SlideShare ist ein Scribd-Unternehmen logo
1 von 60
Scott Hoag
Principal Cloud Solutions Architect, Opsgility
Co-host Microsoft Cloud IT Pro Podcast
www.linkedin.com/in/scottmhoag@ciphertxt
shoag@opsgility.com msclouditpro.com
DETECT
PROTECT
CLASSIFYMONITOR
MICROSOFT’S
INFORMATION
PROTECTION
SOLUTIONS
WINDOWS INFORMATION PROTECTION
Separate personal vs. work data on Windows 10 devices and
prevent work data from traveling to non-work locations
OFFICE 365 ADVANCED SECURITY MANAGEMENT
Visibility into Office 365 app usage and potential
data abuse
MICROSOFT CLOUD APP SECURITY
Visibility into 15k+ cloud apps, data access & usage,
potential abuse
MESSAGE ENCRYPTION
Send encrypted emails in Office 365 to anyone –
inside or outside of the company
CONDITIONAL ACCESS
Control access to files based on policy, such as identity,
machine configuration, geo location
OFFICE APPS
Protect sensitive information while working in Excel, Word,
PowerPoint, Outlook
AZURE INFORMATION PROTECTION
Classify, label & protect files – beyond Office 365, including
on-prem & hybrid
OFFICE 365 DLP
Prevent data loss across Exchange Online, SharePoint Online,
OneDrive for Business
ISV APPLICATIONS
Enable ISV partners to consume labels, apply protection
OFFICE 365 ADVANCED DATA GOVERNANCE
Apply retention and deletion policies to sensitive and
important data in Office 365
SHAREPOINT & GROUPS
Protect files in libraries and lists
Microsoft’s information protection solutions
Data governance &
rights management
Responsibility SaaS PaaS IaaS On-prem
Client endpoints
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
Data governance &
rights management
Responsibility SaaS PaaS IaaS On-prem
Client endpoints
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
Security Updates / Patches
Software / Feature Upgrades
Server Maintenance/Troubleshooting
Server Uptime ( SLA from Microsoft)
Backup and Archive solution
Office 365
Data governance &
rights management
Responsibility SaaS PaaS IaaS On-prem
Client endpoints
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
Attacks on
Operating System (OS) and OS Admins
Application attacks
Hardware/Firmware
Denial of Service
Physical Attacks
Office 365
Data governance &
rights management
Responsibility SaaS PaaS IaaS On-prem
Client endpoints
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
Directly connected to internet
User services and interfaces
Administrative interfaces
Implications
Authentication Security is Critical
Multi-factor authentication
Per user (UEBA) anomaly detection across full context
(time, date, geolocation)
Integration of security intelligence
Tenant Security
Configuration is critical
Data governance &
rights management
Responsibility SaaS PaaS IaaS On-prem
Client endpoints
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
Notable trends
Identity Attacks
Password Spray
Brute Force
Password Re-use
App/Data Layer attacks
Social engineering
Delegation and forwarding rule attacks
PowerShell scripts in attacks
Data governance &
rights management
Responsibility SaaS PaaS IaaS On-prem
Client endpoints
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
Control plane
PowerShell for administration
Cloud + Browser Authentication Model (changes
protocols, logs, auth flows, etc. )
Consistent Logs are conducive to off the shelf analytics
(e.g. a CASB like MCAS)
Regular release of features and changes
(configurable, but not customizable)
Implications
Always Current Features
Security must regularly review updates
Office 365 Roadmap | O365 Update Series on YouTube
Azure
Active
Directory
Windows Server
Active Directory
Azure
Public cloud
Microsoft Azure
Active Directory
Commercial
IdPs
Consumer
IdPs
Partners
Customers
Azure AD
Connect
I want to provide my employees secure
and easy access to every application
from any location and any device
I need my customers, partners, and users to
access the apps they need from everywhere
and collaborate seamlessly
I want to quickly deploy applications to
devices, do more with less and automate
Join/Move/Leave processes
[dev use case]
I want to protect access to my
resources from advanced threats
I need to comply with industry regulation
and national data protection laws
Conditional
Access
Multi-Factor
Authentication
Addition of
custom cloud
apps
Remote Access
to on-premises
apps
Privileged
Identity
Management
Dynamic Groups
Identity
Protection
Azure AD DS
Office 365 App
Launcher
Group-Based
Licensing
Access
Panel/MyApps
Azure AD
Connect
Connect Health
Provisioning-
Deprovisioning
Azure AD Join
Self-Service
capabilities
MDM-auto
enrollment /
Enterprise State
Roaming
Security
Reporting
Access Reviews
HR App
Integration
B2B
collaboration
Azure AD
B2C
SSO to SaaS
Microsoft
Authenticator -
Password-less
Access
I want to provide my employees secure
and easy access to every application
from any location and any device
I need my customers and partners
to access the apps they need from
everywhere and collaborate seamlessly
I want to quickly deploy applications to
devices, do more with less and automate
Join/Move/Leave processes
I want to write applications that work with my
corporate identities in Azure Active Directory
I want to protect access to my
resources from advanced threats
I need to comply with industry regulation
and national data protection laws
Conditional
Access
Multi-Factor
Authentication
Addition of
custom cloud
apps
Remote Access
to on-premises
apps
Privileged
Identity
Management
Dynamic Groups
Identity
Protection
Azure AD DS
Office 365 App
Launcher
Group-Based
Licensing
Access
Panel/MyApps
Azure AD
Connect
Connect Health
Provisioning-
Deprovisioning
Azure AD Join
Self-Service
capabilities
MDM-auto
enrollment /
Enterprise State
Roaming
Security
Reporting
Access Reviews
HR App
Integration
B2B
collaboration
Azure AD
B2C
SSO to SaaS
Microsoft
Authenticator -
Password-less
Access
1
2
3
4
5
6
Microsoft Azure
Active Directory
Remote Access
to on-premises
apps
Azure AD
Connect
SSO to SaaS
Access
Panel/MyApps
Self-Service
capabilities
Azure AD DS
Microsoft
Authenticator -
Password-less
Access
Office 365 App
Launcher
Conditional
Access
Multi-Factor
Authentication
Azure AD
Connect
On-
premises
I want to provide my employees secure
and easy access to every application
from any location and any device
1
Identity synchronization
using Azure AD
Connect
On-
premises
Password validation requests are sent
to Windows Server Active Directory
via Pass-through authentication
Pass-through
authentication
Microsoft Azure
Active Directory
Pass-through
authentication agent
Office 365, SaaS, and LoB apps
DMZ
https://appX-contoso.msappproxy.net/
connectorconnector
Microsoft Azure
Active Directory
connector
app app app app
connector
Application
Proxy
Azure or
3rd Party IaaS
On-premises
applicationsBlock access
Wipe device
Enforce
MFA
Conditions
MFA
Location
(IP range)
Device
state
Risk
User
group
Allow access
Multi-Factor
Authentication
Conditional
Access
Privileged
Identity
Management
Identity
Protection
Remote Access
to on-premises
apps
SSO to SaaS
Security
Reporting
I want to protect access to my
resources from advanced threats2
Cloud apps
On-
premises
Conditional Access
Require MFA
Allow access
Deny access
Force
password reset******
Limit access
Controls
On-premises apps
Web apps
Users
Devices
Location
Apps
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
10TB
Effective
policy
CLOUD
APPS
CLOUD APP
SECURITY
Policy
Proxy
Conditional
Access
Azure AD
******
Deny access
Force
password reset
Limit access
THEN
Require MFA
Allow access
Microsoft Cloud
3rd Party SaaS Apps
On Premises Apps
Microsoft Azure
Prevent data leak
Disable print
Restrict download
Enforce MFA
Block sign-in
Allow sign-in
Access Control
Session Restrictions
OS Platform
Is Compliant / Domain joined
Is lost or stolen
Device Risk
Device
User identity
Group membership
Session Risk
User
Mobile or Cloud app
Per app policy
App
Location
IP range
Country / Region
ApplicationsPolicy Controls
Conditional Access
Policy Conditions
Windows
Defender
Azure AD
Identity
Protection
Service
Terms of Use
Partners
Sensitive
protection
Highly regulatedBaseline
protection
Aka.ms/m365docs
Application
Employee Contractor
Inside Corp Outside Corp
Inside Corp
Outside
CorpManaged
Device
BYOD
Managed
Device
BYOD
Exchange
Online OWA
Just Allow MFA Just Allow MFA for
Medium, Block
for high
MFA MFA
Outlook
Desktop App
Allow with
Win10 EDP or
Bitlocker
MAM with pin Allow with
Win10 EDP or
Bitlocker
MAM with pin MAM with pin MAM with pin
SharePoint
Online
Just Allow MFA and
reduced session
Just Allow MFA and
reduced session
MFA MFA and
reduced session
OneDrive for
Business
Allow with
Win10 EDP or
Bitlocker
MAM with pin Allow with
Win10 EDP or
Bitlocker
MAM with pint MAM with pin MAM with pin
Microsoft Azure
Active Directory
Windows Server
Active Directory
ADFS/WAP
MFA Service
Windows Server
Active Directory
10.10.23.24
https://aka.ms/CASPOEXO
SharePoint Online
5
7
1
6
Intune
Company Portal
Step 1: Enroll
device
Unified
Enrollment
2
4
3
Device object
- device id
- isManaged
- MDMStatus
8
Azure Active Directory
Containing data after it has been accessed
Managed apps
Personal appsPersonal apps
Managed apps Corporate
data
Personal
data
Protect corp data
Control sharing
and
downloading
ITMonitor and
restrict activity
via mobile app via browser
Exchange Online
Stateless Protocol
Translator (Azure)
5
7
1
6
Intune
2
Policy
- Approved
Client IDs
8
9
App Store / Google
Play
Step 1: Install
Microsoft
Authenticator /
Company Portal
3
Broker App
4
Outlook for
iOS/Android
Azure Active Directory
https://aka.ms/OutlookEMSTAP
https://aka.ms/spolimitedaccessdocs
Do Don’t
Use the Authenticator App
Exclude 1 Admin account from the policy
Enable Identity Protection
Users respond much more favorably to
conditional/situational MFA
Know how to debug Modern Auth issues
Know how to debug MFA authentications
Underestimate the complexity of hybrid CA
Assume users/business units will understand
why
Forget to about the last 5%. But don’t block
on them.
https://diagnostics.outlook.com/#/?env=ExRCA
Analytics
* Requires a P1 license
External Collaboration
Controls
https://aka.ms/b2bmechanics
Office 365 Groups
Guests Allowed To
Access Groups
MS Teams
Rely on Groups
external settings
Yes Guest AuthenticationYes
SharePoint Online
External Sharing
Allowed
Office 365 Groups
Owners Allowed to Add
Guests
MS Teams
Apps, Tabs Bots
Files/Notes/Wike
access granted
Access Denied
Teams owners
can add Guests
Only IT admin
can add Guests
App/Tab/Bot
access granted
Access Denied
Success
Fail
Success
Fail
Success
Fail
Authentication
Denied
No
Guest Addition
Denied
Disabled
Enforce on-demand, just-in-time
administrative access when needed
Ensure policies are met with alerts, audit
reports and access reviews
Manage admins access in Azure AD and also
in Azure RBAC
User Administrator
Discover, restrict, and monitor privileged identities
UserAdministrator
privileges expire after
a specified interval
Azure Specific
Controls
Y
A
X B
Unify security management and enable advanced threat protection for hybrid cloud workloads
Closing thoughts
Advanced Threat
Protection for email drives
the recommendation for E5
for all users with a mailbox.
Advanced Data
Governance capabilities are
used to automate
protection for data loss
prevention.
Compare all Office 365 for Business
Plans
Risk-based conditional
access and Cloud App
Security drive the
recommendation for EMS
E5.
Included with EMS E5.
Risk-based conditional
access can be used with
B2B accounts.
Every Azure AD paid license
includes rights to 5 B2B
collaboration users (5:1
model).
Compare all Enterprise Mobility +
Security Plans
Scott Hoag
Principal Cloud Solutions Architect, Opsgility
Co-host Microsoft Cloud IT Pro Podcast
www.linkedin.com/in/scottmhoag@ciphertxt
shoag@opsgility.com msclouditpro.com
© 2017 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at CloudAdopt@microsoft.com.
Introduction
See topics 2-12 for more information and resources.
July 2017
Planning and implementation guidance for fast-moving
organizations that have an increased threat profile
This topic is 1 of 12 in a series
Microsoft Security Guidance
for Election Campaigns and
Nonprofit Organizations
Election campaigns around the world are run by fast-moving organizations
with intensive collaboration patterns and security risks that rise with the
potential influence a win can achieve. They face challenges from
sophisticated actors that can deploy significant resources to breach an
organization. This solution demonstrates how to build an environment with
essential cloud services. It includes prescriptive security design for protecting
identities, email, and access from mobile devices.
Office 365 enterprise capabilities
Secure email and
calendars
Office suite and
Office Online
OneDrive for
Business
SharePoint Online
Business-class email protected with Exchange Online
Protection and Office 365 Advanced Threat Protection.
The latest Office apps for your PC and Mac, including
updates to protect your environment. Create and edit
documents from a browser.
1 TB of personal cloud storage that can be accessed from
anywhere and syncs with a PC/Mac for offline access.
Easily share documents with others and control who can
see and edit each file.
Office on PCs,
tablets, and phones
Fully installed Office experience across PCs, Macs,
Windows tablets, iPad® and Android tablets, and most
mobile devices.
Communications sites to keep your organization up to
date. Team sites and document libraries protected at the
appropriate level for the sensitivity of your data and
projects.
Online meetings
Host online meetings with audio, HD video, and web
conferencing over the Internet. Join meetings with a single
touch or click from the smartphone, tablet, or PC of your
choice.
Meeting broadcast
Broadcast Skype for Business meetings on the Internet for
up to 10,000 people, who can attend in a browser on
nearly any device. Meetings include real-time polling and
sentiment tracking.
Enterprise Mobility + Security (EMS) suite
Simplified identity
management
Centrally manage single sign-on across devices and
all of your SaaS and cloud applications.
Multi-factor
authentication
Strengthen sign-in authentication with verification
options, including phone calls, text messages, or
mobile app notifications.
Conditional access
Define policies that provide contextual controls at the
user, location, device, and app levels to allow, block,
or challenge user access.
Risk-based
conditional access
Protect apps and critical data in real time using
machine learning and the Microsoft Intelligent
Security Graph to block access when risk is detected.
Advanced security
reporting
Monitor suspicious activity with reporting, auditing,
and alerts, and mitigate potential security issues using
focused recommendations.
Mobile device
management
Enroll corporate and personal devices to provision
settings, enforce compliance, and protect your
corporate data.
Mobile application
management
Publish, configure, and update mobile apps on
enrolled and unenrolled devices, and secure or
remove app-associated corporate data.
Persistent data
protection
Encrypt sensitive data and define usage rights for
persistent protection regardless of where data is
stored or shared.
Microsoft Cloud
App Security
Gain visibility, control, and protection for your cloud-
based apps Identify threats, abnormal usage, and
other cloud security issues.
Azure PaaS analytics environment
Azure PaaS
Analytics
Recommended environment you can build using SQL
Data Warehouse and Azure Data Lake. Protect access to
this environment using the same capabilities as Office 365.
This solution includes capabilities across Office 365, Enterprise Mobility +
Security (EMS) suite, and Azure PaaS. EMS makes it possible to integrate
other cloud services and use the same identity provider, secure access
capabilities, and monitoring solutions across your entire environment.
This guidance includes only cloud services but you can also use these
recommendations with a hybrid on-premises environment.
Core cloud capabilities in this solution
Data governance &
rights management
Security responsibility SaaS PaaS IaaS On-prem
Client endpoints (devices)
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
By using Microsoft cloud services, you greatly reduce the attack surface you
are responsible for. This solution shows you how to configure the controls
that are provided for you to secure your data, devices, and identities.
Identity & directory infrastructure refers to integration with on-premises
directories. If you re using cloud-only accounts, this doesn t apply to you. The
guidance in this solution is designed for cloud-only environments, but can
also be used with hybrid environments with on-premises directories.
By using Microsoft cloud services, you greatly reduce the amount of work
required to keep your environment secure. Decades of engineering
experience has enabled Microsoft to develop leading-edge best practices in
the design and management of online services. Through industry-leading
security practices and unmatched experience running some of the largest
online services around the globe, Microsoft delivers enterprise cloud services
you can trust.
For more information, see Microsoft Cloud Security for Legal and Compliance
Professionals
Reduce your security responsibility
In addition to these cloud capabilities, Windows 10 includes capabilities that are
recommended for this solution. Windows 10 is not required.
1 2 3 4 5 6
7 8 9 10 11 12
© 2017 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at CloudAdopt@microsoft.com.July 2017
Microsoft Security Guidance
for Election Campaigns and
Nonprofit Organizations
Device protection and access
Azure Active Directory
Tenant domain accounts Azure B2B accounts
(without additional licensing)
Multi-factor authentication and conditional access
Mobile Application
Management (MAM)
Device enrollment and
management
Only one org can manage
a device
You can gain a lot of protection on devices, even for unmanaged BYOD
devices, by using capabilities in the EMS E5 suite.
First, understand what capabilities are available per account type. See the
illustration to the right.
This topic includes recommendations you can use as a starting point. You ll
need to make a few decisions to adjust these recommendations for your
environment.
 B2B accounts — Intune capabilities require additional licensing for B2B
users. For B2B users that have access to sensitive data, consider licensing
these with EMS E5 so you can apply Mobile Application Management
(MAM) capabilities.
 Managing devices — Choose whether to enroll devices into Intune for
management. Only one organization can be a management authority for
a device. Therefore, managing devices of B2B users might not be an option
because these devices might already be managed by their organization.
 Windows 10 — Windows 10 includes compelling security capabilities that
make this a recommendation for organizations with a high threat profile. At
a minimum, consider using Windows 10 for users who are the highest value
targets for cyber attacks.
Windows 10 security capabilities
(conditional access based on device compliance requires
device management)
Starting-point recommendation
This guidance is intended for lightweight, rapidly moving organizations.
These starting-point recommendations acknowledge that you might not have
a lot of control over the devices users bring to the environment. These
recommendations are also intended to provide a variety of options for
protecting devices, including data on the devices. Adjust this guidance for
your organization based on your threat profile.
This solution provides prescriptive guidance for protecting access to email,
files, and other resources with multi-factor authentication, conditional access
rules, and Intune management. The guidance is based on these starting-point
recommendations. You can adjust this guidance to support the decisions you
make for your environment.
Mac support for managed devices is coming soon.
Intune-managed BYOD PCs with device compliance policies to ensure the
health of these devices.
Latest versions of Office 2016, including updates.
Senior and strategic staff
IT staff
Analytics staff
Regular core staff
Field staff
Hourly paid contract staff
Consultants and vendors
Tenant domain accounts Azure B2B accounts
(without additional licensing)
Intune-managed PCs.
Windows 10 with BitLocker, Windows Defender, Windows Firewall, and
Windows Information Protection (WIP) as a minimum configuration.
If Windows 10 is not used, enroll PCs in Intune and use device compliance
policies to ensure the health of these devices.
Latest versions of Office 2016, including updates.
Conditional access rules requiring multi-factor authentication and apps that
support modern authentication.
Intune-managed phones/tablets. Phones registered with Azure AD for phone
authentication.
Approved phone/tablet apps from the app stores — apps that can be
managed by Intune Application Management.
Intune app management policies to protect business data on phones.
Phones registered with Azure AD for phone authentication.
Approved phone/tablet apps from the app stores—apps that can be
managed by Intune Application Management.
Intune application management policies to protect business data on phones.
Phones registered with Azure AD for phone authentication.
Conditional access rules requiring multi-factor authentication.
Approved phone/tablet apps from the app stores — apps that support
modern authentication.
Operations staff
This topic is 1 of 12 in a series 1 2 3 4 5 6
7 8 9 10 11 12
Planning and implementation guidance for fast-moving
organizations that have an increased threat profile
aka.ms/SecureCampaign
Office 365: Manage Identities using Azure AD connect
https://aka.ms/365enterpriseident
aka.ms/365Enterprise

Weitere ähnliche Inhalte

Was ist angesagt?

Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?Vignesh Ganesan I Microsoft MVP
 
Information Barriers in MS Teams
Information Barriers in MS TeamsInformation Barriers in MS Teams
Information Barriers in MS TeamsNanddeep Nachan
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
 
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...Morgan Simonsen
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD Peter Selch Dahl
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideDavid J Rosenthal
 
O365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav LulicO365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav LulicNCCOMMS
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Vignesh Ganesan I Microsoft MVP
 
Securely logging to Microsoft 365
Securely logging to Microsoft 365Securely logging to Microsoft 365
Securely logging to Microsoft 365Robert Crane
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAAmmar Hasayen
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
 
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...NCCOMMS
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...Jürgen Ambrosi
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
1. Day 1 - Office 365 Trainning
1. Day 1 - Office 365 Trainning1. Day 1 - Office 365 Trainning
1. Day 1 - Office 365 TrainningHuy Pham
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureSparkhound Inc.
 

Was ist angesagt? (20)

Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?
 
Information Barriers in MS Teams
Information Barriers in MS TeamsInformation Barriers in MS Teams
Information Barriers in MS Teams
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
 
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 
O365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav LulicO365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav Lulic
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory
 
Securely logging to Microsoft 365
Securely logging to Microsoft 365Securely logging to Microsoft 365
Securely logging to Microsoft 365
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
O365Con18 - Classify, Label and Protect your Data with Azure Information Prot...
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
1. Day 1 - Office 365 Trainning
1. Day 1 - Office 365 Trainning1. Day 1 - Office 365 Trainning
1. Day 1 - Office 365 Trainning
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft Azure
 

Ähnlich wie SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with Azure Active Directory

Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarRobert Crane
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAnoop Nair
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivityDiana Carolina Torres Viasus
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...SPS Paris
 
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Max Fritz
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?Olav Tvedt
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure adArjan Cornelissen
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Robert Crane
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)Luís Serra Libório
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice Corporation
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 

Ähnlich wie SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with Azure Active Directory (20)

Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - Ajay
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivity
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
 
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018Hitchhiker's Guide to Azure AD - SPS St Louis 2018
Hitchhiker's Guide to Azure AD - SPS St Louis 2018
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 

Mehr von Scott Hoag

Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterScott Hoag
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
 
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...Scott Hoag
 
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
 
JAXSPUG April 2016 - Staying in the Know with Office 365
JAXSPUG April 2016 - Staying in the Know with Office 365JAXSPUG April 2016 - Staying in the Know with Office 365
JAXSPUG April 2016 - Staying in the Know with Office 365Scott Hoag
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365Scott Hoag
 
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePointSPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePointScott Hoag
 
SPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst PracticesSPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst PracticesScott Hoag
 
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...Scott Hoag
 
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SYDSP  - Office 365 and Cloud Identity - What does it mean for me?SYDSP  - Office 365 and Cloud Identity - What does it mean for me?
SYDSP - Office 365 and Cloud Identity - What does it mean for me?Scott Hoag
 
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?Scott Hoag
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
 
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePointSPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePointScott Hoag
 
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...Scott Hoag
 
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?Scott Hoag
 
SPSCBR - Pitfalls of Migrating to SharePoint 2013
SPSCBR - Pitfalls of Migrating to SharePoint 2013SPSCBR - Pitfalls of Migrating to SharePoint 2013
SPSCBR - Pitfalls of Migrating to SharePoint 2013Scott Hoag
 
Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?Scott Hoag
 
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013Scott Hoag
 
Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013 Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013 Scott Hoag
 
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…Scott Hoag
 

Mehr von Scott Hoag (20)

Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
 
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
 
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
 
JAXSPUG April 2016 - Staying in the Know with Office 365
JAXSPUG April 2016 - Staying in the Know with Office 365JAXSPUG April 2016 - Staying in the Know with Office 365
JAXSPUG April 2016 - Staying in the Know with Office 365
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
 
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePointSPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
 
SPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst PracticesSPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst Practices
 
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
 
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SYDSP  - Office 365 and Cloud Identity - What does it mean for me?SYDSP  - Office 365 and Cloud Identity - What does it mean for me?
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
 
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
 
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePointSPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
 
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
 
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
 
SPSCBR - Pitfalls of Migrating to SharePoint 2013
SPSCBR - Pitfalls of Migrating to SharePoint 2013SPSCBR - Pitfalls of Migrating to SharePoint 2013
SPSCBR - Pitfalls of Migrating to SharePoint 2013
 
Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?
 
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
 
Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013 Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
Sydney SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
 
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with Azure Active Directory

  • 1.
  • 2.
  • 3. Scott Hoag Principal Cloud Solutions Architect, Opsgility Co-host Microsoft Cloud IT Pro Podcast www.linkedin.com/in/scottmhoag@ciphertxt shoag@opsgility.com msclouditpro.com
  • 4. DETECT PROTECT CLASSIFYMONITOR MICROSOFT’S INFORMATION PROTECTION SOLUTIONS WINDOWS INFORMATION PROTECTION Separate personal vs. work data on Windows 10 devices and prevent work data from traveling to non-work locations OFFICE 365 ADVANCED SECURITY MANAGEMENT Visibility into Office 365 app usage and potential data abuse MICROSOFT CLOUD APP SECURITY Visibility into 15k+ cloud apps, data access & usage, potential abuse MESSAGE ENCRYPTION Send encrypted emails in Office 365 to anyone – inside or outside of the company CONDITIONAL ACCESS Control access to files based on policy, such as identity, machine configuration, geo location OFFICE APPS Protect sensitive information while working in Excel, Word, PowerPoint, Outlook AZURE INFORMATION PROTECTION Classify, label & protect files – beyond Office 365, including on-prem & hybrid OFFICE 365 DLP Prevent data loss across Exchange Online, SharePoint Online, OneDrive for Business ISV APPLICATIONS Enable ISV partners to consume labels, apply protection OFFICE 365 ADVANCED DATA GOVERNANCE Apply retention and deletion policies to sensitive and important data in Office 365 SHAREPOINT & GROUPS Protect files in libraries and lists Microsoft’s information protection solutions
  • 5. Data governance & rights management Responsibility SaaS PaaS IaaS On-prem Client endpoints Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts
  • 6. Data governance & rights management Responsibility SaaS PaaS IaaS On-prem Client endpoints Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts Security Updates / Patches Software / Feature Upgrades Server Maintenance/Troubleshooting Server Uptime ( SLA from Microsoft) Backup and Archive solution Office 365
  • 7. Data governance & rights management Responsibility SaaS PaaS IaaS On-prem Client endpoints Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts Attacks on Operating System (OS) and OS Admins Application attacks Hardware/Firmware Denial of Service Physical Attacks Office 365
  • 8. Data governance & rights management Responsibility SaaS PaaS IaaS On-prem Client endpoints Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts Directly connected to internet User services and interfaces Administrative interfaces Implications Authentication Security is Critical Multi-factor authentication Per user (UEBA) anomaly detection across full context (time, date, geolocation) Integration of security intelligence Tenant Security Configuration is critical
  • 9. Data governance & rights management Responsibility SaaS PaaS IaaS On-prem Client endpoints Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts Notable trends Identity Attacks Password Spray Brute Force Password Re-use App/Data Layer attacks Social engineering Delegation and forwarding rule attacks PowerShell scripts in attacks
  • 10. Data governance & rights management Responsibility SaaS PaaS IaaS On-prem Client endpoints Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts Control plane PowerShell for administration Cloud + Browser Authentication Model (changes protocols, logs, auth flows, etc. ) Consistent Logs are conducive to off the shelf analytics (e.g. a CASB like MCAS) Regular release of features and changes (configurable, but not customizable) Implications Always Current Features Security must regularly review updates Office 365 Roadmap | O365 Update Series on YouTube
  • 12. Windows Server Active Directory Azure Public cloud Microsoft Azure Active Directory Commercial IdPs Consumer IdPs Partners Customers Azure AD Connect
  • 13. I want to provide my employees secure and easy access to every application from any location and any device I need my customers, partners, and users to access the apps they need from everywhere and collaborate seamlessly I want to quickly deploy applications to devices, do more with less and automate Join/Move/Leave processes [dev use case] I want to protect access to my resources from advanced threats I need to comply with industry regulation and national data protection laws Conditional Access Multi-Factor Authentication Addition of custom cloud apps Remote Access to on-premises apps Privileged Identity Management Dynamic Groups Identity Protection Azure AD DS Office 365 App Launcher Group-Based Licensing Access Panel/MyApps Azure AD Connect Connect Health Provisioning- Deprovisioning Azure AD Join Self-Service capabilities MDM-auto enrollment / Enterprise State Roaming Security Reporting Access Reviews HR App Integration B2B collaboration Azure AD B2C SSO to SaaS Microsoft Authenticator - Password-less Access
  • 14. I want to provide my employees secure and easy access to every application from any location and any device I need my customers and partners to access the apps they need from everywhere and collaborate seamlessly I want to quickly deploy applications to devices, do more with less and automate Join/Move/Leave processes I want to write applications that work with my corporate identities in Azure Active Directory I want to protect access to my resources from advanced threats I need to comply with industry regulation and national data protection laws Conditional Access Multi-Factor Authentication Addition of custom cloud apps Remote Access to on-premises apps Privileged Identity Management Dynamic Groups Identity Protection Azure AD DS Office 365 App Launcher Group-Based Licensing Access Panel/MyApps Azure AD Connect Connect Health Provisioning- Deprovisioning Azure AD Join Self-Service capabilities MDM-auto enrollment / Enterprise State Roaming Security Reporting Access Reviews HR App Integration B2B collaboration Azure AD B2C SSO to SaaS Microsoft Authenticator - Password-less Access 1 2 3 4 5 6
  • 15. Microsoft Azure Active Directory Remote Access to on-premises apps Azure AD Connect SSO to SaaS Access Panel/MyApps Self-Service capabilities Azure AD DS Microsoft Authenticator - Password-less Access Office 365 App Launcher Conditional Access Multi-Factor Authentication Azure AD Connect On- premises I want to provide my employees secure and easy access to every application from any location and any device 1
  • 16. Identity synchronization using Azure AD Connect On- premises Password validation requests are sent to Windows Server Active Directory via Pass-through authentication Pass-through authentication Microsoft Azure Active Directory Pass-through authentication agent Office 365, SaaS, and LoB apps
  • 18. On-premises applicationsBlock access Wipe device Enforce MFA Conditions MFA Location (IP range) Device state Risk User group Allow access Multi-Factor Authentication Conditional Access Privileged Identity Management Identity Protection Remote Access to on-premises apps SSO to SaaS Security Reporting I want to protect access to my resources from advanced threats2 Cloud apps On- premises
  • 20. Require MFA Allow access Deny access Force password reset****** Limit access Controls On-premises apps Web apps Users Devices Location Apps Conditions Machine learning Policies Real time Evaluation Engine Session Risk 3 10TB Effective policy
  • 21. CLOUD APPS CLOUD APP SECURITY Policy Proxy Conditional Access Azure AD ****** Deny access Force password reset Limit access THEN Require MFA Allow access
  • 22. Microsoft Cloud 3rd Party SaaS Apps On Premises Apps Microsoft Azure Prevent data leak Disable print Restrict download Enforce MFA Block sign-in Allow sign-in Access Control Session Restrictions OS Platform Is Compliant / Domain joined Is lost or stolen Device Risk Device User identity Group membership Session Risk User Mobile or Cloud app Per app policy App Location IP range Country / Region ApplicationsPolicy Controls Conditional Access Policy Conditions Windows Defender Azure AD Identity Protection Service Terms of Use Partners
  • 23.
  • 25. Application Employee Contractor Inside Corp Outside Corp Inside Corp Outside CorpManaged Device BYOD Managed Device BYOD Exchange Online OWA Just Allow MFA Just Allow MFA for Medium, Block for high MFA MFA Outlook Desktop App Allow with Win10 EDP or Bitlocker MAM with pin Allow with Win10 EDP or Bitlocker MAM with pin MAM with pin MAM with pin SharePoint Online Just Allow MFA and reduced session Just Allow MFA and reduced session MFA MFA and reduced session OneDrive for Business Allow with Win10 EDP or Bitlocker MAM with pin Allow with Win10 EDP or Bitlocker MAM with pint MAM with pin MAM with pin
  • 26. Microsoft Azure Active Directory Windows Server Active Directory ADFS/WAP MFA Service Windows Server Active Directory 10.10.23.24
  • 27.
  • 28.
  • 29.
  • 30.
  • 32. SharePoint Online 5 7 1 6 Intune Company Portal Step 1: Enroll device Unified Enrollment 2 4 3 Device object - device id - isManaged - MDMStatus 8 Azure Active Directory
  • 33. Containing data after it has been accessed Managed apps Personal appsPersonal apps Managed apps Corporate data Personal data Protect corp data Control sharing and downloading ITMonitor and restrict activity via mobile app via browser
  • 34. Exchange Online Stateless Protocol Translator (Azure) 5 7 1 6 Intune 2 Policy - Approved Client IDs 8 9 App Store / Google Play Step 1: Install Microsoft Authenticator / Company Portal 3 Broker App 4 Outlook for iOS/Android Azure Active Directory
  • 35.
  • 36.
  • 39. Do Don’t Use the Authenticator App Exclude 1 Admin account from the policy Enable Identity Protection Users respond much more favorably to conditional/situational MFA Know how to debug Modern Auth issues Know how to debug MFA authentications Underestimate the complexity of hybrid CA Assume users/business units will understand why Forget to about the last 5%. But don’t block on them. https://diagnostics.outlook.com/#/?env=ExRCA
  • 41.
  • 42. * Requires a P1 license
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50. Office 365 Groups Guests Allowed To Access Groups MS Teams Rely on Groups external settings Yes Guest AuthenticationYes SharePoint Online External Sharing Allowed Office 365 Groups Owners Allowed to Add Guests MS Teams Apps, Tabs Bots Files/Notes/Wike access granted Access Denied Teams owners can add Guests Only IT admin can add Guests App/Tab/Bot access granted Access Denied Success Fail Success Fail Success Fail Authentication Denied No Guest Addition Denied Disabled
  • 51.
  • 52. Enforce on-demand, just-in-time administrative access when needed Ensure policies are met with alerts, audit reports and access reviews Manage admins access in Azure AD and also in Azure RBAC User Administrator Discover, restrict, and monitor privileged identities UserAdministrator privileges expire after a specified interval
  • 54. Unify security management and enable advanced threat protection for hybrid cloud workloads
  • 56. Advanced Threat Protection for email drives the recommendation for E5 for all users with a mailbox. Advanced Data Governance capabilities are used to automate protection for data loss prevention. Compare all Office 365 for Business Plans Risk-based conditional access and Cloud App Security drive the recommendation for EMS E5. Included with EMS E5. Risk-based conditional access can be used with B2B accounts. Every Azure AD paid license includes rights to 5 B2B collaboration users (5:1 model). Compare all Enterprise Mobility + Security Plans
  • 57.
  • 58. Scott Hoag Principal Cloud Solutions Architect, Opsgility Co-host Microsoft Cloud IT Pro Podcast www.linkedin.com/in/scottmhoag@ciphertxt shoag@opsgility.com msclouditpro.com
  • 59. © 2017 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at CloudAdopt@microsoft.com. Introduction See topics 2-12 for more information and resources. July 2017 Planning and implementation guidance for fast-moving organizations that have an increased threat profile This topic is 1 of 12 in a series Microsoft Security Guidance for Election Campaigns and Nonprofit Organizations Election campaigns around the world are run by fast-moving organizations with intensive collaboration patterns and security risks that rise with the potential influence a win can achieve. They face challenges from sophisticated actors that can deploy significant resources to breach an organization. This solution demonstrates how to build an environment with essential cloud services. It includes prescriptive security design for protecting identities, email, and access from mobile devices. Office 365 enterprise capabilities Secure email and calendars Office suite and Office Online OneDrive for Business SharePoint Online Business-class email protected with Exchange Online Protection and Office 365 Advanced Threat Protection. The latest Office apps for your PC and Mac, including updates to protect your environment. Create and edit documents from a browser. 1 TB of personal cloud storage that can be accessed from anywhere and syncs with a PC/Mac for offline access. Easily share documents with others and control who can see and edit each file. Office on PCs, tablets, and phones Fully installed Office experience across PCs, Macs, Windows tablets, iPad® and Android tablets, and most mobile devices. Communications sites to keep your organization up to date. Team sites and document libraries protected at the appropriate level for the sensitivity of your data and projects. Online meetings Host online meetings with audio, HD video, and web conferencing over the Internet. Join meetings with a single touch or click from the smartphone, tablet, or PC of your choice. Meeting broadcast Broadcast Skype for Business meetings on the Internet for up to 10,000 people, who can attend in a browser on nearly any device. Meetings include real-time polling and sentiment tracking. Enterprise Mobility + Security (EMS) suite Simplified identity management Centrally manage single sign-on across devices and all of your SaaS and cloud applications. Multi-factor authentication Strengthen sign-in authentication with verification options, including phone calls, text messages, or mobile app notifications. Conditional access Define policies that provide contextual controls at the user, location, device, and app levels to allow, block, or challenge user access. Risk-based conditional access Protect apps and critical data in real time using machine learning and the Microsoft Intelligent Security Graph to block access when risk is detected. Advanced security reporting Monitor suspicious activity with reporting, auditing, and alerts, and mitigate potential security issues using focused recommendations. Mobile device management Enroll corporate and personal devices to provision settings, enforce compliance, and protect your corporate data. Mobile application management Publish, configure, and update mobile apps on enrolled and unenrolled devices, and secure or remove app-associated corporate data. Persistent data protection Encrypt sensitive data and define usage rights for persistent protection regardless of where data is stored or shared. Microsoft Cloud App Security Gain visibility, control, and protection for your cloud- based apps Identify threats, abnormal usage, and other cloud security issues. Azure PaaS analytics environment Azure PaaS Analytics Recommended environment you can build using SQL Data Warehouse and Azure Data Lake. Protect access to this environment using the same capabilities as Office 365. This solution includes capabilities across Office 365, Enterprise Mobility + Security (EMS) suite, and Azure PaaS. EMS makes it possible to integrate other cloud services and use the same identity provider, secure access capabilities, and monitoring solutions across your entire environment. This guidance includes only cloud services but you can also use these recommendations with a hybrid on-premises environment. Core cloud capabilities in this solution Data governance & rights management Security responsibility SaaS PaaS IaaS On-prem Client endpoints (devices) Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts By using Microsoft cloud services, you greatly reduce the attack surface you are responsible for. This solution shows you how to configure the controls that are provided for you to secure your data, devices, and identities. Identity & directory infrastructure refers to integration with on-premises directories. If you re using cloud-only accounts, this doesn t apply to you. The guidance in this solution is designed for cloud-only environments, but can also be used with hybrid environments with on-premises directories. By using Microsoft cloud services, you greatly reduce the amount of work required to keep your environment secure. Decades of engineering experience has enabled Microsoft to develop leading-edge best practices in the design and management of online services. Through industry-leading security practices and unmatched experience running some of the largest online services around the globe, Microsoft delivers enterprise cloud services you can trust. For more information, see Microsoft Cloud Security for Legal and Compliance Professionals Reduce your security responsibility In addition to these cloud capabilities, Windows 10 includes capabilities that are recommended for this solution. Windows 10 is not required. 1 2 3 4 5 6 7 8 9 10 11 12 © 2017 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at CloudAdopt@microsoft.com.July 2017 Microsoft Security Guidance for Election Campaigns and Nonprofit Organizations Device protection and access Azure Active Directory Tenant domain accounts Azure B2B accounts (without additional licensing) Multi-factor authentication and conditional access Mobile Application Management (MAM) Device enrollment and management Only one org can manage a device You can gain a lot of protection on devices, even for unmanaged BYOD devices, by using capabilities in the EMS E5 suite. First, understand what capabilities are available per account type. See the illustration to the right. This topic includes recommendations you can use as a starting point. You ll need to make a few decisions to adjust these recommendations for your environment.  B2B accounts — Intune capabilities require additional licensing for B2B users. For B2B users that have access to sensitive data, consider licensing these with EMS E5 so you can apply Mobile Application Management (MAM) capabilities.  Managing devices — Choose whether to enroll devices into Intune for management. Only one organization can be a management authority for a device. Therefore, managing devices of B2B users might not be an option because these devices might already be managed by their organization.  Windows 10 — Windows 10 includes compelling security capabilities that make this a recommendation for organizations with a high threat profile. At a minimum, consider using Windows 10 for users who are the highest value targets for cyber attacks. Windows 10 security capabilities (conditional access based on device compliance requires device management) Starting-point recommendation This guidance is intended for lightweight, rapidly moving organizations. These starting-point recommendations acknowledge that you might not have a lot of control over the devices users bring to the environment. These recommendations are also intended to provide a variety of options for protecting devices, including data on the devices. Adjust this guidance for your organization based on your threat profile. This solution provides prescriptive guidance for protecting access to email, files, and other resources with multi-factor authentication, conditional access rules, and Intune management. The guidance is based on these starting-point recommendations. You can adjust this guidance to support the decisions you make for your environment. Mac support for managed devices is coming soon. Intune-managed BYOD PCs with device compliance policies to ensure the health of these devices. Latest versions of Office 2016, including updates. Senior and strategic staff IT staff Analytics staff Regular core staff Field staff Hourly paid contract staff Consultants and vendors Tenant domain accounts Azure B2B accounts (without additional licensing) Intune-managed PCs. Windows 10 with BitLocker, Windows Defender, Windows Firewall, and Windows Information Protection (WIP) as a minimum configuration. If Windows 10 is not used, enroll PCs in Intune and use device compliance policies to ensure the health of these devices. Latest versions of Office 2016, including updates. Conditional access rules requiring multi-factor authentication and apps that support modern authentication. Intune-managed phones/tablets. Phones registered with Azure AD for phone authentication. Approved phone/tablet apps from the app stores — apps that can be managed by Intune Application Management. Intune app management policies to protect business data on phones. Phones registered with Azure AD for phone authentication. Approved phone/tablet apps from the app stores—apps that can be managed by Intune Application Management. Intune application management policies to protect business data on phones. Phones registered with Azure AD for phone authentication. Conditional access rules requiring multi-factor authentication. Approved phone/tablet apps from the app stores — apps that support modern authentication. Operations staff This topic is 1 of 12 in a series 1 2 3 4 5 6 7 8 9 10 11 12 Planning and implementation guidance for fast-moving organizations that have an increased threat profile aka.ms/SecureCampaign
  • 60. Office 365: Manage Identities using Azure AD connect https://aka.ms/365enterpriseident aka.ms/365Enterprise

Hinweis der Redaktion

  1. 4
  2. Build 2012
  3. Microsoft Ignite