Submit Search
Upload
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
•
1 like
•
1,053 views
ID-Based Security イニシアティブ
Follow
ルックアウト・ジャパン株式会社 大浦地 匡史 氏
Read less
Read more
Technology
Report
Share
Report
Share
1 of 30
Download now
Download to read offline
Recommended
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
viaForensics
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
iFixScreens
BlueHat v17 || Using TLS Certificates to Track Activity Groups
BlueHat v17 || Using TLS Certificates to Track Activity Groups
BlueHat Security Conference
1400710 sevenva device_trends_2014
1400710 sevenva device_trends_2014
Avenga Germany GmbH
Owasp API Security top 10 - The need of enterprise solutions for managing API...
Owasp API Security top 10 - The need of enterprise solutions for managing API...
Tharindu Edirisinghe
You can wear it!
You can wear it!
Proofpoint
It essentials joe
It essentials joe
Joebanks21
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
NowSecure
Recommended
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
viaForensics
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
iFixScreens
BlueHat v17 || Using TLS Certificates to Track Activity Groups
BlueHat v17 || Using TLS Certificates to Track Activity Groups
BlueHat Security Conference
1400710 sevenva device_trends_2014
1400710 sevenva device_trends_2014
Avenga Germany GmbH
Owasp API Security top 10 - The need of enterprise solutions for managing API...
Owasp API Security top 10 - The need of enterprise solutions for managing API...
Tharindu Edirisinghe
You can wear it!
You can wear it!
Proofpoint
It essentials joe
It essentials joe
Joebanks21
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
NowSecure
Top Iphone Apps For Israel
Top Iphone Apps For Israel
voolf
Raspberry Pi NightHacking by Stephen Chin
Raspberry Pi NightHacking by Stephen Chin
Codemotion
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Tony Chew
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments Systems
Tony Chew
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
Proofpoint
Siganl messaging
Siganl messaging
Yuvaraj R
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
drewz lin
Gov & Education Day 2015 - Overview
Gov & Education Day 2015 - Overview
Splunk
Sailfish os
Sailfish os
KamalPreet Saluja
What Devops Need to Know about Mobile
What Devops Need to Know about Mobile
Jon Arne Sæterås
Mobile security
Mobile security
Stefaan
Pentesting Android Applications
Pentesting Android Applications
Cláudio André
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
Riddhi Shree
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
A day in the life of a pentester
A day in the life of a pentester
Cláudio André
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
Sperasoft
200:1 - Do You Trust Your Mobile Security Odds?
200:1 - Do You Trust Your Mobile Security Odds?
Blueboxer2014
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
Garvit Arya
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
Outsmarting smartphones
Outsmarting smartphones
SensePost
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)
Reality Net System Solutions
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
More Related Content
What's hot
Top Iphone Apps For Israel
Top Iphone Apps For Israel
voolf
Raspberry Pi NightHacking by Stephen Chin
Raspberry Pi NightHacking by Stephen Chin
Codemotion
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Tony Chew
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments Systems
Tony Chew
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
Proofpoint
Siganl messaging
Siganl messaging
Yuvaraj R
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
drewz lin
Gov & Education Day 2015 - Overview
Gov & Education Day 2015 - Overview
Splunk
Sailfish os
Sailfish os
KamalPreet Saluja
What's hot
(9)
Top Iphone Apps For Israel
Top Iphone Apps For Israel
Raspberry Pi NightHacking by Stephen Chin
Raspberry Pi NightHacking by Stephen Chin
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments Systems
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
Siganl messaging
Siganl messaging
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
Gov & Education Day 2015 - Overview
Gov & Education Day 2015 - Overview
Sailfish os
Sailfish os
Similar to Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
What Devops Need to Know about Mobile
What Devops Need to Know about Mobile
Jon Arne Sæterås
Mobile security
Mobile security
Stefaan
Pentesting Android Applications
Pentesting Android Applications
Cláudio André
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
Riddhi Shree
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
A day in the life of a pentester
A day in the life of a pentester
Cláudio André
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
Sperasoft
200:1 - Do You Trust Your Mobile Security Odds?
200:1 - Do You Trust Your Mobile Security Odds?
Blueboxer2014
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
Garvit Arya
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
Outsmarting smartphones
Outsmarting smartphones
SensePost
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)
Reality Net System Solutions
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
Android– forensics and security testing
Android– forensics and security testing
Santhosh Kumar
Getting Started with Mobile Test Automation & Appium
Getting Started with Mobile Test Automation & Appium
Sauce Labs
MOET: Mobile End-to-End Testing
MOET: Mobile End-to-End Testing
mobiletestsummit
Android presentation
Android presentation
Imam Raza
Liferay Italy Symposium 2015 Liferay Mobile SDK and Liferay Screens
Liferay Italy Symposium 2015 Liferay Mobile SDK and Liferay Screens
Denis Signoretto
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
Similar to Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
(20)
What Devops Need to Know about Mobile
What Devops Need to Know about Mobile
Mobile security
Mobile security
Pentesting Android Applications
Pentesting Android Applications
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
VyAPI - A Modern Cloud Based Vulnerable Android App (Presented at c0c0n XII)
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
A day in the life of a pentester
A day in the life of a pentester
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
200:1 - Do You Trust Your Mobile Security Odds?
200:1 - Do You Trust Your Mobile Security Odds?
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Outsmarting smartphones
Outsmarting smartphones
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Android– forensics and security testing
Android– forensics and security testing
Getting Started with Mobile Test Automation & Appium
Getting Started with Mobile Test Automation & Appium
MOET: Mobile End-to-End Testing
MOET: Mobile End-to-End Testing
Android presentation
Android presentation
Liferay Italy Symposium 2015 Liferay Mobile SDK and Liferay Screens
Liferay Italy Symposium 2015 Liferay Mobile SDK and Liferay Screens
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
More from ID-Based Security イニシアティブ
Azure Active Directory 最新活用シナリオアップデート
Azure Active Directory 最新活用シナリオアップデート
ID-Based Security イニシアティブ
Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法
Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法
ID-Based Security イニシアティブ
マシンアイデンティティ保護とベナファイについて ~証明書運用が抱える危機とその対策、最近の証明書失効に紐づく大規模トラブルを鑑みて~
マシンアイデンティティ保護とベナファイについて ~証明書運用が抱える危機とその対策、最近の証明書失効に紐づく大規模トラブルを鑑みて~
ID-Based Security イニシアティブ
ゼロ・トラストネットワークを実現する、 マイクロソフトの新しいSecurityサービスの全貌 〜 SIEM、SOCの構築をサポートするMicrosoft ...
ゼロ・トラストネットワークを実現する、 マイクロソフトの新しいSecurityサービスの全貌 〜 SIEM、SOCの構築をサポートするMicrosoft ...
ID-Based Security イニシアティブ
AzureAD 最新情報とAzureAD B2Bの使い方_ID-based Security イニシアティブ 第4回全体ミーティング
AzureAD 最新情報とAzureAD B2Bの使い方_ID-based Security イニシアティブ 第4回全体ミーティング
ID-Based Security イニシアティブ
アプリケーションに対するアクセスの改善とセキュリティの強化_ID-based Security イニシアティブ 第4回全体ミーティング
アプリケーションに対するアクセスの改善とセキュリティの強化_ID-based Security イニシアティブ 第4回全体ミーティング
ID-Based Security イニシアティブ
クラウドのセキュア利用モデルを考える_ID-based Security イニシアティブ 第4回全体ミーティング
クラウドのセキュア利用モデルを考える_ID-based Security イニシアティブ 第4回全体ミーティング
ID-Based Security イニシアティブ
20180604 株式会社ディー・ディー・エス様
20180604 株式会社ディー・ディー・エス様
ID-Based Security イニシアティブ
40分でわかるMSセキュリティアップデート_ID-based Securityイニシアティブ第3回全体ミーティング
40分でわかるMSセキュリティアップデート_ID-based Securityイニシアティブ第3回全体ミーティング
ID-Based Security イニシアティブ
ADセキュリティワークショップ WG活動報告 _第2回全体ミーティング
ADセキュリティワークショップ WG活動報告 _第2回全体ミーティング
ID-Based Security イニシアティブ
サイバー攻撃ワークショップ サイバー攻撃の変遷について_公開用第2回全体ミーティング
サイバー攻撃ワークショップ サイバー攻撃の変遷について_公開用第2回全体ミーティング
ID-Based Security イニシアティブ
ご挨拶_第2回全体ミーティング
ご挨拶_第2回全体ミーティング
ID-Based Security イニシアティブ
クラウド時代のIT基盤構築 時代に合った正しいIT活用がセキュリティを容易にさせる_第2回全体ミーティング
クラウド時代のIT基盤構築 時代に合った正しいIT活用がセキュリティを容易にさせる_第2回全体ミーティング
ID-Based Security イニシアティブ
認証基盤ワークショップ_ 認証基盤におけるセキュリティと利便性のこれまでとこれから_第2回全体ミーティング
認証基盤ワークショップ_ 認証基盤におけるセキュリティと利便性のこれまでとこれから_第2回全体ミーティング
ID-Based Security イニシアティブ
ID Managementワークショップ Azure AD SaaS 連携 Tips & Tricks_第2回全体ミーティング
ID Managementワークショップ Azure AD SaaS 連携 Tips & Tricks_第2回全体ミーティング
ID-Based Security イニシアティブ
20171201_02_idb_security_wg発表_p
20171201_02_idb_security_wg発表_p
ID-Based Security イニシアティブ
20171201_01_idsi_現状の認証システムに関連する機能
20171201_01_idsi_現状の認証システムに関連する機能
ID-Based Security イニシアティブ
20171011_最新のハイブリッドID管理基盤パターン
20171011_最新のハイブリッドID管理基盤パターン
ID-Based Security イニシアティブ
20171011_ID-based Securityにおける中核サービスとしてのAzure Active Directory
20171011_ID-based Securityにおける中核サービスとしてのAzure Active Directory
ID-Based Security イニシアティブ
日本の最新セキュリティ事情
日本の最新セキュリティ事情
ID-Based Security イニシアティブ
More from ID-Based Security イニシアティブ
(20)
Azure Active Directory 最新活用シナリオアップデート
Azure Active Directory 最新活用シナリオアップデート
Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法
Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法
マシンアイデンティティ保護とベナファイについて ~証明書運用が抱える危機とその対策、最近の証明書失効に紐づく大規模トラブルを鑑みて~
マシンアイデンティティ保護とベナファイについて ~証明書運用が抱える危機とその対策、最近の証明書失効に紐づく大規模トラブルを鑑みて~
ゼロ・トラストネットワークを実現する、 マイクロソフトの新しいSecurityサービスの全貌 〜 SIEM、SOCの構築をサポートするMicrosoft ...
ゼロ・トラストネットワークを実現する、 マイクロソフトの新しいSecurityサービスの全貌 〜 SIEM、SOCの構築をサポートするMicrosoft ...
AzureAD 最新情報とAzureAD B2Bの使い方_ID-based Security イニシアティブ 第4回全体ミーティング
AzureAD 最新情報とAzureAD B2Bの使い方_ID-based Security イニシアティブ 第4回全体ミーティング
アプリケーションに対するアクセスの改善とセキュリティの強化_ID-based Security イニシアティブ 第4回全体ミーティング
アプリケーションに対するアクセスの改善とセキュリティの強化_ID-based Security イニシアティブ 第4回全体ミーティング
クラウドのセキュア利用モデルを考える_ID-based Security イニシアティブ 第4回全体ミーティング
クラウドのセキュア利用モデルを考える_ID-based Security イニシアティブ 第4回全体ミーティング
20180604 株式会社ディー・ディー・エス様
20180604 株式会社ディー・ディー・エス様
40分でわかるMSセキュリティアップデート_ID-based Securityイニシアティブ第3回全体ミーティング
40分でわかるMSセキュリティアップデート_ID-based Securityイニシアティブ第3回全体ミーティング
ADセキュリティワークショップ WG活動報告 _第2回全体ミーティング
ADセキュリティワークショップ WG活動報告 _第2回全体ミーティング
サイバー攻撃ワークショップ サイバー攻撃の変遷について_公開用第2回全体ミーティング
サイバー攻撃ワークショップ サイバー攻撃の変遷について_公開用第2回全体ミーティング
ご挨拶_第2回全体ミーティング
ご挨拶_第2回全体ミーティング
クラウド時代のIT基盤構築 時代に合った正しいIT活用がセキュリティを容易にさせる_第2回全体ミーティング
クラウド時代のIT基盤構築 時代に合った正しいIT活用がセキュリティを容易にさせる_第2回全体ミーティング
認証基盤ワークショップ_ 認証基盤におけるセキュリティと利便性のこれまでとこれから_第2回全体ミーティング
認証基盤ワークショップ_ 認証基盤におけるセキュリティと利便性のこれまでとこれから_第2回全体ミーティング
ID Managementワークショップ Azure AD SaaS 連携 Tips & Tricks_第2回全体ミーティング
ID Managementワークショップ Azure AD SaaS 連携 Tips & Tricks_第2回全体ミーティング
20171201_02_idb_security_wg発表_p
20171201_02_idb_security_wg発表_p
20171201_01_idsi_現状の認証システムに関連する機能
20171201_01_idsi_現状の認証システムに関連する機能
20171011_最新のハイブリッドID管理基盤パターン
20171011_最新のハイブリッドID管理基盤パターン
20171011_ID-based Securityにおける中核サービスとしてのAzure Active Directory
20171011_ID-based Securityにおける中核サービスとしてのAzure Active Directory
日本の最新セキュリティ事情
日本の最新セキュリティ事情
Recently uploaded
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Recently uploaded
(20)
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
1.
2.
• • C D •
D • • 0 • 2 1 7
3.
Web Crawlers App
store APIs S C 5 Capability Assessment Exploit Assessment5 9 6L 9 9 L 7 c Mobile Sensors 00 0 1 /0 +
4.
Securing the post
perimeter world
5.
5 Internet Internet Web Proxy Web http://www http://www Internet http://www
6.
WN W IS IS IS V a D G D V ,
, N WF P MP V , ,N V
7.
OS 7
8.
8 WiFi Jailbreak/Root
9.
10.
10 / W F
11.
5535 6 I
L P . I L P P E P E 112/ E EMO 5535 6 P E A 6 S A 112/ E D Intune +
12.
1. Intune Lookout
MES AAD Tenant ID Group Object ID Lookout 2. Intune Mobile Threat Defense(MTP) Lookout for Work(L4W) 3. AAD L4W iOS Android 4. Intune 5. L4W AAD Deny/Allow 6. ( ) 7.
13.
Lookout MES Intune/AAD
14.
15.
16.
– > >
>
17.
18.
1. Intune 2.
3. 4.Intune 5.Intune 6.Lookout (MES) 7.
19.
20.
20 INCIDENT RESPONSE Lookout MES !
X X Lookout MOBILE RISK API
21.
+ + Machines Reporting (OS ) “Top
machines at risk” “Top users at risk” “Service Health” - Lookout MES - Lookout Machines Reporting (OS )
22.
23.
: iOS 2 Exploits Jailbreak 1. 2.
C&C 3. Safari Exploit Safari Jailbreak SMS
24.
https://blog.lookout.com/esurv-research Android 2016 Google
Play Store ”Exodus” iOS iOS Android iOS GPS Android C2 April 8, 2019 Lookout
25.
26.
• O • W S •
M S • M
27.
: C /
: E : C 2 5C C6 , R MHL aN e : C E e 5 U 31 46 IN c a P S U 5 Nd : C . 2U
28.
) 1 1. Hangouts 2. 3.
29.
) 2 1. HTML URL 2. 3.
30.
30
Download now