SlideShare a Scribd company logo
David J. Rosenthal
CEO, Atidan
May 4, 2015
Ignite Conference, Chicago, IL
Mobile Device
Management for
Office 365
Agenda Trends around mobility and BYOD
MDM for Office 365 overview
Demo admin setup & end user experience
iOS and Android apps
Enforce app password
Wipe just the app
Entire org or individuals (no
groups)
Exchange ActiveSync
Devices supporting EAS
Enforce device password
Wipe entire device
Entire org or individuals (no
groups)
Other appsOWA for Devices
No controls
Protect
your data
Enable
your users Unify Your Environment
Devices Apps Data
Helping organizations enable their users to be productive on the devices they love
while helping ensure corporate assets are secure
Enroll
• Provide a self-service Company
Portal for users to enroll devices
• Deliver custom terms and
conditions at enrollment
• Bulk enroll devices using Apple
Configurator or service account
• Restrict access to Exchange
email if a device is not enrolled
Retire
• Revoke access to corporate
resources
• Perform selective wipe
• Audit lost and stolen devices
Provision
• Deploy certificates, email, VPN,
and WiFi profiles
• Deploy security policy
• Install mandatory apps
• Deploy app restriction policies
• Deploy data protection policies
Manage and Protect
• Restrict access to corporate
resources if policies are violated
(e.g., jailbroken device)
• Protect corporate data by
restricting actions such as
copy/cut/paste/save outside of
managed app ecosystem
• Report on device and app
compliance
User IT
Inventory mobile devices that access corporate applications
Remote factory reset (full device wipe)
Mobile device configuration settings (PIN length, PIN required, lock time, etc.)
Self-service password reset (Office 365 cloud only users)
Provides reporting on devices that do not meet IT policy
Group-based policies and reporting (ability to use groups for targeted device configuration)
Root cert and jailbreak detection
Remove Office 365 app data from mobile devices while leaving personal data and apps intact (selective wipe)
Prevent access to corporate email and documents based upon device enrollment and compliance policies
Self-service Company Portal for users to enroll their own devices and install corporate apps
Deploy certificates, VPN profiles (including app-specific profiles), and Wi-Fi profiles
Prevent cut/copy/paste/save as of data from corporate apps to personal apps (mobile application management)
Secure content viewing via Managed browser, PDF viewer, Imager viewer, and AV player apps for Intune
Remote device lock via self-service Company Portal and via admin console
PC management (e.g. inventory, antimalware, patch, policies, etc.)
OS deployment (via System Center ConfigMgr)
PC software management
Single management console for PCs and mobile devices (through integration with System Center ConfigMgr)
Microsoft IntuneBuilt-In
Device
Management
Conditional
Access
Selective Wipe
Built-In Microsoft Intune
LoB
app
User-centric approach
Before mobile devices can access Office 365 data, they must be enrolled and healthy.
1. A user downloads
the public OneDrive
app on a personal iPad
2. The user is shown a
page that directs them
to enroll the iPad
3. The user steps
through the enrollment
process
4. The OneDrive app is
now MDM enabled
5. The user is able to
access their OneDrive
data
Device Polices
• Control what mobile devices can connect to Office
365 Data
• Set device configuration policies such as pin lock
• Enforce data encryption on devices
Admin Controls
• Built-In management in Office 365 Admin Center,
and PowerShell
• Configure device policies by groups
• Product level granular control
Device Reporting
• Device compliance reports
• Mobile usage and trends in our organization
• API support
The IT admin can wipe Office 365 data from the user’s device. When they trigger the wipe,
all of the data cached or stored by the apps will be deleted, while all of the user’s personal
content remains intact.
1. An employee uses Office 365
apps and data on a mobile
device. The employee leaves
the company.
2. The IT admin logins into Office
365 Admin Center to perform a
selective wipe
3. The Office 365 data is removed
from the Office applications
leaving personal information
intact
* Native email clients that use ActiveSync will support Conditional Access, and Selective Wipe
** Office on Windows Phone (Combined App)
Configure Microsoft Intune
with Office 365
http://portal.office.com
http://aka.ms/TryIntune
Action required to access your organization’s
email
This email was automatically generated by Microsoft Exchange.
You are receiving this message because your IT department requires
that you enroll your device in order to access Exchange email. This
helps to protect corporate information in your organization.
Follow the steps listed on this site to enroll your device, verify
compliance, and activate your email.
Please contact your IT department with any questions or problems.
portal.manage.microsoft.com/?portalAction=EmailQuarantine
www.microsoftintune/contoso/devicemanagement.com
Activating…
www.microsoftintune/contoso/devicemanagement.com
www.microsoftintune/contoso/devicemanagement.com
Contoso company…Contoso device enro…
www.microsoftintune/contoso/devicemanagement.com
Contoso company…Contoso device e…
www.microsoftintune/contoso/devicemanagement.com
Contoso
Contoso IT Contoso DashContoso Data Store
Contoso Viewer
Outlook
Contoso managed
Contoso manage
Jessica
@jesssssss
Pasting content not allowed
This content is managed by Contoso. The
destination is not. Pasting this content is
not allowed by your administrator.
paste close
Jame
s
james@contoso.com
Jame
s
Contoso IT
Device Not Enrolled
To Access emails and other company resources
CONTOSO
11:18
Contoso IT
Device Not Enrolled
Thu 1/16, 11:18
To: Contoso Employees
To access emails and other company
resources, your device needs to be enrolled
with Contoso. To enroll your device follow the
instructions below:
Step 1:
Enroll your Device
Step 2:
Once you’ve enrolled your device.
Click here to activate
Redirecting to device enrollment...
https://portal.manage.micro
james@contoso.com
Contoso
james@contoso.com
Contoso
Contoso IT
Jame
s
Contoso IT
Device Not Enrolled
To Access emails and other company resources
CONTOSO
Contoso IT
Device Not Enrolled
Thu 1/16, 11:18
To: Contoso Employees
To access emails and other company
resources, your device needs to be enrolled
with Contoso. To enroll your device follow the
instructions below:
Step 1:
Enroll your Device
Step 2:
Once you’ve enrolled your device.
Click here to activate
Jame
s
Activating…
https://activate.aad/contoso/
Jame
s
Activation
Successful!
Your access to emails and other company
resources has been granted.
https://activate.aad/contoso/
Jame
s
4
Contoso IT
Device Not Enrolled
To Access emails and other company resources
CONTOSO
Office 365Users on their devices Azure AD
Report device
compliance
Enroll device, evaluate & enforce
compliance with device
management policies
Microsoft
Intune
IT Admin
(Workplace Join +
management)
4
Conditional access control - Exchange ActiveSync (EAS)
Azure AD DRS
EAS Client
EAS Server
Intune
Get email
EAS ID,
username,
password
1
Lookup device
compliance state
2
Register EAS
email client
6
Create EASID to
device ID binding
7
Set device
management/
compliance
status 5
Device object
- device id
- isManaged
- MDMStatus
- EASIDs
Azure AD
Push device into
quarantine
Quarantine
email
Quarantine email
Step 1: Enroll device
Step 2: Register EAS
client
3
© 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on
the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
office365@atidan.com
Corporate
Complete mobile application management
• Securely access corporate information using Office
mobile apps, while preventing company data loss
by restricting actions such as copy/cut/paste/save
in your managed app ecosystem
• Extend these capabilities to existing line of business
apps using the Intune app wrapper
• Enable secure viewing of content using the
Managed Browser, PDF Viewer, AV Player, and
Image Viewer apps
Manage all of your corporate apps and data with
Intune’s mobile device and application
management solution
Personal
Managed Browser
& Viewer Apps
Mobile device management
• Deploy certificates, WiFi, VPN, and email profiles
automatically once a device is enrolled for management
• Enable bulk enrollment of task-worker devices to set
policies and deploy applications on a large scale
• Provide a self-service Company Portal for users to enroll
their own devices and install corporate apps
PC management
• Provide lightweight, agentless management from the
cloud
• Connect Intune to System Center 2012 R2 Configuration
Manager to manage all of your devices including PCs,
Macs, Unix/Linux Servers, and mobile devices from a
single management console
• Provide real-time protection against malware threats on
managed computers
• Collect information about hardware configurations and
software installed on managed computers
• Deploy software based upon policies set by the
administrator
User
for Business
bryan@microsoft.com
bryan@microsoft.com
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan

More Related Content

What's hot

SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

What's hot (20)

SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Broadband technology
Broadband technologyBroadband technology
Broadband technology
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cloud management (IBM)
Cloud management (IBM)Cloud management (IBM)
Cloud management (IBM)
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
SD WAN Technology Overview
SD WAN Technology OverviewSD WAN Technology Overview
SD WAN Technology Overview
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Basic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling SystemBasic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling System
 
Mobile Device Security Policy
Mobile Device Security PolicyMobile Device Security Policy
Mobile Device Security Policy
 
Introduction to Cloud | Cloud Computing Tutorial for Beginners | Cloud Certif...
Introduction to Cloud | Cloud Computing Tutorial for Beginners | Cloud Certif...Introduction to Cloud | Cloud Computing Tutorial for Beginners | Cloud Certif...
Introduction to Cloud | Cloud Computing Tutorial for Beginners | Cloud Certif...
 
Computer network
Computer networkComputer network
Computer network
 
Connect Laptop/PC to Router Console Port
Connect Laptop/PC to Router Console Port Connect Laptop/PC to Router Console Port
Connect Laptop/PC to Router Console Port
 
Networking
NetworkingNetworking
Networking
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 

Viewers also liked

Viewers also liked (10)

State of the Virtualized Data Center
State of the Virtualized Data CenterState of the Virtualized Data Center
State of the Virtualized Data Center
 
Current trends in DBMS
Current trends in DBMSCurrent trends in DBMS
Current trends in DBMS
 
Five Power Trends on Their Way to Your Data Center
Five Power Trends on Their Way to Your Data CenterFive Power Trends on Their Way to Your Data Center
Five Power Trends on Their Way to Your Data Center
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
 
Data Center Trends 2014
Data Center Trends 2014Data Center Trends 2014
Data Center Trends 2014
 
Architectural Principles for Software + Services
Architectural Principles for Software + ServicesArchitectural Principles for Software + Services
Architectural Principles for Software + Services
 
Data Center Infrastructure Trends
Data Center Infrastructure TrendsData Center Infrastructure Trends
Data Center Infrastructure Trends
 
Megatrends: Shaping the Future
Megatrends: Shaping the FutureMegatrends: Shaping the Future
Megatrends: Shaping the Future
 
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
 
Smart building controls and energy management system trends
Smart building controls and energy management system trends  Smart building controls and energy management system trends
Smart building controls and energy management system trends
 

Similar to Mobile Device Management for Office 365 - Atidan

Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
Huy Pham
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Nordic Infrastructure Conference
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
Liberteks
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Nordic Infrastructure Conference
 

Similar to Mobile Device Management for Office 365 - Atidan (20)

Intune Concept.pptx
Intune Concept.pptxIntune Concept.pptx
Intune Concept.pptx
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
Intune Deployment .pptx
Intune Deployment .pptxIntune Deployment .pptx
Intune Deployment .pptx
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 

More from David J Rosenthal

Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
David J Rosenthal
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
David J Rosenthal
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
David J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
David J Rosenthal
 

More from David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Recently uploaded

How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 

Recently uploaded (20)

Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 

Mobile Device Management for Office 365 - Atidan

  • 1. David J. Rosenthal CEO, Atidan May 4, 2015 Ignite Conference, Chicago, IL Mobile Device Management for Office 365
  • 2. Agenda Trends around mobility and BYOD MDM for Office 365 overview Demo admin setup & end user experience
  • 3.
  • 4. iOS and Android apps Enforce app password Wipe just the app Entire org or individuals (no groups) Exchange ActiveSync Devices supporting EAS Enforce device password Wipe entire device Entire org or individuals (no groups) Other appsOWA for Devices No controls
  • 5. Protect your data Enable your users Unify Your Environment Devices Apps Data Helping organizations enable their users to be productive on the devices they love while helping ensure corporate assets are secure
  • 6. Enroll • Provide a self-service Company Portal for users to enroll devices • Deliver custom terms and conditions at enrollment • Bulk enroll devices using Apple Configurator or service account • Restrict access to Exchange email if a device is not enrolled Retire • Revoke access to corporate resources • Perform selective wipe • Audit lost and stolen devices Provision • Deploy certificates, email, VPN, and WiFi profiles • Deploy security policy • Install mandatory apps • Deploy app restriction policies • Deploy data protection policies Manage and Protect • Restrict access to corporate resources if policies are violated (e.g., jailbroken device) • Protect corporate data by restricting actions such as copy/cut/paste/save outside of managed app ecosystem • Report on device and app compliance User IT
  • 7. Inventory mobile devices that access corporate applications Remote factory reset (full device wipe) Mobile device configuration settings (PIN length, PIN required, lock time, etc.) Self-service password reset (Office 365 cloud only users) Provides reporting on devices that do not meet IT policy Group-based policies and reporting (ability to use groups for targeted device configuration) Root cert and jailbreak detection Remove Office 365 app data from mobile devices while leaving personal data and apps intact (selective wipe) Prevent access to corporate email and documents based upon device enrollment and compliance policies Self-service Company Portal for users to enroll their own devices and install corporate apps Deploy certificates, VPN profiles (including app-specific profiles), and Wi-Fi profiles Prevent cut/copy/paste/save as of data from corporate apps to personal apps (mobile application management) Secure content viewing via Managed browser, PDF viewer, Imager viewer, and AV player apps for Intune Remote device lock via self-service Company Portal and via admin console PC management (e.g. inventory, antimalware, patch, policies, etc.) OS deployment (via System Center ConfigMgr) PC software management Single management console for PCs and mobile devices (through integration with System Center ConfigMgr)
  • 9. Before mobile devices can access Office 365 data, they must be enrolled and healthy. 1. A user downloads the public OneDrive app on a personal iPad 2. The user is shown a page that directs them to enroll the iPad 3. The user steps through the enrollment process 4. The OneDrive app is now MDM enabled 5. The user is able to access their OneDrive data
  • 10. Device Polices • Control what mobile devices can connect to Office 365 Data • Set device configuration policies such as pin lock • Enforce data encryption on devices Admin Controls • Built-In management in Office 365 Admin Center, and PowerShell • Configure device policies by groups • Product level granular control Device Reporting • Device compliance reports • Mobile usage and trends in our organization • API support
  • 11. The IT admin can wipe Office 365 data from the user’s device. When they trigger the wipe, all of the data cached or stored by the apps will be deleted, while all of the user’s personal content remains intact. 1. An employee uses Office 365 apps and data on a mobile device. The employee leaves the company. 2. The IT admin logins into Office 365 Admin Center to perform a selective wipe 3. The Office 365 data is removed from the Office applications leaving personal information intact
  • 12. * Native email clients that use ActiveSync will support Conditional Access, and Selective Wipe ** Office on Windows Phone (Combined App)
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Action required to access your organization’s email This email was automatically generated by Microsoft Exchange. You are receiving this message because your IT department requires that you enroll your device in order to access Exchange email. This helps to protect corporate information in your organization. Follow the steps listed on this site to enroll your device, verify compliance, and activate your email. Please contact your IT department with any questions or problems.
  • 30.
  • 31.
  • 32.
  • 33.
  • 37. Contoso company…Contoso device enro… www.microsoftintune/contoso/devicemanagement.com
  • 38. Contoso company…Contoso device e… www.microsoftintune/contoso/devicemanagement.com
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Contoso Contoso IT Contoso DashContoso Data Store Contoso Viewer Outlook
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 63.
  • 65. Pasting content not allowed This content is managed by Contoso. The destination is not. Pasting this content is not allowed by your administrator. paste close
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 91.
  • 92.
  • 95. Contoso IT Device Not Enrolled To Access emails and other company resources CONTOSO 11:18
  • 96. Contoso IT Device Not Enrolled Thu 1/16, 11:18 To: Contoso Employees To access emails and other company resources, your device needs to be enrolled with Contoso. To enroll your device follow the instructions below: Step 1: Enroll your Device Step 2: Once you’ve enrolled your device. Click here to activate
  • 97. Redirecting to device enrollment... https://portal.manage.micro
  • 98.
  • 103. Jame s
  • 104. Contoso IT Device Not Enrolled To Access emails and other company resources CONTOSO
  • 105. Contoso IT Device Not Enrolled Thu 1/16, 11:18 To: Contoso Employees To access emails and other company resources, your device needs to be enrolled with Contoso. To enroll your device follow the instructions below: Step 1: Enroll your Device Step 2: Once you’ve enrolled your device. Click here to activate
  • 107. Jame s Activation Successful! Your access to emails and other company resources has been granted. https://activate.aad/contoso/
  • 109. Contoso IT Device Not Enrolled To Access emails and other company resources CONTOSO
  • 110. Office 365Users on their devices Azure AD Report device compliance Enroll device, evaluate & enforce compliance with device management policies Microsoft Intune IT Admin
  • 111. (Workplace Join + management) 4 Conditional access control - Exchange ActiveSync (EAS) Azure AD DRS EAS Client EAS Server Intune Get email EAS ID, username, password 1 Lookup device compliance state 2 Register EAS email client 6 Create EASID to device ID binding 7 Set device management/ compliance status 5 Device object - device id - isManaged - MDMStatus - EASIDs Azure AD Push device into quarantine Quarantine email Quarantine email Step 1: Enroll device Step 2: Register EAS client 3
  • 112. © 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. office365@atidan.com
  • 113.
  • 114. Corporate Complete mobile application management • Securely access corporate information using Office mobile apps, while preventing company data loss by restricting actions such as copy/cut/paste/save in your managed app ecosystem • Extend these capabilities to existing line of business apps using the Intune app wrapper • Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Manage all of your corporate apps and data with Intune’s mobile device and application management solution Personal Managed Browser & Viewer Apps
  • 115. Mobile device management • Deploy certificates, WiFi, VPN, and email profiles automatically once a device is enrolled for management • Enable bulk enrollment of task-worker devices to set policies and deploy applications on a large scale • Provide a self-service Company Portal for users to enroll their own devices and install corporate apps PC management • Provide lightweight, agentless management from the cloud • Connect Intune to System Center 2012 R2 Configuration Manager to manage all of your devices including PCs, Macs, Unix/Linux Servers, and mobile devices from a single management console • Provide real-time protection against malware threats on managed computers • Collect information about hardware configurations and software installed on managed computers • Deploy software based upon policies set by the administrator User
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 147.