SlideShare a Scribd company logo
1 of 52
Download to read offline
What is Microsoft Enterprise Mobility
Suite and how to configure it
Peter Daalmans
@pdaalmans
http://ref.ms/aboutme
Mirko Colemberg
@mirkocolemberg
http://blog.Colemberg.ch
#MMSMOA
@pdaalmans
Sn. Technical
Consultant,
IT-Concern
Configmgrblog.com
ref.ms/aboutme
Breda, Netherlands
Peter Daalmans
#MMSMOA
@mirkocolemberg
Principal
Consultant Blog.Colemberg.ch
Solothurn, Switzerland
Mirko Colemberg
Agenda
• EMS Components
• Azure AD Premium
• Microsoft Intune
• Azure RMS
• How to get started?
Enterprise Mobility Suite
What is MS EMS?
• Enterprise Mobility Suite
• Azure Active Directory Premium
• Microsoft Intune
• Azure Rights Management
Identity
Azure AD Premium
Making hybrid identity simple – 6 clicks to the cloud
Azure AD Connect
Consolidated deployment
assistant for your identity
bridge components
(The difference is the Password)
ADFS use cases
Tighter AD integration
Security Policy
Conditional Access
Smart Card Authentication
DirSync
Azure AD Sync
FIM+Azure AD
Connector
Azure AD Connect
Identity: Cloud, Sync or Federated?

 

Cloud identity provides a solution
where all identity resides in the
cloud
Federated identity allows
customers to retain all
authentication on-premises
Identity sync enables customers to
bridge their existing identity into
the cloud
B2B federated identity allows
customers to securely share and
collaborate with each other
Azure Active Directory Premium
Active Directory in the cloud
• Federation and identity provisioning
Centrally managed identities
• Synchronization
• Single User Identity (SSO)
Monitoring and protect access to cloud apps
• Authentication and Security reports
• Multi-Factor Authentication (MFA)
Empower end Users
• Self-Service password reset
No Object Limit No Object Limit
No Limit
Advanced Security
Reports
Yes(Advanced)**
Premium
+ Basic
Features
Group-based access management/provisioning Yes Yes
Self-Service Password Reset for cloud users Yes Yes
Company Branding (Logon Pages/Access Panel customization) Yes Yes
SLA Yes Yes
AAD editions comparison
Other premium features
Self-service group
management, including
dynamic membership
calculation in these
groups and distribution
lists, based on the user’s
attributes.
Users can reset their
passwords significantly
reducing help desk burden
and costs.
Users can edit their profile
details to update and add
missing information
Self service experience for users
Monitor and protect access on go-anywhere devices
Security reporting that tracks
inconsistent access patterns, analytics
and alerts.
Built-in security features, like
“you cant be in two places at
once”.
Ensure secure access by enabling
MFA
XXXXX
XXXXX
XXXXX
Multi-factor authentication
Any two or more of the following factors:
 Something you know: a password or PIN.
 Something you have: a phone, credit card or hardware token.
 Something you are: a fingerprint, retinal scan or other biometric.
Stronger when using two different channels (out-of-band).
Premium Reports
Premium reports:
• Advanced application usage reporting
• Password reset activity
• Selfservice activity
• Identify unexpected logon behavior
Premium Reports
Discovery from non-Windows devices
• Cloud App Discovery gateway
• Devices can be configured to go through gateway
• Requires MDM for deployment across organization
Integrate on-prem apps with Azure AD
End-user portal – Access Panel
Azure AD authentication capabilities:
• Username and password synced from on-prem AD
• Federated login to on-prem or other federation servers
• Multi-factor authentication
• Customized login screen
• Authorization based on user or groups
• SSO to Office365, thousands of SaaS apps and all
applications integrated with AAD
Reports, auditing and security monitoring
based on big data and machine learning.
Azure Active Directory
Resource ResourceResource
Corporate
Network
DMZ
Connector Connector
Application Proxy
Access Panel
Portal
Authentication +
MFA
Reporting &
Auditing
Security
Monitoring
Authorization
Demo
Azure Active Directory Premium
Microsoft Intune
MDM, MAM and more
Microsoft Intune
• Mobile Device Management
• Windows, Windows Phone, IOS and Android
• Policy and Application Management
• Compliance reporting
• Conditional Access to resources
• Selective Wipe Devices
• Hybrid / Cloud solution
Single management console for IT admins
Configuration Manager console (hybrid)Intune web console (cloud only)
Comprehensive lifecycle management
Enroll
• Provide a self-service Company
Portal for users to enroll devices
• Deliver custom terms and
conditions at enrollment
• Bulk enroll devices using Apple
Configurator or service account
• Restrict access to Exchange
email if a device is not enrolled
Retire
• Revoke access to corporate
resources
• Perform selective wipe
• Audit lost and stolen devices
Provision
• Deploy certificates, email, VPN,
and WiFi profiles
• Deploy device security policy
settings
• Install mandatory apps
• Deploy app restriction policies
• Deploy data protection policies
Manage and Protect
• Restrict access to corporate
resources if policies are violated
(e.g., jailbroken device)
• Protect corporate data by
restricting actions such as
copy/cut/paste/save outside of
managed app ecosystem
• Report on device and app
compliance
User IT
Microsoft Intune
Company Portal(s)
Company portal self-service experience
• Consistent experience across:
• Windows
• Windows Phone
• Android
• iOS
• Discover and install corporate apps
• Manage devices and data
• Customizable terms and conditions
• Ability to contact IT
• Force the Policy refresh
Mobile Device – Portals
All portals offer the same experience
(except for Windows Phone)
Microsoft Intune
Device Enrolment – The new way
Conditional access
Enrolling Devices
Users can enroll devices that configure the
device for management with Windows
Intune; the user can then use the Company
Portal for easy access to corporate
applications
Data from Windows Intune is in sync
with Configuration Manager, which
provides unified management across
both on-premises and in the cloud
Dirsync
w Pwd Sync
Connector
Internal
Connector
Conditional access for Office 365
7
Enrollment/compliance remediation5
If not compliant, push
device into quarantine4
2
Attempt
email
connection
1
3 Set device
management/
compliance
status
6
Demo
Device Enrolment – The new way
Conditional access
Microsoft Intune
Application Management
Mobile Application Management
Maximize mobile productivity and protect corporate
resources with Office mobile apps
Extend these capabilities to existing line-of-business apps
using the Intune app wrapper
Enable secure viewing of content using the Managed
Browser, PDF Viewer, AV Player, and Image Viewer apps
Personal apps
Mobile Application Management
Copy Paste Save
Maximize productivity while preventing leakage of company
data by restricting actions such as copy/cut/paste/save in
your managed app ecosystem
Save to
personal storage
Paste to
personal
app
Mobile App Config Policy
• Preconfigure iOS Apps with settings
• App need to support iOS App Config Policy
• See for more info: http://ref.ms/mamlist
Demo
Mobile Application Management
Microsoft Intune
Soon available: Mac OS X management
37
Mac OS X support for
• Enrollment
• Deploying policies
• Deploying profiles
• Remote actions
• Reporting
Demo
Mac OS X
Rights Management
Protecting the data
Microsoft Rights Management
• Encrypt and control
• Documents
• Mails
• Prevent unwanted viewing/printing or access to
Corporate data
Protect data with Rights Management
File Services
Rights Management
Integrating RMS into workflows
Sharing documents securely
Demo
Rights Management
How to get started?
With Microsoft EMS
How to get started?
Go to ref.ms/ems > Try now
• Sign up
• Setup AAD Connect (synchronize accounts)
• Set MDM authority
• Configure platforms
• Enroll!
Share your ideas
• Share your voice / ideas!
• http://microsoftintune.uservoice.com/
• http://configurationmanager.uservoice.com/
Questions
Thank you!
Evaluations: Please provide session feedback by clicking the EVAL button in the scheduler app (also
download slides). One lucky winner will receive a free ticket to the next MMS!
Session Title: What is Microsoft Enterprise Mobility Suite and how to configure it
Discuss…
Ask your questions-real world answers!
Plenty of time to engage, share knowledge.
SPONSORS
MMS 2015: What is ems and how to configure it

More Related Content

What's hot

Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterDavid J Rosenthal
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Jan Ketil Skanke
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Microsoft Education AU
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldMicrosoft Education AU
 
Next Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversNext Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversMicrosoft Education AU
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationNext Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationMicrosoft Education AU
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustMicrosoft Education AU
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0Huy Pham
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureSparkhound Inc.
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessRobert Crane
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessRobert Crane
 
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...Jan Ketil Skanke
 
Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSMorgan Simonsen
 

What's hot (20)

Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD world
 
Next Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversNext Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the Covers
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationNext Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud Trust
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft Azure
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 Business
 
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
 
Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMS
 

Similar to MMS 2015: What is ems and how to configure it

Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
Atea ems the next level
Atea   ems the next levelAtea   ems the next level
Atea ems the next levelPer Larsen
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Thomas Godsted Rysgaard
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
MMS 2015: Secure your data and apps with the enterprise
MMS 2015: Secure your data and apps with the enterpriseMMS 2015: Secure your data and apps with the enterprise
MMS 2015: Secure your data and apps with the enterprisePeter Daalmans
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 

Similar to MMS 2015: What is ems and how to configure it (20)

Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
Atea ems the next level
Atea   ems the next levelAtea   ems the next level
Atea ems the next level
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
MMS 2015: Secure your data and apps with the enterprise
MMS 2015: Secure your data and apps with the enterpriseMMS 2015: Secure your data and apps with the enterprise
MMS 2015: Secure your data and apps with the enterprise
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

MMS 2015: What is ems and how to configure it

  • 1. What is Microsoft Enterprise Mobility Suite and how to configure it Peter Daalmans @pdaalmans http://ref.ms/aboutme Mirko Colemberg @mirkocolemberg http://blog.Colemberg.ch
  • 4. Agenda • EMS Components • Azure AD Premium • Microsoft Intune • Azure RMS • How to get started?
  • 6. What is MS EMS? • Enterprise Mobility Suite • Azure Active Directory Premium • Microsoft Intune • Azure Rights Management
  • 8. Making hybrid identity simple – 6 clicks to the cloud Azure AD Connect Consolidated deployment assistant for your identity bridge components (The difference is the Password) ADFS use cases Tighter AD integration Security Policy Conditional Access Smart Card Authentication DirSync Azure AD Sync FIM+Azure AD Connector Azure AD Connect
  • 9. Identity: Cloud, Sync or Federated?     Cloud identity provides a solution where all identity resides in the cloud Federated identity allows customers to retain all authentication on-premises Identity sync enables customers to bridge their existing identity into the cloud B2B federated identity allows customers to securely share and collaborate with each other
  • 10. Azure Active Directory Premium Active Directory in the cloud • Federation and identity provisioning Centrally managed identities • Synchronization • Single User Identity (SSO) Monitoring and protect access to cloud apps • Authentication and Security reports • Multi-Factor Authentication (MFA) Empower end Users • Self-Service password reset
  • 11. No Object Limit No Object Limit No Limit Advanced Security Reports Yes(Advanced)** Premium + Basic Features Group-based access management/provisioning Yes Yes Self-Service Password Reset for cloud users Yes Yes Company Branding (Logon Pages/Access Panel customization) Yes Yes SLA Yes Yes AAD editions comparison
  • 13. Self-service group management, including dynamic membership calculation in these groups and distribution lists, based on the user’s attributes. Users can reset their passwords significantly reducing help desk burden and costs. Users can edit their profile details to update and add missing information Self service experience for users
  • 14. Monitor and protect access on go-anywhere devices Security reporting that tracks inconsistent access patterns, analytics and alerts. Built-in security features, like “you cant be in two places at once”. Ensure secure access by enabling MFA XXXXX XXXXX XXXXX
  • 15. Multi-factor authentication Any two or more of the following factors:  Something you know: a password or PIN.  Something you have: a phone, credit card or hardware token.  Something you are: a fingerprint, retinal scan or other biometric. Stronger when using two different channels (out-of-band).
  • 16. Premium Reports Premium reports: • Advanced application usage reporting • Password reset activity • Selfservice activity • Identify unexpected logon behavior
  • 18. Discovery from non-Windows devices • Cloud App Discovery gateway • Devices can be configured to go through gateway • Requires MDM for deployment across organization
  • 19. Integrate on-prem apps with Azure AD End-user portal – Access Panel Azure AD authentication capabilities: • Username and password synced from on-prem AD • Federated login to on-prem or other federation servers • Multi-factor authentication • Customized login screen • Authorization based on user or groups • SSO to Office365, thousands of SaaS apps and all applications integrated with AAD Reports, auditing and security monitoring based on big data and machine learning. Azure Active Directory Resource ResourceResource Corporate Network DMZ Connector Connector Application Proxy Access Panel Portal Authentication + MFA Reporting & Auditing Security Monitoring Authorization
  • 22. Microsoft Intune • Mobile Device Management • Windows, Windows Phone, IOS and Android • Policy and Application Management • Compliance reporting • Conditional Access to resources • Selective Wipe Devices • Hybrid / Cloud solution
  • 23. Single management console for IT admins Configuration Manager console (hybrid)Intune web console (cloud only)
  • 24. Comprehensive lifecycle management Enroll • Provide a self-service Company Portal for users to enroll devices • Deliver custom terms and conditions at enrollment • Bulk enroll devices using Apple Configurator or service account • Restrict access to Exchange email if a device is not enrolled Retire • Revoke access to corporate resources • Perform selective wipe • Audit lost and stolen devices Provision • Deploy certificates, email, VPN, and WiFi profiles • Deploy device security policy settings • Install mandatory apps • Deploy app restriction policies • Deploy data protection policies Manage and Protect • Restrict access to corporate resources if policies are violated (e.g., jailbroken device) • Protect corporate data by restricting actions such as copy/cut/paste/save outside of managed app ecosystem • Report on device and app compliance User IT
  • 26. Company portal self-service experience • Consistent experience across: • Windows • Windows Phone • Android • iOS • Discover and install corporate apps • Manage devices and data • Customizable terms and conditions • Ability to contact IT • Force the Policy refresh
  • 27. Mobile Device – Portals All portals offer the same experience (except for Windows Phone)
  • 28. Microsoft Intune Device Enrolment – The new way Conditional access
  • 29. Enrolling Devices Users can enroll devices that configure the device for management with Windows Intune; the user can then use the Company Portal for easy access to corporate applications Data from Windows Intune is in sync with Configuration Manager, which provides unified management across both on-premises and in the cloud Dirsync w Pwd Sync Connector Internal Connector
  • 30. Conditional access for Office 365 7 Enrollment/compliance remediation5 If not compliant, push device into quarantine4 2 Attempt email connection 1 3 Set device management/ compliance status 6
  • 31. Demo Device Enrolment – The new way Conditional access
  • 33. Mobile Application Management Maximize mobile productivity and protect corporate resources with Office mobile apps Extend these capabilities to existing line-of-business apps using the Intune app wrapper Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Personal apps
  • 34. Mobile Application Management Copy Paste Save Maximize productivity while preventing leakage of company data by restricting actions such as copy/cut/paste/save in your managed app ecosystem Save to personal storage Paste to personal app
  • 35. Mobile App Config Policy • Preconfigure iOS Apps with settings • App need to support iOS App Config Policy • See for more info: http://ref.ms/mamlist
  • 37. Microsoft Intune Soon available: Mac OS X management 37
  • 38. Mac OS X support for • Enrollment • Deploying policies • Deploying profiles • Remote actions • Reporting
  • 41. Microsoft Rights Management • Encrypt and control • Documents • Mails • Prevent unwanted viewing/printing or access to Corporate data
  • 42. Protect data with Rights Management File Services Rights Management
  • 43. Integrating RMS into workflows
  • 46. How to get started? With Microsoft EMS
  • 47. How to get started? Go to ref.ms/ems > Try now • Sign up • Setup AAD Connect (synchronize accounts) • Set MDM authority • Configure platforms • Enroll!
  • 48. Share your ideas • Share your voice / ideas! • http://microsoftintune.uservoice.com/ • http://configurationmanager.uservoice.com/
  • 51. Evaluations: Please provide session feedback by clicking the EVAL button in the scheduler app (also download slides). One lucky winner will receive a free ticket to the next MMS! Session Title: What is Microsoft Enterprise Mobility Suite and how to configure it Discuss… Ask your questions-real world answers! Plenty of time to engage, share knowledge. SPONSORS