Volle Power Mit Windows 10 Und Enterprise Mobility Suite - Infotech

1m ago
0 Views
0 Downloads
3.59 MB
43 Pages
Last View : 1m ago
Last Download : n/a
Upload by : Maxton Kershaw
Transcription

Volle Power mit Windows 10und Enterprise Mobility SuiteJohannes NöbauerBereichseiter Enterprise Services

Agenda Arbeitsplatz 4.0 Windows 10 &Microsoft Enterprise Mobility & Security

* Forrester Research: “BT Futures Report: Info workers will erase boundary between enterprise &consumer technologies,” Feb. 21, 2013** Forrester Research: “2013 Mobile Workforce Adoption Trends,” Feb. 4, 2013*** Gartner Source: Press Release, Oct. 25, 2012, http://www.gartner.com/newsroom/id/2213115

Ernüchternte Statistik200 The median # of days thatattackers reside within avictim’s network beforedetection75% 500B 3.5Mof all network intrusions aredue to compromised usercredentialsThe total potential cost ofcybercrime to the globaleconomyThe average cost of a databreach to a companyDie Häufigkeit und Gewandtheit der Cyber-Angriffe werdensogar noch schlimmer“There are two kinds of BIG companies. Those who have beenhacked, and those who don’t know they have been hacked.”

Windows 10SchnellerBesserSicherer

MicrosoftEnterprise Mobility Security SuiteIdentity and -drivensecurityAzure Active DirectoryPremium P2Azure Information ProtectionPremium P2Microsoft CloudApp SecurityIdentity and accessmanagement with advancedprotection for users andprivileged identitiesIntelligent classification andencryption for files sharedinside and outside yourorganizationEnterprise-grade visibility,control, and protection for yourcloud applications(includes all capabilities in P1)(includes all capabilities in P1)Azure Active DirectoryPremium P1EMSE3Managed mobileproductivitySecure single sign-on to cloudand on-premises appsMFA, conditional access, andadvanced security reportingMicrosoft IntuneMobile device and appmanagement to protectcorporate apps and data on anydeviceAzure Information ProtectionPremium P1Microsoft AdvancedThreat AnalyticsEncryption for all files andstorage locationsProtection from advancedtargeted attacks leveraging userand entity behavioral analyticsCloud-based file tracking

MicrosoftEnterprise Mobility & Security Azure Active Directory Premium Azure Information Protection Advanced Threat Analytics Microsoft Intune

AzureActive DirectorySelf Service Password ResetMultifaktor AuthentifizierungSingle-Sign On über Hybrid Clouds

Your Directory on the cloudConnect and Sync on-premisesdirectories with Azure.** Azure Active Directory ConnectPowerShellSQL (ODBC)LDAP v3Web Services( SOAP, JAVA,REST)Other DirectoriesMicrosoft AzureActive Directory

Your Directory on the cloudConnect and Sync on-premisesdirectories with Azure.2400 Preintegrated popularSaaS apps.Other DirectoriesMicrosoft AzureActive DirectorySaaS apps

Azure Multi Factor AuthenticationOptionen

DemoAzure Active DirectoryMicrosoft AzureActive Directory

Identity-driven SecurityActionsConditionsLocation (IP range)Device stateUserUser groupAllow accessOrEnforce MFA peruser/per appRiskBlock accessMFAIDENTITYPROTECTIONNOTIFICATIONS, ANALYSIS, REMEDIATION,RISK-BASED POLICIESCLOUD APP DISCOVERYPRIVILEGED IDENTITY MANAGEMENT

Cloud-powered SchutzKonsoldierte Ansicht auf die durch „machinelearning“ basierte Erkennung von BedrohungenInfecteddevicesBrute entialsSuspicious sign-inactivitiesRemediation EmpfehlungRiskbasedpoliciesMFA ChallengeRisky Logins“Risk severity” BerechnungMachine-Learning EngineChange badcredentialsBlock attacksRisiko-basierter „Conditional Access“ schütztautomatisch vor verdächtigen Anmeldungenund gefährdeten Anmeldeinformationen

Sign-in Risk Policy mit Tor Browser

MicrosoftEnterprise Mobility & Security Azure Active Directory Premium Azure Information Protection Advanced Threat Analytics Microsoft Intune

MicrosoftAzure Information ProtectionWie kann ich sicher stellen das Dokumente nur diegewünschte Zielpersonen verschlüsselt erreichen unddiese nur spezifische Rechte habenWie kann ich den Zugriff nachverfolgenWie kann ich die Berechtigungen wieder entziehen

Azure Rights Management ServiceAuthentication andcollaborationClient integrationIntegration

Rights Management 101File is protected by an AESsymmetric keyLicense protected by orgowned keyUse Rights SecretCola FormulaWaterHFCSBrown (@#!#!@#!#!@#!()&)(*&)(@#!Usage rights symmetric key stored infile as ‘license’SecretCola FormulaUnprotectWaterHFCSBrown #16

Rights Management 101Enlightened apps use the RMS SDKwhich communicates with the RMS keymanagement serversUse Rights !@#!()&)(*&)(@#!File content isnever sent to theRMS server/serviceRMS-enlightened apps enforce rights,Generic Protection offered by the RMSApp

DemoAzure Information Protection

MicrosoftEnterprise Mobility & Security Azure Active Directory Premium Azure Information Protection Advanced Threat Analytics Microsoft Intune

MicrosoftAzure Threat AnalyticsWerde oder bin ich schon im internenNetzwerk angegriffen?Wie finde Account Credentials AngriffeHabe ich unsichere Admin Logons iminternen Netz

Die Muster der Cyber-SecurityAngriffe ändern sichToday’s cyber attackers are:Compromising user credentials in the vastmajority of attacksUsing legitimate IT tools rather than malware– harder to detectStaying in the network an average of eightmonths before detectionCosting significant financial loss, impact tobrand reputation, loss of confidential data,and executive jobs

Die Muster der Cyber-SecurityAngriffe ändern sichToday’s cyber attackers are:Compromising user credentials in the vastmajority of attacksUsing legitimate IT tools rather than malware– harder to detectStaying in the network an average of eightmonths before detectionCosting significant financial loss, impact tobrand reputation, loss of confidential data,and executive jobs

Die Muster der Cyber-SecurityAngriffe ändern sichToday’s cyber attackers are:Compromising user credentials in the vastmajority of attacksUsing legitimate IT tools rather than malware– harder to detectStaying in the network an average of eightmonths before detectionCosting significant financial loss, impact tobrand reputation, loss of confidential data,and executive jobs

ProblemstellungTraditional IT Security Lösungen sind typischerweise :KomplexNeigen zu“false positives”Ausgelegt für den“perimeter” SchutzErsteinrichtung,Feinabstimmung, Erstellenvon Regeln fürSchwellwerte/Baselineskönnen lange dauern.Sie erhalten zu viele Berichtean einem Tag mit mehreren"false positives", die wertvolleZeit erfordern, die Sie nichthaben.Wenn BenutzerloginInformationen gestohlenwurden und Angreifer sichbereits im Netz befinden,bietet Ihre aktuelle Abwehrnur mehr eingeschränktenSchutz.

Übersicht Microsoft AdvancedThreat AnalyticsEine lokale Lösung um fortschrittliche Sicherheits Angriffe zu identifizieren, bevor diese SchadenanrichtenVergleich: Kreditkartenunternehmenüberwachen das Verhaltender Karteninhaber Gibt es ungewöhnlichAktivitäten, wird derKarteninhaberbenachrichtigt um dieTransaktionen zu überprüfenMicrosoft Advanced Threat Analytics bringt dieses Konzeptzur IT und Anwender einer bestimmten Organisation

Wie Microsoft Advanced ThreatAnalytics arbeitet4 AlertATA reports all suspiciousactivities on a simple,functional, actionableattack timelineATA identifiesWho?What?When?How?For each suspiciousactivity, ATA providesrecommendations forthe investigation andremediation.

Topology

Topology - GatewayCaptures and analyzes DC network trafficvia port mirroringListens to multiple DCs from a singleGatewayReceives events from SIEMRetrieves data about entities from thedomainPerforms resolution of network entitiesTransfers relevant data to the ATA Center

Topology - CenterManages ATA Gateway configurationsettingsReceives data from ATA Gateways andstores in the databaseDetects suspicious activity and abnormalbehavior (machine learning)Provides Web Management InterfaceSupports multiple Gateways

Video DemoAzure Advanced Threat Analytics

MicrosoftEnterprise Mobility & Security Azure Active Directory Premium Azure Information Protection Advanced Threat Analytics Microsoft Intune

MicrosoftIntuneBring Your Own Device Mobiles Device ManagementMIT IT-Kontrolle OHNE private EnteignungApp-Management für mobile Unternehmens-Apps SchönÊigener App-StorePC-Management und MDM integriertManaged Antivirus ist wieder

Today’s challengesUsersUsers expect to be able towork in any location andhave access to all theirwork resources.DevicesThe explosion of devices iseroding the standards-basedapproach to corporate IT.AppsDataDeploying and managingapplications acrossplatforms is difficult.Users need to be productivewhile maintainingcompliance and reducingrisk.

Empowering people with our EnterpriseMobility SuiteEnable usersAllow users to work on thedevices of their choice andprovide consistent access tocorporate resources.Unify your environmentUsersDevicesAppsDataDeliver a unified application anddevice management onpremises and in the cloud.Protect your dataManagement. Access. Protection.Help protect corporateinformation and manage risk.

Enterprise mobility managementwith IntuneMobile devicemanagementUserMobile applicationmanagementPC managementITIntune helps organizations provide their employees with access to corporate applications, data, andresources from virtually anywhere on almost any device, while helping to keep corporate information secure.

Device Lifecycle ManagementEnrollProvision Provide a self-service CompanyPortal for users to enroll devices Deliver custom terms andconditions at enrollment Bulk enroll devices using AppleConfigurator or service account Restrict access to Exchange emailif a device is not enrolled Deploy certificates, email, VPN,and WiFi profiles Deploy device security policysettings Install mandatory apps Deploy app restriction policies Deploy data protection policiesUserITRetireManage and Protect Revoke access to corporateresources Perform selective wipe Audit lost and stolen devices Restrict access to corporateresources if policies are violated(e.g., jailbroken device) Protect corporate data byrestricting actions such ascopy/cut/paste/save outside ofmanaged app ecosystem Report on device and appcompliance

Deployment Option 1:Intune onlyIntune standalone (cloud only)ITIntune web consoleManage and Protect No existing infrastructure necessary No existing Configuration Manager deploymentrequired Simplified policy control Simple web-based administration console Faster cadence of updates Always up-to-dateDevices SupportedMobile devices and PCs Windows PCs (x86/64, Intel SoC) Windows RT Windows Phone 8.x iOS Android

Deployment Option 2:SCCM Intune MDMConfiguration Manager integrated with Intune (hybrid)System Center 2012 R2 ConfigurationManager with Microsoft Intune Build on existing Configuration Manager deploymentFull PC management (OS deployment, endpointprotection, application delivery control, customreporting)Deep policy control requirementsGreater scalabilityExtensible administration tools (RBA, PowerShell, SQLreporting services)ITConfiguration Manager consoleSystem CenterConfigurationManagerDevices Supported Windows PCs(x86/64, Intel SoC)Windows to GoWindows ServerLinuxMac OS X Windows RTWindows Phone 8.xiOSAndroidDomain joined PCsMobile devices

DemoMicrosoft Intune

Danke!für Ihre Aufmerksamkeit

Mobile device PC management management Enterprise mobility management with Intune Intune helps organizations provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure. User IT

Related Documents:

A computer with at least a 450MHz Pentium CPU with 128 MB of RAM, running Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8/8.1, Windows 10, Windows Server 2012, Windows Server 2016 or Windows Server 2019 platforms. Instal

Windows 8.1 *6 Windows Server 2003 *7 Windows Server 2008 *8 Windows Server 2012 *9 Mac OS X *10: Supported *1 Printer drivers support both 32-bit and 64-bit Windows. *2 Microsoft Windows XP Professional Edition/Microsoft Windows XP Home Edition *3 Microsoft Windows Vista Ultimate/Microsoft Windows Vista Enterprise/Microsoft Windows Vista Business/

Microsoft Windows 7, 32-bit and 64-bit Microsoft Windows 8 & 8.1, 32-bit and 64-bit Microsoft Windows 10, 32-bit and 64-bit Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012, 64-bit only RAM: Minimum 2 GB for the 32-bit versions of Microsoft Windows 7, Windows 8, Windows 8.1, and Windows 10.

Machine Edition Product Windows 7SP1 Windows 8 and 8.1 Windows 10 QP View Developer - QP Logic Developer – PC - o Windows 7 Ultimate, Windows 7 Enterprise, Windows 7 Professional and Windows 10. Notes The above versions of Windows are supported in both 32-bit and 64-bit. Windows regional settings must be set to English.

- 32 & 64 bit Windows 7, Windows 8 & Windows 10 - 32 & 64 bit Windows 2008 Server - Windows 2008 Server R2 - Windows Server 2012 - Windows Server 2012 R2 - Windows Server 2016 NOTE: Microsoft .Net Framework 4.5 is required on all o

Windows ME, Windows NT 3.51 and 4, Windows 2000 PRO, Windows 2000 Server, Windows XP Home / XP PRO / XP 64bit / Windows 7 (32 & 64bit), Windows Vista (32 & 64bit), Windows 2003 Server and Windows 2008 Server. Design, test, install Surveillance Systems. Design, Build and Sell Forensic Computer Systems.

Oct 16, 2006 · Windows XP & Windows 2000 Users Only Windows XP and Windows 2000 users will see this screen. Click OK to continue. Click OK Windows 98SE Users Only Windows 98SE users will see these screens. Insert your Windows 98 Installation disk into your CD-ROM drive Click Yes Click OK Click OK Enter the location of the Windows 98 setup files (e.g. “ D .

PowerBook 145B/80 B1433 MIT 1370 PowerBook Duo 230/ 120 B1432 MIT 2480 ThinkPad 720/160 9552-308 MIT 3245 ThinkPad 720C/160 9552-30J MIT 4540 DeskJet 500 HP-C2106A MIT 370 LaserJet lIP Plus HP-C2007A MIT 790 Value Bundle 4MB RAM/120MB hard disk MIT 1215 Value Bundle

Several LTSC Windows Server versions that are supported with SC Series are in various phases of mainstream or extended Microsoft support: Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019. Microsoft extended support for Windows Server 2008 R2 is scheduled to end in January 2020.

Windows 10 Home S 64 Entry Season Compact Windows 10 Home 64 Chinese Market CPPP Windows 10 Home 64 High-end Chinese Market CPPP Windows 10 Home 64 Plus Windows 10 Home 64 Plus Single Language Windows 10 Home 64 Plus Single Language Africa Market Windows 10 Home 64 Plus Single Language APAC EM PPP Windows 1

the GUID Partition Table (GPT) scheme, if your Windows installation. . Pro4 Motherboard and a TPM and Windows 10 says Secure Boot Unsupported. . 10/8/7 system, follow the useful solutions to fix UEFI boot on Windows 10. windows loader windows loader unsupported partition table fix Windows Loader 1.9.7 By Daz Windows Loader 1.9.7 By Daz .

Install Easy Interactive Tools 7 Uninstalling Windows Vista/Windows 7 A Click or Start Control Panel Programs and Features. B Select Easy Interactive Tools Ver.X.XX and click Uninstall. Windows 8/Windows 8.1/Windows 10 A Navigate to the Apps screen (Windows 8.x) or click the start icon (Windows 10) and select Windows Control

djain@mit.edu, sra@mit.edu, jguo01@risd.edu, rvictor@mit.edu, raywu22@mit.edu, juschiu@mit.edu, geek@mit.edu ABSTRACT We present Amphibian, a simulator to experience scuba diving virtually in a terrestrial setting. While existing diving simulators mostly focus on visual and aural di

For Peer Review A OverCode: Visualizing Variation in Student Solutions to Programming Problems at Scale ELENA L. GLASSMAN, MIT CSAIL JEREMY SCOTT, MIT CSAIL RISHABH SINGH, MIT CSAIL PHILIP J. GUO, MIT CSAIL and University of Rochester ROBERT C. MILLER, MIT CSAIL In MOOCs, a single programming exercise may produce thousands of solutions from learners.

3.2.1 Fokussieren mit »autofocus« 60 3.2.2 Platzhalter-Text mit »placeholder« 61 3.2.3 Verpflichtende Felder mit »required« 62 3.2.4 Noch mehr neue Attribute für das »¡nput«-Element 62 3.3 Neue Elemente 65 3.3.1 Anzeigen von Messgrdfien mit »meter« 65 3.3.2 Fortschrittsanzeige mit »progress« 68 3.3.3 Auswahllisten mit »datalist« 69

MIT 401(k) Oversight Committee, 2014-2019. MIT Committee on Graduate Programs, 2017-2019. MIT International Advisory Committee . MITx Faculty Advisory Committee . MIT Sloan: International Initiatives Committee, Co-Chair of Space Committee, Chair of Load Committee, and Member of various standing committees, MIT Sloan School of Management, 2011-2015.

Windows modules win_copy - Copies files to remote locations on windows hosts win_service - Manage and query Windows services win_domain - Ensures the existence of a Windows domain win_reboot - Reboot a windows machine win_regedit - win_regedit – Add, change, or remove registry keys and values win_ping - A windows version of the classic ping .

A 16-bit version, named NISTIMEW, may be used with Windows 98, Windows 95, and Windows 3.1 (if a network interface is installed that is compatible with the Winsock standard, v1.1 or later). A 32-bit version, named NISTIME-32bit, may be used with Windows 2000 and Windows NT. (It may also be used with Windows 98 and Windows 95.)

Microsoft Windows XP Home Edition operating system. Windows Vista is an abbreviation for Microsoft Windows Vista Ultimate operating system or Microsoft Windows Vista Business operating system. Windows 7 is an abbreviation for Microsoft Windows 7 Ultimate operating system or Microsoft Windows 7 Enterprise operating system.

“Am I My Brother’s Keeper?” Cain & Abel by Tintoretto. Everything can be taken from a man but the last of the human freedoms - to choose one’s attitude in an given set of circumstances, to choose one’s own way.--Auschwitz Survivor, Victor E. Frankl Human Gene Map. OnegShabbat Archives –Emanuel Ringleblum Remembrance: To record and to teach future Generations. The time has come to .