with Liam Cleary
 
20181220 diwug setting up a secure office 365 environment
20181220   diwug setting up a secure office 365 environment20181220   diwug setting up a secure office 365 environment
20181220 diwug setting up a secure office 365 environment
 
20191010 - O365 connect setting up a secure office 365 environment
20191010 - O365 connect setting up a secure office 365 environment20191010 - O365 connect setting up a secure office 365 environment
20191010 - O365 connect setting up a secure office 365 environment
 
What small businesses need to know about Azure AD premium
What small businesses need to know about Azure AD premiumWhat small businesses need to know about Azure AD premium
What small businesses need to know about Azure AD premium
 
Share point online 미리보기
Share point online 미리보기Share point online 미리보기
Share point online 미리보기
 
#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...
#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...
#SPSToronto Digital Workplace provisioning with #MicrosoftGraph and #Azure fu...
 
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
 
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
 

More from Paul Hunt

What do you mean 90 days isnt enough
What do you mean 90 days isnt enoughWhat do you mean 90 days isnt enough
What do you mean 90 days isnt enough
Paul Hunt
 
Spsnl18 exploring identity management options in office 365
Spsnl18   exploring identity management options in office 365Spsnl18   exploring identity management options in office 365
Spsnl18 exploring identity management options in office 365
Paul Hunt
 
Making auditing great again! Office 365
Making auditing great again! Office 365Making auditing great again! Office 365
Making auditing great again! Office 365
Paul Hunt
 
#SPSLondon - Session 2 JSLink for IT Pros
#SPSLondon - Session 2 JSLink for IT Pros#SPSLondon - Session 2 JSLink for IT Pros
#SPSLondon - Session 2 JSLink for IT Pros
Paul Hunt
 
#SPSLondon - Session 1 - Building an faq for end users
#SPSLondon - Session 1 - Building an faq for end users#SPSLondon - Session 1 - Building an faq for end users
#SPSLondon - Session 1 - Building an faq for end users
Paul Hunt
 
SPSBE building an faq for end users
SPSBE building an faq for end usersSPSBE building an faq for end users
SPSBE building an faq for end users
Paul Hunt
 
JSLink for ITPros - SharePoint Saturday Jersey
JSLink for ITPros - SharePoint Saturday JerseyJSLink for ITPros - SharePoint Saturday Jersey
JSLink for ITPros - SharePoint Saturday Jersey
Paul Hunt
 
Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...
Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...
Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...
Paul Hunt
 
SUGUK Cambridge - Display Templates & JSLink for IT Pros
SUGUK Cambridge - Display Templates & JSLink for IT ProsSUGUK Cambridge - Display Templates & JSLink for IT Pros
SUGUK Cambridge - Display Templates & JSLink for IT Pros
Paul Hunt
 
Spsbe using js-linkanddisplaytemplates
Spsbe   using js-linkanddisplaytemplatesSpsbe   using js-linkanddisplaytemplates
Spsbe using js-linkanddisplaytemplates
Paul Hunt
 
SPSSTHLM - Using JSLink and Display Templates for ITPros
SPSSTHLM - Using JSLink and Display Templates for ITProsSPSSTHLM - Using JSLink and Display Templates for ITPros
SPSSTHLM - Using JSLink and Display Templates for ITPros
Paul Hunt
 
Using js link and display templates
Using js link and display templatesUsing js link and display templates
Using js link and display templates
Paul Hunt
 
Iw411 migrating content by search from 2010 into 2013 - minified
Iw411   migrating content by search from 2010 into 2013 - minifiedIw411   migrating content by search from 2010 into 2013 - minified
Iw411 migrating content by search from 2010 into 2013 - minified
Paul Hunt
 

More from Paul Hunt (13)

What do you mean 90 days isnt enough
What do you mean 90 days isnt enoughWhat do you mean 90 days isnt enough
What do you mean 90 days isnt enough
 
Spsnl18 exploring identity management options in office 365
Spsnl18   exploring identity management options in office 365Spsnl18   exploring identity management options in office 365
Spsnl18 exploring identity management options in office 365
 
Making auditing great again! Office 365
Making auditing great again! Office 365Making auditing great again! Office 365
Making auditing great again! Office 365
 
#SPSLondon - Session 2 JSLink for IT Pros
#SPSLondon - Session 2 JSLink for IT Pros#SPSLondon - Session 2 JSLink for IT Pros
#SPSLondon - Session 2 JSLink for IT Pros
 
#SPSLondon - Session 1 - Building an faq for end users
#SPSLondon - Session 1 - Building an faq for end users#SPSLondon - Session 1 - Building an faq for end users
#SPSLondon - Session 1 - Building an faq for end users
 
SPSBE building an faq for end users
SPSBE building an faq for end usersSPSBE building an faq for end users
SPSBE building an faq for end users
 
JSLink for ITPros - SharePoint Saturday Jersey
JSLink for ITPros - SharePoint Saturday JerseyJSLink for ITPros - SharePoint Saturday Jersey
JSLink for ITPros - SharePoint Saturday Jersey
 
Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...
Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...
Creating an FAQ for end users, An evolution of an idea - SharePoint Saturday ...
 
SUGUK Cambridge - Display Templates & JSLink for IT Pros
SUGUK Cambridge - Display Templates & JSLink for IT ProsSUGUK Cambridge - Display Templates & JSLink for IT Pros
SUGUK Cambridge - Display Templates & JSLink for IT Pros
 
Spsbe using js-linkanddisplaytemplates
Spsbe   using js-linkanddisplaytemplatesSpsbe   using js-linkanddisplaytemplates
Spsbe using js-linkanddisplaytemplates
 
SPSSTHLM - Using JSLink and Display Templates for ITPros
SPSSTHLM - Using JSLink and Display Templates for ITProsSPSSTHLM - Using JSLink and Display Templates for ITPros
SPSSTHLM - Using JSLink and Display Templates for ITPros
 
Using js link and display templates
Using js link and display templatesUsing js link and display templates
Using js link and display templates
 
Iw411 migrating content by search from 2010 into 2013 - minified
Iw411   migrating content by search from 2010 into 2013 - minifiedIw411   migrating content by search from 2010 into 2013 - minified
Iw411 migrating content by search from 2010 into 2013 - minified
 

Recently uploaded

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 

Recently uploaded (13)

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 

Exploring conditional access to content stored in office 365 spsce

Editor's Notes

  1. I also do woodturning, It’s cheaper than therapy!! Office 365 can be a lot like woodturning.. If you don’t pay attention to what you’re doing, it’s easy to make a mistake and go through the bottom of the bowl!
  2. Encryption first, Permissions, the Elevation of Privilege. (Diagram courtesy of Microsoft)
  3. Encryption first, Permissions, the Elevation of Privilege. (Diagram courtesy of Microsoft)
  4. Traditional access control has been what we class as Standing Access. A rigid defined set of rules.
  5. Conditional access has blurred the lines by introducing flexibility to the rule base.
  6. ADFS/PTA will honour Logon hours.. But with a very unhelpful screen! Luckily account lockout policies don’t apply to users during timeout periods!
  7. ADFS will honour Logon hours.. But with a very unhelpful screen! Luckily account lockout policies don’t apply to users during timeout periods!
  8. Office 365 wants to access your ADFS to validate certificates. This can be done manually but timing is critical.
  9. https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/access-control-policies-in-ad-fs
  10. https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/access-control-policies-w2k12
  11. https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/access-control-policies-in-ad-fs
  12. Users can log into Office 365 portal, but clicking on SharePoint are blocked.
  13. Teams you can open, This has now been improved! You now see the files
  14. Users with mobile devices will only work when connected to the corporate Wifi
  15. But groups works? (Although you can’t download files, only view in browser)
  16. But groups works? (Although you can’t download files, only view in browser) Download link gives you a useful error.. Open In Word just keeps recycling the login prompt.
  17. If you create a Team whilst access is blocked, the SharePoint site gets created but does NOT get connected.. Have opened this as a bug with the Teams team! This has since been fixed!
  18. The IP range will be your PUBLIC IP address used by your outbound proxies. Google what’s my IP
  19. Or Azure AD Premium P1 (Although this means no Intune policies e.g. Device health)
  20. Or Azure AD Premium P1 (Although this means no Intune policies e.g. Device health)
  21. https://www.microsoft.com/en-gb/cloud-platform/enterprise-mobility-security-pricing https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview
  22. Azure AD Conditional Access (left) can be more granular than AIP (right)
  23. 1 - We can add Office 365 Groups (Outlook/Teams) 2 - Applications published through Azure 3 - SharePoint Sites (Note: Multi-Geo issue) 4 – Roles are appropriate to the object being added.
  24. We can restrict who this grants access to and who needs to approve it.
  25. And control the need for justification, approval time out And package expiration (with the option to extend)
  26. And control the need for justification, approval time out And package expiration (with the option to extend)
  27. Encryption first, Permissions, the Elevation of Privilege. (Diagram courtesy of Microsoft)
  28. Encryption first, Permissions, the Elevation of Privilege. (Diagram courtesy of Microsoft) JUST IN TIME admin and JUST ENOUGH ACCESS (And ACCESS REVIEWS for governance)
  29. Currently available – EM+S E5 – Azure PIM. Rolling out to O365 E5 – Office 365 PAM
  30. https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure https://docs.microsoft.com/en-us/office365/securitycompliance/privileged-access-management-overview Person Focussed means the control is placed on the PERSON.. Task Focussed means the control is placed on the TASK regardless of who is requesting.
  31. All config actions happen within the PIM Manage section of the menu. Roles – Allows us to assign people to a role. Members – Lists all users with roles (allows us to search and filter and importantly REVOKE) Alerts – Displays alerts! Access Reviews – Allows period reviews of access Wizard – drives an initial configuration of PIM Settings – Allows granular configuration
  32. Users are assigned to roles and given “Eligible” status. This allows them to request elevation to this role.
  33. Users are assigned to roles and given “Eligible” status. This allows them to request elevation to this role.
  34. Configuration will be a mixture of Admin GUI and Exchange PoSH. As with PIM, elevation can be automatic or approval based. https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Privileged-access-management-in-Office-365-is-now-Generally/ba-p/261751