SlideShare a Scribd company logo
Protecting Cloud Identities
- Enterprise Mobility + Security (EMS)
RONNI PEDERSEN
MICROSOFT MVP: ENTERPRISE MOBILITY
1© RONNIPEDERSEN.COM
Ronni Pedersen
Freelance Cloud Architect
Microsoft MVP: Enterprise Mobility (10 years)
Founder: System Center User Group Denmark
Microsoft Certified Trainer
Microsoft TechNet Moderator
Contact Me
Twitter: @ronnipedersen
Blog: https://www.ronnipedersen.com/
Mail: mail@ronnipedersen.com
Phone: +45 2085 9452About me...
Key Takeways
▪EMS Overview
▪Office 365 Risk Score
▪Privileged Identity Management
▪Identity Protection
▪Password Policies
▪Multi-factor authentication
▪Conditional Access
3© RONNIPEDERSEN.COM
Enterprise Mobility + Security
Overview
The world has changed…
5© RONNIPEDERSEN.COM
6© RONNIPEDERSEN.COM
7© RONNIPEDERSEN.COM
Hi… This is mom… Should I click on this?
8© RONNIPEDERSEN.COM
Office 365 Secure Score
State of the Union…
Office 365 Secure Score
▪Get your Secure Score
▪Analyzing Your Score
▪Take Action (Improve Your Score)
10© RONNIPEDERSEN.COM
Office 365 Secure Score:
- Mailbox Auditing in Office 365
Step 1: Connect to Exchange Online
Step 2: Get the current state of audit logging
Step 3: Enable mailbox audit logging
Step 4: Set the age limit for mailbox audit logging
Step 5: Automate the process using Azure Automation
Step by step guide:
https://www.ronnipedersen.com/2017/07/29/automate-mailbox-auditing-office-365/
11© RONNIPEDERSEN.COM
Azure AD Privileged Identity Management
Manage, control, and monitor access within your organization
Azure AD Privileged Identity Management
13© RONNIPEDERSEN.COM
Privileged Identity Management
Enforce on-demand, just-in-time
administrative access when needed
Ensure policies are met with alerts,
audit reports and access reviews
Manage admins access in Azure AD and
also in Azure RBAC
User Administrator UserAdministrator privileges
expire after a specified
interval
14© RONNIPEDERSEN.COM
Azure AD Privileged Identity Management
▪Manage, control, and monitor access within your organization
▪Includes resources in Azure AD, Office 365 or Microsoft Intune
▪Goal: minimize the number of people who have access to secure
information or resources
▪Enable on-demand, "just in time" administrative access to Microsoft
Online Services like Office 365 and Intune
▪Privileged identity management requires:
▪Azure AD Premium P2
▪Enterprise Mobility + Security (EMS) E5
15© RONNIPEDERSEN.COM
Azure AD Identity Protection
Protect and monitor identities…
Proactively prevent compromised identities from being abused!
▪Low
▪User sign-in from infected Device
▪Medium
▪User sign-in from unfamiliar locations
▪Impossible travel to atypical location
▪Sign-in from anonymous IP addresses
▪High
▪User with leaked credentials (up for sales)
Risky Sign-in
17© RONNIPEDERSEN.COM
18© RONNIPEDERSEN.COM
19© RONNIPEDERSEN.COM
Password Policies and Spray Attacks
45.000 Enterprise Accounts hacked by spray attacks in August 2017
#DeathToPasswords
PASSWORD SPRAY
▪Try common passwords against known account lists
BREACH REPLAY
▪Try stolen passwords from other sites
PHISH
▪Trick users into handing over their passwords
IF YOU HAVE PASSWORDS, YOU MUST USE MFA
Password Spray (aka Brute Force)
1. 123456
2. 123456789
3. qwerty
4. 111111
5. 12345678
6. 123123
7. password
8. 1234567
9. 12345
10. 1234567890
11. abc123
12. 123
13. 123321
14. password1
15. qwertyuiop
16. 666666
17. a123456
18. 1234
19. 654321
20. 5201314
21. 123456a
22. iloveyou
23© RONNIPEDERSEN.COM
24© RONNIPEDERSEN.COM
Password complexity requirements don’t help
▪Most people use similar patterns (i.e. capital letter in the first
position, a symbol in the last, and a number in the last two).
▪Example: Copenh@gen47
▪Cybercriminals run their dictionary attacks using the common
substitutions, such as "$" for "s", "@" for "a," "1" for "l" and so on.
25© RONNIPEDERSEN.COM
Password expiry does more harm than good
▪Users who are required to change their passwords frequently select
weaker passwords to begin with.
▪Users do not choose a new independent password; rather, they
choose an update of the old one.
▪Example:
▪Copenh@gen42
▪Copenh@gen43
▪Copenh@gen44
26© RONNIPEDERSEN.COM
Longer passwords are not necessarily better
▪Users who are required to have a 16-character password tend to
choose repeating patterns like fourfourfourfour or
passwordpassword.
▪Length requirements increase the chance of users:
▪Writing their passwords down
▪Re-using passwords
▪Storing them unencrypted on their PC
27© RONNIPEDERSEN.COM
Multi-factor authentication
Modern Authentication
Modern Authentication is the key to success when activating MFA !!!
▪Turned off for Exchange Online by default.
▪Turned on for SharePoint Online by default.
▪Turned off for Skype for Business Online by default.
OFF = App Password (Bad End User Experience)
Enable modern authentication for Skype for Business Online
▪ https://www.ronnipedersen.com/2017/07/11/enable-modern-authentication-for-skype-for-
business-online/
29© RONNIPEDERSEN.COM
Modern Authentication
- Exchange Online
▪Enables authentication features like
▪ Multi-factor authentication (MFA) using smart cards
▪ Certificate-based authentication (CBA)
▪ Third-party SAML identity providers
▪Modern authentication is based on the ADAL and OAuth 2.0
▪Set-OrganizationConfig -OAuth2ClientProfileEnabled $true
30© RONNIPEDERSEN.COM
Basic vs. Modern Authentication
31© RONNIPEDERSEN.COM
Azure Automation (Runbook)
- Enable Azure MFA
Runbook Overview
▪Connect to the Tenant
▪Set Custom MFA Settings
▪Get all users with a license
▪Enable MFA for the user
Schedule Recommendation:
▪ Every day
Look out for new blog post!
32© RONNIPEDERSEN.COM
Secure Guest Access with Azure MFA
Require MFA using Conditional Access
Identify External Guest Users
▪ Azure AD Group
▪Dynamic Membership
▪userType Equals Guest
34© RONNIPEDERSEN.COM
Require MFA for Guest Users
Conditional Access Rule
▪All Guest Users
▪Microsoft Teams
▪Require MFA
35© RONNIPEDERSEN.COM
Conditional Access
“Limited Access”
- SharePoint and OneDrive
▪Enabling productivity while securing data
▪ Secure, Productive Enterprise
▪Allow access to SharePoint and OneDrive
▪ Unmanaged Device
▪ Browser-Only Access
▪ Download, Print, and Sync Disabled
▪Announcement:
▪ https://blogs.technet.microsoft.com/enterprisemobility/2017/03/09/co
nditional-access-limited-access-policies-for-sharepoint-are-in-public-
preview/
37© RONNIPEDERSEN.COM
Device Registration / Compliant
▪DJ++
▪ Hybrid Identity (Domain Joined + Device Registered in Azure AD)
▪Azure AD Joined
▪ Cloud Only (Azure AD Joined)
▪Workplace Joined
▪ ”Workgroup” (No Domain or Azure AD Joined)
38© RONNIPEDERSEN.COM
Azure AD Joined (Example)
Command: dsregcmd /status
My Work PC: 6cec6a69-ea4d-4618-b903-98acc2e6d446
39© RONNIPEDERSEN.COM
Device Trust Type
40© RONNIPEDERSEN.COM
Thanks to our event sponsors
Silver
Gold
Thank you!
42© RONNIPEDERSEN.COM

More Related Content

What's hot

Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
David J Rosenthal
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
Perficient, Inc.
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Ronni Pedersen
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
David J Rosenthal
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Ammar Hasayen
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
Robert Crane
 
Securing Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 InvestmentsSecuring Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 Investments
Chris Bortlik
 
Windows 10 Modern Management
Windows 10 Modern ManagementWindows 10 Modern Management
Windows 10 Modern Management
David J Rosenthal
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
DavidNicholls52
 
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Chris Bortlik
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
Jeannette Browning
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Moshe Ferber
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
Andrew Bettany
 
Securing your Azure Identity Infrastructure
Securing your Azure Identity InfrastructureSecuring your Azure Identity Infrastructure
Securing your Azure Identity Infrastructure
Vignesh Ganesan I Microsoft MVP
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
Atanas Gergiminov
 
Securely logging to Microsoft 365
Securely logging to Microsoft 365Securely logging to Microsoft 365
Securely logging to Microsoft 365
Robert Crane
 
Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019
Ammar Hasayen
 
How to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual DesktopHow to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual Desktop
Abdulghani Alkhateeb
 

What's hot (20)

Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Securing Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 InvestmentsSecuring Governing and Protecting Your Office 365 Investments
Securing Governing and Protecting Your Office 365 Investments
 
Windows 10 Modern Management
Windows 10 Modern ManagementWindows 10 Modern Management
Windows 10 Modern Management
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Securing your Azure Identity Infrastructure
Securing your Azure Identity InfrastructureSecuring your Azure Identity Infrastructure
Securing your Azure Identity Infrastructure
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
 
Securely logging to Microsoft 365
Securely logging to Microsoft 365Securely logging to Microsoft 365
Securely logging to Microsoft 365
 
Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019
 
How to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual DesktopHow to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual Desktop
 

Similar to SCUGBE_Lowlands_Unite_2017_Protecting cloud identities

Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 
DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319
Martin Sandren
 
Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017
Jake Borzym
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Benedek Menesi
 
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
panagenda
 
Office 365 Portugal_20150711_Meet2_INTRO.PPTX
Office 365 Portugal_20150711_Meet2_INTRO.PPTXOffice 365 Portugal_20150711_Meet2_INTRO.PPTX
Office 365 Portugal_20150711_Meet2_INTRO.PPTX
Joao Livio
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Symantec Brasil
 
Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar Presentation
Patrick Leckie
 
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
NowSecure
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
Spanning Cloud Apps
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
Peter De Tender
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
HYPR
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
OneLogin
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
NovaQuantum
 
Password less auth using Azure AD
Password less auth using Azure ADPassword less auth using Azure AD
Password less auth using Azure AD
CloudFronts Technologies LLP.
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 Enterprise
Robert Crane
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
CloudLock
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
ForgeRock
 
ECS19 - Jussi Roine - Microsoft 365 Deep Dive
ECS19 - Jussi Roine - Microsoft 365 Deep DiveECS19 - Jussi Roine - Microsoft 365 Deep Dive
ECS19 - Jussi Roine - Microsoft 365 Deep Dive
European Collaboration Summit
 
Wrong slides! Please check description for correct deck
Wrong slides! Please check description for correct deck Wrong slides! Please check description for correct deck
Wrong slides! Please check description for correct deck
Benedek Menesi
 

Similar to SCUGBE_Lowlands_Unite_2017_Protecting cloud identities (20)

Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319
 
Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
 
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
 
Office 365 Portugal_20150711_Meet2_INTRO.PPTX
Office 365 Portugal_20150711_Meet2_INTRO.PPTXOffice 365 Portugal_20150711_Meet2_INTRO.PPTX
Office 365 Portugal_20150711_Meet2_INTRO.PPTX
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar Presentation
 
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
 
Password less auth using Azure AD
Password less auth using Azure ADPassword less auth using Azure AD
Password less auth using Azure AD
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 Enterprise
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
ECS19 - Jussi Roine - Microsoft 365 Deep Dive
ECS19 - Jussi Roine - Microsoft 365 Deep DiveECS19 - Jussi Roine - Microsoft 365 Deep Dive
ECS19 - Jussi Roine - Microsoft 365 Deep Dive
 
Wrong slides! Please check description for correct deck
Wrong slides! Please check description for correct deck Wrong slides! Please check description for correct deck
Wrong slides! Please check description for correct deck
 

More from Kenny Buntinx

Llunitebe2018 configuring a cmg in config mgr cb
Llunitebe2018 configuring a cmg in config mgr cbLlunitebe2018 configuring a cmg in config mgr cb
Llunitebe2018 configuring a cmg in config mgr cb
Kenny Buntinx
 
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.wayLlunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Kenny Buntinx
 
Llunitebe2018 worst config mgr cb mistakes
Llunitebe2018 worst config mgr cb mistakesLlunitebe2018 worst config mgr cb mistakes
Llunitebe2018 worst config mgr cb mistakes
Kenny Buntinx
 
Llunitebe2018 windows 10 security features
Llunitebe2018 windows 10 security featuresLlunitebe2018 windows 10 security features
Llunitebe2018 windows 10 security features
Kenny Buntinx
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Kenny Buntinx
 
Llunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practiceLlunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practice
Kenny Buntinx
 
Llunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beerLlunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beer
Kenny Buntinx
 
SCUGBE_Lowlands_Unite_2017_1E tachyon
SCUGBE_Lowlands_Unite_2017_1E tachyonSCUGBE_Lowlands_Unite_2017_1E tachyon
SCUGBE_Lowlands_Unite_2017_1E tachyon
Kenny Buntinx
 
SCUGBE_Lowlands_Unite_2017_Managing Windows Containers with Docker
SCUGBE_Lowlands_Unite_2017_Managing Windows Containers with DockerSCUGBE_Lowlands_Unite_2017_Managing Windows Containers with Docker
SCUGBE_Lowlands_Unite_2017_Managing Windows Containers with Docker
Kenny Buntinx
 
SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.
SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.
SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.
Kenny Buntinx
 
SCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdmin
SCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdminSCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdmin
SCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdmin
Kenny Buntinx
 
SCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clients
SCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clientsSCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clients
SCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clients
Kenny Buntinx
 
ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...
ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...
ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...
Kenny Buntinx
 
ECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site Review
ECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site ReviewECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site Review
ECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site Review
Kenny Buntinx
 
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...
Kenny Buntinx
 
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Keynote
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - KeynoteECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Keynote
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Keynote
Kenny Buntinx
 
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
Kenny Buntinx
 
ECMDAY2015 - Kaido Jarvemets - Managing Configuration Manager with PowerShell
ECMDAY2015 - Kaido Jarvemets -  Managing Configuration Manager with PowerShellECMDAY2015 - Kaido Jarvemets -  Managing Configuration Manager with PowerShell
ECMDAY2015 - Kaido Jarvemets - Managing Configuration Manager with PowerShell
Kenny Buntinx
 
Scom how to tune and tame the beast
Scom how to tune and tame the beastScom how to tune and tame the beast
Scom how to tune and tame the beast
Kenny Buntinx
 
Best ofmms2013didiervanhoye
Best ofmms2013didiervanhoyeBest ofmms2013didiervanhoye
Best ofmms2013didiervanhoye
Kenny Buntinx
 

More from Kenny Buntinx (20)

Llunitebe2018 configuring a cmg in config mgr cb
Llunitebe2018 configuring a cmg in config mgr cbLlunitebe2018 configuring a cmg in config mgr cb
Llunitebe2018 configuring a cmg in config mgr cb
 
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.wayLlunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
 
Llunitebe2018 worst config mgr cb mistakes
Llunitebe2018 worst config mgr cb mistakesLlunitebe2018 worst config mgr cb mistakes
Llunitebe2018 worst config mgr cb mistakes
 
Llunitebe2018 windows 10 security features
Llunitebe2018 windows 10 security featuresLlunitebe2018 windows 10 security features
Llunitebe2018 windows 10 security features
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
 
Llunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practiceLlunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practice
 
Llunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beerLlunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beer
 
SCUGBE_Lowlands_Unite_2017_1E tachyon
SCUGBE_Lowlands_Unite_2017_1E tachyonSCUGBE_Lowlands_Unite_2017_1E tachyon
SCUGBE_Lowlands_Unite_2017_1E tachyon
 
SCUGBE_Lowlands_Unite_2017_Managing Windows Containers with Docker
SCUGBE_Lowlands_Unite_2017_Managing Windows Containers with DockerSCUGBE_Lowlands_Unite_2017_Managing Windows Containers with Docker
SCUGBE_Lowlands_Unite_2017_Managing Windows Containers with Docker
 
SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.
SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.
SCUGBE_Lowlands_Unite_2017_Servicing your new Windows workplace like a boss.
 
SCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdmin
SCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdminSCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdmin
SCUGBE_Lowlands_Unite_2017_Ransomware vs. SysAdmin
 
SCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clients
SCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clientsSCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clients
SCUGBE_Lowlands_Unite_2017_How to manage office 2016 on today’s clients
 
ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...
ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...
ECMDay2015 - Kim Oppalfens – Microsoft System Center Configuration Manager: H...
 
ECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site Review
ECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site ReviewECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site Review
ECMDay2015 - Kent Agerlund – Configuration Manager 2012 – A Site Review
 
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Armoring your mobile workfor...
 
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Keynote
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - KeynoteECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Keynote
ECMDay2015 - Kenny Buntinx - Tim De Keukelaere - Keynote
 
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
 
ECMDAY2015 - Kaido Jarvemets - Managing Configuration Manager with PowerShell
ECMDAY2015 - Kaido Jarvemets -  Managing Configuration Manager with PowerShellECMDAY2015 - Kaido Jarvemets -  Managing Configuration Manager with PowerShell
ECMDAY2015 - Kaido Jarvemets - Managing Configuration Manager with PowerShell
 
Scom how to tune and tame the beast
Scom how to tune and tame the beastScom how to tune and tame the beast
Scom how to tune and tame the beast
 
Best ofmms2013didiervanhoye
Best ofmms2013didiervanhoyeBest ofmms2013didiervanhoye
Best ofmms2013didiervanhoye
 

Recently uploaded

Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
1990 Media
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
Faculty of Medicine And Health Sciences
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 

Recently uploaded (19)

Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 

SCUGBE_Lowlands_Unite_2017_Protecting cloud identities

  • 1. Protecting Cloud Identities - Enterprise Mobility + Security (EMS) RONNI PEDERSEN MICROSOFT MVP: ENTERPRISE MOBILITY 1© RONNIPEDERSEN.COM
  • 2. Ronni Pedersen Freelance Cloud Architect Microsoft MVP: Enterprise Mobility (10 years) Founder: System Center User Group Denmark Microsoft Certified Trainer Microsoft TechNet Moderator Contact Me Twitter: @ronnipedersen Blog: https://www.ronnipedersen.com/ Mail: mail@ronnipedersen.com Phone: +45 2085 9452About me...
  • 3. Key Takeways ▪EMS Overview ▪Office 365 Risk Score ▪Privileged Identity Management ▪Identity Protection ▪Password Policies ▪Multi-factor authentication ▪Conditional Access 3© RONNIPEDERSEN.COM
  • 4. Enterprise Mobility + Security Overview
  • 5. The world has changed… 5© RONNIPEDERSEN.COM
  • 8. Hi… This is mom… Should I click on this? 8© RONNIPEDERSEN.COM
  • 9. Office 365 Secure Score State of the Union…
  • 10. Office 365 Secure Score ▪Get your Secure Score ▪Analyzing Your Score ▪Take Action (Improve Your Score) 10© RONNIPEDERSEN.COM
  • 11. Office 365 Secure Score: - Mailbox Auditing in Office 365 Step 1: Connect to Exchange Online Step 2: Get the current state of audit logging Step 3: Enable mailbox audit logging Step 4: Set the age limit for mailbox audit logging Step 5: Automate the process using Azure Automation Step by step guide: https://www.ronnipedersen.com/2017/07/29/automate-mailbox-auditing-office-365/ 11© RONNIPEDERSEN.COM
  • 12. Azure AD Privileged Identity Management Manage, control, and monitor access within your organization
  • 13. Azure AD Privileged Identity Management 13© RONNIPEDERSEN.COM
  • 14. Privileged Identity Management Enforce on-demand, just-in-time administrative access when needed Ensure policies are met with alerts, audit reports and access reviews Manage admins access in Azure AD and also in Azure RBAC User Administrator UserAdministrator privileges expire after a specified interval 14© RONNIPEDERSEN.COM
  • 15. Azure AD Privileged Identity Management ▪Manage, control, and monitor access within your organization ▪Includes resources in Azure AD, Office 365 or Microsoft Intune ▪Goal: minimize the number of people who have access to secure information or resources ▪Enable on-demand, "just in time" administrative access to Microsoft Online Services like Office 365 and Intune ▪Privileged identity management requires: ▪Azure AD Premium P2 ▪Enterprise Mobility + Security (EMS) E5 15© RONNIPEDERSEN.COM
  • 16. Azure AD Identity Protection Protect and monitor identities… Proactively prevent compromised identities from being abused!
  • 17. ▪Low ▪User sign-in from infected Device ▪Medium ▪User sign-in from unfamiliar locations ▪Impossible travel to atypical location ▪Sign-in from anonymous IP addresses ▪High ▪User with leaked credentials (up for sales) Risky Sign-in 17© RONNIPEDERSEN.COM
  • 20.
  • 21. Password Policies and Spray Attacks 45.000 Enterprise Accounts hacked by spray attacks in August 2017
  • 22. #DeathToPasswords PASSWORD SPRAY ▪Try common passwords against known account lists BREACH REPLAY ▪Try stolen passwords from other sites PHISH ▪Trick users into handing over their passwords IF YOU HAVE PASSWORDS, YOU MUST USE MFA
  • 23. Password Spray (aka Brute Force) 1. 123456 2. 123456789 3. qwerty 4. 111111 5. 12345678 6. 123123 7. password 8. 1234567 9. 12345 10. 1234567890 11. abc123 12. 123 13. 123321 14. password1 15. qwertyuiop 16. 666666 17. a123456 18. 1234 19. 654321 20. 5201314 21. 123456a 22. iloveyou 23© RONNIPEDERSEN.COM
  • 25. Password complexity requirements don’t help ▪Most people use similar patterns (i.e. capital letter in the first position, a symbol in the last, and a number in the last two). ▪Example: Copenh@gen47 ▪Cybercriminals run their dictionary attacks using the common substitutions, such as "$" for "s", "@" for "a," "1" for "l" and so on. 25© RONNIPEDERSEN.COM
  • 26. Password expiry does more harm than good ▪Users who are required to change their passwords frequently select weaker passwords to begin with. ▪Users do not choose a new independent password; rather, they choose an update of the old one. ▪Example: ▪Copenh@gen42 ▪Copenh@gen43 ▪Copenh@gen44 26© RONNIPEDERSEN.COM
  • 27. Longer passwords are not necessarily better ▪Users who are required to have a 16-character password tend to choose repeating patterns like fourfourfourfour or passwordpassword. ▪Length requirements increase the chance of users: ▪Writing their passwords down ▪Re-using passwords ▪Storing them unencrypted on their PC 27© RONNIPEDERSEN.COM
  • 29. Modern Authentication Modern Authentication is the key to success when activating MFA !!! ▪Turned off for Exchange Online by default. ▪Turned on for SharePoint Online by default. ▪Turned off for Skype for Business Online by default. OFF = App Password (Bad End User Experience) Enable modern authentication for Skype for Business Online ▪ https://www.ronnipedersen.com/2017/07/11/enable-modern-authentication-for-skype-for- business-online/ 29© RONNIPEDERSEN.COM
  • 30. Modern Authentication - Exchange Online ▪Enables authentication features like ▪ Multi-factor authentication (MFA) using smart cards ▪ Certificate-based authentication (CBA) ▪ Third-party SAML identity providers ▪Modern authentication is based on the ADAL and OAuth 2.0 ▪Set-OrganizationConfig -OAuth2ClientProfileEnabled $true 30© RONNIPEDERSEN.COM
  • 31. Basic vs. Modern Authentication 31© RONNIPEDERSEN.COM
  • 32. Azure Automation (Runbook) - Enable Azure MFA Runbook Overview ▪Connect to the Tenant ▪Set Custom MFA Settings ▪Get all users with a license ▪Enable MFA for the user Schedule Recommendation: ▪ Every day Look out for new blog post! 32© RONNIPEDERSEN.COM
  • 33. Secure Guest Access with Azure MFA Require MFA using Conditional Access
  • 34. Identify External Guest Users ▪ Azure AD Group ▪Dynamic Membership ▪userType Equals Guest 34© RONNIPEDERSEN.COM
  • 35. Require MFA for Guest Users Conditional Access Rule ▪All Guest Users ▪Microsoft Teams ▪Require MFA 35© RONNIPEDERSEN.COM
  • 37. “Limited Access” - SharePoint and OneDrive ▪Enabling productivity while securing data ▪ Secure, Productive Enterprise ▪Allow access to SharePoint and OneDrive ▪ Unmanaged Device ▪ Browser-Only Access ▪ Download, Print, and Sync Disabled ▪Announcement: ▪ https://blogs.technet.microsoft.com/enterprisemobility/2017/03/09/co nditional-access-limited-access-policies-for-sharepoint-are-in-public- preview/ 37© RONNIPEDERSEN.COM
  • 38. Device Registration / Compliant ▪DJ++ ▪ Hybrid Identity (Domain Joined + Device Registered in Azure AD) ▪Azure AD Joined ▪ Cloud Only (Azure AD Joined) ▪Workplace Joined ▪ ”Workgroup” (No Domain or Azure AD Joined) 38© RONNIPEDERSEN.COM
  • 39. Azure AD Joined (Example) Command: dsregcmd /status My Work PC: 6cec6a69-ea4d-4618-b903-98acc2e6d446 39© RONNIPEDERSEN.COM
  • 40. Device Trust Type 40© RONNIPEDERSEN.COM
  • 41. Thanks to our event sponsors Silver Gold