Business Needs and IT Challenges Business Needs How can IT maintain user productivity and protect against evolving threats Agility and Flexibility How can IT reduce.
Download ReportTranscript Business Needs and IT Challenges Business Needs How can IT maintain user productivity and protect against evolving threats Agility and Flexibility How can IT reduce.
Business Needs and IT Challenges Business Needs How can IT maintain user productivity and protect against evolving threats Agility and Flexibility How can IT reduce complexity and scale back infrastructure requirements IT Needs Lower operational costs Registering and Enrolling Devices Users can enroll devices which configure the device for management with Windows Intune. The user can then use the Company Portal for easy access to corporate applications Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the users identity. Multi-factor authentication can be used through Windows Azure Active Authentication. Data from Windows Intune is sync with Configuration Manager which provides unified management across both onpremises and in the cloud As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device Microsoft System Center 2012 R2 Configuration Manager Windows PCs (x86/64, Intel SoC), Windows to Go Windows Embedded Mac OS X IT Single Admin Console Windows RT, Windows Phone 8 iOS, Android ConfigMgr MP Baseline ConfigMgr Agent Assignment to collections Baseline drift ! Auto Remediate OR Create Alert (to Service Manager) Baseline Configuration Items Active Directory Script WMI XML SQL File Software Updates Registry MSI IIS Improved functionality Copy settings Trigger console alerts Richer reporting Enhanced versioning and audit tracking Ability to specify versions to be used in baselines Audit tracking includes who changed what Pre-built industry standard baseline templates through IT Governance, Risk & Compliance(GRC) Solution Accelerator VPN Profile Management Support for major SSL VPN vendors SSL VPNs from Cisco, Juniper, Check Point, Microsoft, Dell SonicWALL, F5 Subset of vendors have Windows Windows RT VPN plug-in Support for VPN standards PPTP ,L2TP, IKEv2 Automatic VPN connection DNS name-based initiation support for Windows 8.1 and iOS Application ID based initiation support for Windows 8.1 Wi-Fi and Certificate Profiles Wi-Fi settings Manage Wi-Fi protocol and authentication settings Provision Wi-Fi networks that device can auto connect Specify certificate to be used for Wi-Fi connection Manage and distribute certificates Deploy trusted root certificates Support for Security Center Endpoint Protection(SCEP) protocol Comprehensive Protection Stack Building enterprise grade platform security PLATFORM Antimalware Internet Explorer Behavior Monitoring Settings Management Dynamic Translation Operating System Deployment Vulnerability Shielding Windows Defender Offline AppLocker BitLocker Data Execution Prevention Windows Resource Protection Secure Boot through UEFI Early Launch Antimalware (ELAM) Available only in Windows 8.x Enhanced in Windows 8.x (or Internet Explorer 10) Software Distribution Cloud clean restore Address Space Layout Randomization Measured Boot Exchange Connector DYNAMIC CLOUD UPDATES ELAM & Measured Boot User Access Control Microsoft Malware Protection Center ANTIMALWARE Endpoint Protection Software Management Updates + SCUP Dynamic Signature Service MANAGEMENT Behavior Monitoring and Dynamic Signature Service Live system monitoring identifies new threats Tracks behavior of unknown processes and known bad processes Multiple sensors to detect operating system anomaly Updates for new threats delivered through the cloud in real time Real time signature delivery with Microsoft Active Protection Service Immediate protection against new threats without waiting for scheduled updates Cloud Clean Restore Advanced system file cleaning through replacement Replaces infected system files with clean versions from a cloud source. Uses a trusted Microsoft cloud source for the replacement file Restart requirements orchestrated on system and wired to client UI (for in use file replacement). Trusted Boot: Early Load Anti-Malware Windows 7 Malware is able to boot before Windows and Anti-malware Malware able to hide and remain undetected Systems can be compromised before AM starts Windows 8 Secure Boot loads Anti-Malware early in the boot process Early Load Anti-Malware (ELAM) driver is specially signed by Microsoft Windows starts AM software before any 3rd party boot drivers Malware can no longer bypass AM inspection Simplify BitLocker Deployment Encrypt a computer before a user receives it Enable users to encrypt their computers after policy Policy Hardware Compatibility Recovery Password Data Group Policy: AD, AGPM Key Recovery Service Helpdesk UX for Key Recovery Compliance Data Compliance Service HTTPS MBAM Client Central Administration Compliance Reports File Server AD DS User claims User.Department = Finance User.Clearance = High Device claims Device.Department = Finance Device.Managed = True Resource properties Resource.Department = Finance Resource.Impact = High ACCESS POLICY Applies to: @File.Impact = High Allow | Read, Write | if (@User.Department == @File.Department) AND (@Device.Managed == True) 31 Expression based access control Country x 50 Branch x 20 Customers x 100 http://aka.ms/enterprise mobilitysuite http://aka.ms/microsoftintune http://aka.ms/configmgr http://aka.ms/hi http://aka.ms/aip http://aka.ms/virtualdesktop http://channel9.msdn.com/Events/TechEd www.microsoft.com/learning http://microsoft.com/technet http://developer.microsoft.com