SlideShare uma empresa Scribd logo
1 de 27
Windows 7 to Windows 10
Security
Protection against cyberattacks
Απόστολος Παπαδόπουλος – IT Services Delivery Manager
Ιωάννης Καθάρειος – Senior Engineer
Agenda
• Windows 10
• Windows 7 to Windows 10
• Ways to Upgrade
• Windows Autopilot
• Q&A
• Security - Protection against cyberthreats
• Identity & Access Management
• Endpoint management
• Information Protection
• Monitoring
• Q&A
Management & Deployment /
Productivity & User Experience
Security Features &
Functionality
Windows 10Windows 7
Paths to Windows 10 Pro
Windows XP,
Vista, etc.
Windows Ent./LTSB
• Upgrade (keep files, apps, and settings)
• Clean-install (install Windows only [keep nothing])
May require manual re-input of OEM license key to activate
In-place upgrade options
• Keep files, apps, and settings
• Keep files only (discard apps and settings)
• Keep nothing (discard files, apps, and settings)
Windows 10
Home
In-place upgrade
OR
Windows 7 Home
Windows 8 Home
Windows 8.1 Home
Windows 7 Pro
Windows 7 Ultimate
Windows 8 Pro
Windows 8.1 Pro
Windows 10 Pro
clean install
Ways to upgrade to Windows 10
• Manually: Backup user files, clean format using the Windows 10 ISO and
restore files
• Manually: Using the Media Creation Tool and the in-place upgrade
option, keeping user files
• Semi-Automated: Using Microsoft Deployment Toolkit (MDT) suite,
keeping user files
• Fully-Automated: Using Microsoft System Configuration Manager
(SCCM), keeping user files
Hardware vendor
Windows Autopilot Deployment service
Configure
profile
Employee unboxes
device, self-deploys
Self-
deploy
Introducing Windows Autopilot
Device IDs
IT admin
Harvest device IDs
Existing devices
Upload
device IDs
Deliver direct to employeeShip
Facilitate provisioning new devices
- Requires Windows 10 Pro or enterprise, 1703 or later
Q & A
Identifies suspicious attacks and threats
near real time
Azure Active Directory Premium
Conditional AccessTwo way password sync
Self-service Password
Reset
Connection between
Active Directory and
Azure Active Directory
Data classification and protection Automated Threat detection and
remediation
Security - Protection against cyberthreats
Mobile device settings
management
Mobile application
management
Selective wipe
Motoring and Reporting
Azure Information Protection Cloud App Security
Advanced Threat Protection Security Center
Intune
Identity Protection and Access Management
Secure authentication
Reduce risk of security breaches
Turn on one of the many multi-factor authentication
options to protect your users from 99.99% of identity
attacks.
Set the right identity foundation
Connect all your apps to a single identity platform in the
cloud to get the most security and productivity for your
organization
What is Azure AD?
Azure AD
• A multi-tenant service that provides enterprise-level identity and access management
for the cloud.
• Built to support global scale, reliability and availability.
• Backed by a 99.99% SLA
Features
• Modern authentication (MFA, OAuth 2.0, Passwordless sign-in)
• Self-Service Password reset
• Conditional Access
Hybrid AD
• Connect with existing on-premises Active Directory - AD Connect
• Hybrid device join
• Single Identity in both in the cloud and on-premises
• Single Sign-On
What is it?
Simple & powerful automated access control based
on conditions such as:
• Device Compliance
• Trusted Locations
What you need to know
Baseline policies enable strong security via simple
on/off toggle: Example are:
• Require MFA For admins
• Block legacy authentication
Additional policies are fully customizable. Can be
used to block unauthorized logons even when the
password is stolen.
Conditional Access
Endpoint Management
• Intune
Intune is a unified endpoint management offering, integrating Mobile
device management and Application management in a single cloud
service
• Central management for Devices and Applications
• Compliance policies
• Configuration policies
• Application control
• Remote Wipe
Managing mobile devices – two approaches
Commonly used for total management of company-
owned devices
Company manages the security of the entire device
• Commonly used for personal devices (Bring Your Own
Device scenario)
• Company manages the security of only those
applications that are enrolled
Mobile Application Management (MAM)Mobile Device Management (MDM)
Provision settings,
certs, profiles
Report & measure
device compliance
Advanced policy
controls
Secure corporate data
within apps
Report app
inventory & usage
Remove corporate data
Managed via setup wizard and simplified UI Managed via Intune admin center
Additional steps to set up (provision certificates, etc)
https://docs.microsoft.com/en-us/intune/ios-enroll
https://docs.microsoft.com/en-us/intune/android-enroll
Information protection
• Azure Information Protection
Azure Information Protection is a cloud-based solution that helps an
organization to classify and protect its documents and emails
• Document classification
• Encryption
• Cloud-based identity verification
• Document tracking
• Integration with Office 365
• Protection regardless of location, including Exchange Online,
SharePoint or local storage
Azure Information Protection (AIP)
What you need to know
• AIP works by classifying data based on sensitivity.
You configure policies to classify, label, and protect
data based on its sensitivity.
• Classification and protection information follows
the data—ensuring it remains protected regardless
of where it’s stored or who it’s shared with.
• Define who can access data and what they can do
with it—such as allowing to view and edit files, but
not print or forward.
• AIP is turned on with a default set of labels in
Microsoft 365 Business
Cloud App Security
The Cloud App Security framework
Discover and control the use of Shadow IT:
• Identify the cloud apps, IaaS, and PaaS services used by your
organization. Investigate usage patterns, assess the risk levels and
business readiness
• Start managing them to ensure security and compliance.
Protect your sensitive information anywhere in the cloud:
• Understand, classify, and protect the exposure of sensitive
information at rest.
• Automated processes to apply controls in real-time across all your
cloud apps.
Protect against cyberthreats and anomalies:
•Detect unusual behavior across cloud apps to identify ransomware,
compromised users or rogue applications
Assess the compliance of your cloud apps:
• Assess if your cloud apps meet relevant compliance
• Prevent data leaks to non-compliant apps, and limit access to
regulated data.
Cloud App Security
Cloud App Security
Office 365 Data Loss Prevention
MICROSOFT’S APPROACH TO INFORMATION PROTECTION
Comprehensive protection of sensitive data throughout the lifecycle – inside and outside the organization
Windows Information Protection
Intune MDM & MAM for
iOS & Android
Microsoft 365 Unified Labels
BitLocker for Windows 10
Azure Information Protection
Microsoft Cloud App Security
Office 365
Information Protection
Azure
Information Protection
Windows
Information Protection
Security Management
• Advanced Threat Protection (ATP)
• Endpoint Behavioral Sensors.
• Cloud Security Analytics
• Threat Intelligence
• Security Center
Advanced Threat Protection
Detect threats fast
with Behavioral
Analytics
Focus on what is
important using
attack timeline
Reduce the
fatigue of false
positives
Best-in-class security
powered by the
Intelligent Security
Graph
Protect at scale
with the power of
the cloud
Combined Microsoft Stack:
Maximize detection coverage throughout the attack stages
User browses
to a website
User runs a
program
Office 365 ATP Windows Defender ATP
Email protection End Point protection
User receives
an email
Opens an
attachment
Clicks on a URL Exploitation Installation C&C channel Reconnaissance
Lateral
Movement
Domain
Dominance
Advanced Threat Protection Security Model
Brute force
an account
Azure ATP
Identity
protection
Monitoring and Reporting
Security and Compliance Center
Security Center is a unified infrastructure security management system
• Real-Time Security Overview
• Drill down to issues and assess severity
• Manage organization policies
Mailflow Insights
Security Center Dashboard
Q & A
Features
Office 365
BP
Microsoft 365
Business
Microsoft 365
E3
Microsoft 365
E5
Maximum number of users 300 300 unlimited unlimited
Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote,
Access), Office Online
Business Business ProPlus ProPlus
Email & Calendar Outlook, Exchange Online 50GB 50GB unlimited unlimited
Hub for Teamwork Chat-based workspace, online meetings, and more in Microsoft Teams    
File Storage OneDrive for Business 1 TB/user 1 TB/user unlimited unlimited
Social, Video, Sites Yammer, SharePoint Online, Planner    
Stream   
Business Apps Scheduling Apps – Bookings1, StaffHub    
Business Apps – Outlook Customer Manager, MileIQ1
 
Threat Protection Microsoft Advanced Threat Analytics, Device Guard, Credential Guard, App Locker, Enterprise Data Protection,  
Office 365 Advanced Threat Protection  
Windows Defender Advanced Threat Protection 
Office 365 Threat Intelligence 
Identity Management Self-service password reset for hybrid Azure Active Directory accounts, Azure MFA, Conditional Access   
Azure AD: Cloud App Discovery, AAD Connect Health, SSO for more than 10 Apps  
Azure Active Directory Plan 2 
Device & App
Management
Microsoft Intune, Windows AutoPilot   
Shared Computer Activation   
Microsoft Desktop Optimization Package, VDA  
Information
Protection
Office 365 Data Loss Prevention, Azure Information Protection Plan 1   
Azure Information Protection Plan 2, Microsoft Cloud App Security, O365 Cloud App Security 
On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype, Windows, SCCM, Win. Rights Management)  
Compliance Unlimited email archiving2
  
Advanced eDiscovery, Customer Lockbox, Advanced Data Governance 
Analytics Power BI Pro, MyAnalytics 
Voice PSTN Conferencing, Cloud PBX 
ComparisonacrossBusinessPremiumandMicrosoft365SKU’s
[1] Available in US, UK, Canada | [2] Unlimited archiving when auto-expansion is turned on

Mais conteúdo relacionado

Mais procurados

EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
Eric Inch
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 

Mais procurados (20)

Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
4 Modern Security - Integrated SecOps and incident response with MTP
4  Modern Security - Integrated SecOps and incident response with MTP4  Modern Security - Integrated SecOps and incident response with MTP
4 Modern Security - Integrated SecOps and incident response with MTP
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users Group
 
1 modern desktop - shift to a modern desktop
1   modern desktop - shift to a modern desktop1   modern desktop - shift to a modern desktop
1 modern desktop - shift to a modern desktop
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 

Semelhante a In t trustm365ems_v3

Semelhante a In t trustm365ems_v3 (20)

O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure
 
What is Microsoft 365 Business?
What is Microsoft 365 Business?What is Microsoft 365 Business?
What is Microsoft 365 Business?
 

Mais de InTTrust S.A.

Mais de InTTrust S.A. (9)

Marketing 2019
Marketing 2019Marketing 2019
Marketing 2019
 
InTech Event | Red Hat OpenShift Container Platform
InTech Event | Red Hat OpenShift Container PlatformInTech Event | Red Hat OpenShift Container Platform
InTech Event | Red Hat OpenShift Container Platform
 
InTech Event | Cognitive Infrastructure for Enterprise AI
InTech Event | Cognitive Infrastructure for Enterprise AIInTech Event | Cognitive Infrastructure for Enterprise AI
InTech Event | Cognitive Infrastructure for Enterprise AI
 
Modern Workplace - Shift to Cloud
Modern Workplace - Shift to CloudModern Workplace - Shift to Cloud
Modern Workplace - Shift to Cloud
 
In t trust information protection ms-security-event
In t trust information protection ms-security-eventIn t trust information protection ms-security-event
In t trust information protection ms-security-event
 
Modern workplace g sari-ms
Modern workplace   g sari-msModern workplace   g sari-ms
Modern workplace g sari-ms
 
In t trust_implementing_gdpr_ms_event_2019_09_27
In t trust_implementing_gdpr_ms_event_2019_09_27In t trust_implementing_gdpr_ms_event_2019_09_27
In t trust_implementing_gdpr_ms_event_2019_09_27
 
InTTrust_intro_ai_2019
InTTrust_intro_ai_2019InTTrust_intro_ai_2019
InTTrust_intro_ai_2019
 
Master the art of Data Science
Master the art of Data ScienceMaster the art of Data Science
Master the art of Data Science
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

In t trustm365ems_v3

  • 1. Windows 7 to Windows 10 Security Protection against cyberattacks Απόστολος Παπαδόπουλος – IT Services Delivery Manager Ιωάννης Καθάρειος – Senior Engineer
  • 2. Agenda • Windows 10 • Windows 7 to Windows 10 • Ways to Upgrade • Windows Autopilot • Q&A • Security - Protection against cyberthreats • Identity & Access Management • Endpoint management • Information Protection • Monitoring • Q&A
  • 3. Management & Deployment / Productivity & User Experience Security Features & Functionality Windows 10Windows 7
  • 4. Paths to Windows 10 Pro Windows XP, Vista, etc. Windows Ent./LTSB • Upgrade (keep files, apps, and settings) • Clean-install (install Windows only [keep nothing]) May require manual re-input of OEM license key to activate In-place upgrade options • Keep files, apps, and settings • Keep files only (discard apps and settings) • Keep nothing (discard files, apps, and settings) Windows 10 Home In-place upgrade OR Windows 7 Home Windows 8 Home Windows 8.1 Home Windows 7 Pro Windows 7 Ultimate Windows 8 Pro Windows 8.1 Pro Windows 10 Pro clean install
  • 5. Ways to upgrade to Windows 10 • Manually: Backup user files, clean format using the Windows 10 ISO and restore files • Manually: Using the Media Creation Tool and the in-place upgrade option, keeping user files • Semi-Automated: Using Microsoft Deployment Toolkit (MDT) suite, keeping user files • Fully-Automated: Using Microsoft System Configuration Manager (SCCM), keeping user files
  • 6. Hardware vendor Windows Autopilot Deployment service Configure profile Employee unboxes device, self-deploys Self- deploy Introducing Windows Autopilot Device IDs IT admin Harvest device IDs Existing devices Upload device IDs Deliver direct to employeeShip Facilitate provisioning new devices - Requires Windows 10 Pro or enterprise, 1703 or later
  • 8. Identifies suspicious attacks and threats near real time Azure Active Directory Premium Conditional AccessTwo way password sync Self-service Password Reset Connection between Active Directory and Azure Active Directory Data classification and protection Automated Threat detection and remediation Security - Protection against cyberthreats Mobile device settings management Mobile application management Selective wipe Motoring and Reporting Azure Information Protection Cloud App Security Advanced Threat Protection Security Center Intune
  • 9. Identity Protection and Access Management Secure authentication Reduce risk of security breaches Turn on one of the many multi-factor authentication options to protect your users from 99.99% of identity attacks. Set the right identity foundation Connect all your apps to a single identity platform in the cloud to get the most security and productivity for your organization
  • 10. What is Azure AD? Azure AD • A multi-tenant service that provides enterprise-level identity and access management for the cloud. • Built to support global scale, reliability and availability. • Backed by a 99.99% SLA Features • Modern authentication (MFA, OAuth 2.0, Passwordless sign-in) • Self-Service Password reset • Conditional Access Hybrid AD • Connect with existing on-premises Active Directory - AD Connect • Hybrid device join • Single Identity in both in the cloud and on-premises • Single Sign-On
  • 11. What is it? Simple & powerful automated access control based on conditions such as: • Device Compliance • Trusted Locations What you need to know Baseline policies enable strong security via simple on/off toggle: Example are: • Require MFA For admins • Block legacy authentication Additional policies are fully customizable. Can be used to block unauthorized logons even when the password is stolen. Conditional Access
  • 12. Endpoint Management • Intune Intune is a unified endpoint management offering, integrating Mobile device management and Application management in a single cloud service • Central management for Devices and Applications • Compliance policies • Configuration policies • Application control • Remote Wipe
  • 13. Managing mobile devices – two approaches Commonly used for total management of company- owned devices Company manages the security of the entire device • Commonly used for personal devices (Bring Your Own Device scenario) • Company manages the security of only those applications that are enrolled Mobile Application Management (MAM)Mobile Device Management (MDM) Provision settings, certs, profiles Report & measure device compliance Advanced policy controls Secure corporate data within apps Report app inventory & usage Remove corporate data Managed via setup wizard and simplified UI Managed via Intune admin center Additional steps to set up (provision certificates, etc) https://docs.microsoft.com/en-us/intune/ios-enroll https://docs.microsoft.com/en-us/intune/android-enroll
  • 14. Information protection • Azure Information Protection Azure Information Protection is a cloud-based solution that helps an organization to classify and protect its documents and emails • Document classification • Encryption • Cloud-based identity verification • Document tracking • Integration with Office 365 • Protection regardless of location, including Exchange Online, SharePoint or local storage
  • 15. Azure Information Protection (AIP) What you need to know • AIP works by classifying data based on sensitivity. You configure policies to classify, label, and protect data based on its sensitivity. • Classification and protection information follows the data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. • Define who can access data and what they can do with it—such as allowing to view and edit files, but not print or forward. • AIP is turned on with a default set of labels in Microsoft 365 Business
  • 16. Cloud App Security The Cloud App Security framework Discover and control the use of Shadow IT: • Identify the cloud apps, IaaS, and PaaS services used by your organization. Investigate usage patterns, assess the risk levels and business readiness • Start managing them to ensure security and compliance. Protect your sensitive information anywhere in the cloud: • Understand, classify, and protect the exposure of sensitive information at rest. • Automated processes to apply controls in real-time across all your cloud apps. Protect against cyberthreats and anomalies: •Detect unusual behavior across cloud apps to identify ransomware, compromised users or rogue applications Assess the compliance of your cloud apps: • Assess if your cloud apps meet relevant compliance • Prevent data leaks to non-compliant apps, and limit access to regulated data.
  • 19. Office 365 Data Loss Prevention MICROSOFT’S APPROACH TO INFORMATION PROTECTION Comprehensive protection of sensitive data throughout the lifecycle – inside and outside the organization Windows Information Protection Intune MDM & MAM for iOS & Android Microsoft 365 Unified Labels BitLocker for Windows 10 Azure Information Protection Microsoft Cloud App Security Office 365 Information Protection Azure Information Protection Windows Information Protection
  • 20. Security Management • Advanced Threat Protection (ATP) • Endpoint Behavioral Sensors. • Cloud Security Analytics • Threat Intelligence • Security Center
  • 21. Advanced Threat Protection Detect threats fast with Behavioral Analytics Focus on what is important using attack timeline Reduce the fatigue of false positives Best-in-class security powered by the Intelligent Security Graph Protect at scale with the power of the cloud
  • 22. Combined Microsoft Stack: Maximize detection coverage throughout the attack stages User browses to a website User runs a program Office 365 ATP Windows Defender ATP Email protection End Point protection User receives an email Opens an attachment Clicks on a URL Exploitation Installation C&C channel Reconnaissance Lateral Movement Domain Dominance Advanced Threat Protection Security Model Brute force an account Azure ATP Identity protection
  • 23. Monitoring and Reporting Security and Compliance Center Security Center is a unified infrastructure security management system • Real-Time Security Overview • Drill down to issues and assess severity • Manage organization policies
  • 26. Q & A
  • 27. Features Office 365 BP Microsoft 365 Business Microsoft 365 E3 Microsoft 365 E5 Maximum number of users 300 300 unlimited unlimited Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote, Access), Office Online Business Business ProPlus ProPlus Email & Calendar Outlook, Exchange Online 50GB 50GB unlimited unlimited Hub for Teamwork Chat-based workspace, online meetings, and more in Microsoft Teams     File Storage OneDrive for Business 1 TB/user 1 TB/user unlimited unlimited Social, Video, Sites Yammer, SharePoint Online, Planner     Stream    Business Apps Scheduling Apps – Bookings1, StaffHub     Business Apps – Outlook Customer Manager, MileIQ1   Threat Protection Microsoft Advanced Threat Analytics, Device Guard, Credential Guard, App Locker, Enterprise Data Protection,   Office 365 Advanced Threat Protection   Windows Defender Advanced Threat Protection  Office 365 Threat Intelligence  Identity Management Self-service password reset for hybrid Azure Active Directory accounts, Azure MFA, Conditional Access    Azure AD: Cloud App Discovery, AAD Connect Health, SSO for more than 10 Apps   Azure Active Directory Plan 2  Device & App Management Microsoft Intune, Windows AutoPilot    Shared Computer Activation    Microsoft Desktop Optimization Package, VDA   Information Protection Office 365 Data Loss Prevention, Azure Information Protection Plan 1    Azure Information Protection Plan 2, Microsoft Cloud App Security, O365 Cloud App Security  On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype, Windows, SCCM, Win. Rights Management)   Compliance Unlimited email archiving2    Advanced eDiscovery, Customer Lockbox, Advanced Data Governance  Analytics Power BI Pro, MyAnalytics  Voice PSTN Conferencing, Cloud PBX  ComparisonacrossBusinessPremiumandMicrosoft365SKU’s [1] Available in US, UK, Canada | [2] Unlimited archiving when auto-expansion is turned on