SlideShare uma empresa Scribd logo
1 de 32
We Belgians love our chocolate(y’)s
MDATP
&
CHOCOLATEY
Tim Hermie
• Modern Workplace Architect @Synergics
• Technical Trainer | MCT
• Blog: https://www.cloud-boy.be
• Twitter: @_Cloud_boy
Jasper Bernaers
• Modern Workplace Lead @Synergics
• Microsoft Security enthusiast
• Blog: blog.bernaers.be
• Twitter: @Jasper_be
Agenda
• What is MDATP?
• Why MDATP?
• Why Chocolatey?
• What is Chocolatey?
• How do we deploy Chocolatey?
• Key takeaways
• MDATP + Chocolatey = <3
WHAT?
What is MDATP?
• Microsoft Defender Advanced Threat Protection
• Endpoint security management, cross platform
• Optimized for simplicity - ease of use - while providing flexibility
• Security management is extensible through the rich API set
• Both on-prem and cloud connected devices
Modern Web Protection
Any Device Anywhere Intelligent
MDATP is enabling customers to identify and secure the
connected devices in their enterprise, no matter where users
take their devices or how they connect to the internet.
DEMO
MDATP devices overview.
Threat & Vulnerability Management dashboard overview
WHY?
Software inventory
Security recommendations
Web threat protection
Cloud App Security
Microsoft Defender ATP – Quick Wins
• Responsible for security
monitoring and reducing risk
• Analyze threats, security
incidents and identify
mitigations
• Priority is on quick
remediation on impacted
devices/users
Sec Ops IT Team
+
Sec Ops IT Team
SecAdmin
Security defined; IT implemented
DEMO
MDATP Threat and Vulnerability remediation via Microsoft Endpoint Manager
Create security tasks
WHY?
Why implementing Chocolatey?
• Different installer formats
• Zips and other archive formats
• Software installers are messy
• How are we handling 3rd party software updates?
• Software management is like the Wild West
Software management
may account for
50 – 90 %
of your automation!
WHAT?
But what is Chocolatey?
• Universal approach
• The power of PowerShell!
• Fancy zip files = “packages”
• Auto updating framework that is customizable
• The story of modern automation for Windows
Community based!
• Community package repository
• Https://www.chocolatey.org/packages
• Community feed
• Community maintained
• Everything goes through VirusTotal
HOW?
PowerShell
• Easy to deploy
• Deploy Chocolatey agent
• Deploy Auto Upgrade
• Deploy applications
• Can be done all together in 1 PowerShell script
• Can be done in multiple PowerShell scripts
• Not much control!
Win32App
• Easy to deploy
• System requirements
• Device restart behavior
• Detection rules
• Dependencies
• Device install status
• Only need to wrap one IntuneWin file for all your Apps
• powershell -ex bypass -file ChocoInstall.ps1 -package wireshark
DEMO
Accept security task and resolve it with:
- Deploying packages with Microsoft Endpoint Manager = Intune
- Automatically update 3rd party apps
KEY
TAKEWAYS
Key takeaways up till now
• Implement MDATP (if your budget allows it)
• Use MDATP to check device vulnerabilities
• Integrate Chocolatey for standard apps
• Deploy Chocolatey apps as W32 apps
• Make ur apps auto-updating with Chocolatey
• Make use of the security tasks feature in MEM Intune
MDATP
+
CHOCOLATEY
=
<3
DEMO
Software vulnerabilities on machine with Chocolatey apps
Resolve security task
MDATP + Chocolatey = <3
• Auto updating apps = lower security risk
• Auto updating apps = lower exposure score in MDATP
• Auto updating apps = watching more Netflix
Q&A
Thanks to our sponsors!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

4 Modern Desktop - Planning a Modern Desktop Deployment
4   Modern Desktop -  Planning a Modern Desktop Deployment4   Modern Desktop -  Planning a Modern Desktop Deployment
4 Modern Desktop - Planning a Modern Desktop Deployment
 
SC conference - Building AppSec Teams
SC conference  - Building AppSec TeamsSC conference  - Building AppSec Teams
SC conference - Building AppSec Teams
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
 
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the governmentDevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
 
Microsoft 365 Certification - How to become Enterprise Administrator Expert
Microsoft 365 Certification - How to become Enterprise Administrator ExpertMicrosoft 365 Certification - How to become Enterprise Administrator Expert
Microsoft 365 Certification - How to become Enterprise Administrator Expert
 
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOpsSoftware Supply Chain Automation Removes Roadblocks to Rugged DevOps
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
 
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
Supporting Remote Work While Securing, Governing, and Protecting Your Microso...
 
CSF18 Azure Information Protection - Albert Hoitingh
CSF18   Azure Information Protection - Albert HoitinghCSF18   Azure Information Protection - Albert Hoitingh
CSF18 Azure Information Protection - Albert Hoitingh
 
Microservices with Node.js - Livestreamed for Manning
Microservices with Node.js - Livestreamed for ManningMicroservices with Node.js - Livestreamed for Manning
Microservices with Node.js - Livestreamed for Manning
 
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
The Cloud promises - Global Azure Bootcamp Paris 2019
The Cloud promises - Global Azure Bootcamp Paris 2019The Cloud promises - Global Azure Bootcamp Paris 2019
The Cloud promises - Global Azure Bootcamp Paris 2019
 
Overcoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsOvercoming Security Challenges in DevOps
Overcoming Security Challenges in DevOps
 
Securing and Scaling SaaS
Securing and Scaling SaaSSecuring and Scaling SaaS
Securing and Scaling SaaS
 
Owasp summit 2017
Owasp summit 2017 Owasp summit 2017
Owasp summit 2017
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 
Azure saturday 2017 - Protecting cloud identities using ems
Azure saturday 2017 - Protecting cloud identities using emsAzure saturday 2017 - Protecting cloud identities using ems
Azure saturday 2017 - Protecting cloud identities using ems
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 

Semelhante a MDATP & Chocolatey - we Belgians love our Chocolate(y')s

Chocolatey + DSC = Software Automation Sweeter - PowerShell Day UK
Chocolatey + DSC = Software Automation Sweeter - PowerShell Day UKChocolatey + DSC = Software Automation Sweeter - PowerShell Day UK
Chocolatey + DSC = Software Automation Sweeter - PowerShell Day UK
Rob Reynolds
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
PranavPatil822557
 
Modern Software Management on Windows w/Chocolatey - That Conference 2017
Modern Software Management on Windows w/Chocolatey - That Conference 2017Modern Software Management on Windows w/Chocolatey - That Conference 2017
Modern Software Management on Windows w/Chocolatey - That Conference 2017
Rob Reynolds
 

Semelhante a MDATP & Chocolatey - we Belgians love our Chocolate(y')s (20)

Chocolatey for Organizations: Easily Manage Software - PowerShell Summit 2019
Chocolatey for Organizations: Easily Manage Software - PowerShell Summit 2019Chocolatey for Organizations: Easily Manage Software - PowerShell Summit 2019
Chocolatey for Organizations: Easily Manage Software - PowerShell Summit 2019
 
Chocolatey - Software Automation for Windows (and sneak peak of Central Mana...
 Chocolatey - Software Automation for Windows (and sneak peak of Central Mana... Chocolatey - Software Automation for Windows (and sneak peak of Central Mana...
Chocolatey - Software Automation for Windows (and sneak peak of Central Mana...
 
Chocolatey + DSC = Software Automation Sweeter - PowerShell Day UK
Chocolatey + DSC = Software Automation Sweeter - PowerShell Day UKChocolatey + DSC = Software Automation Sweeter - PowerShell Day UK
Chocolatey + DSC = Software Automation Sweeter - PowerShell Day UK
 
Modern Software Management on Windows with Chocolatey and Puppet
Modern Software Management on Windows with Chocolatey and PuppetModern Software Management on Windows with Chocolatey and Puppet
Modern Software Management on Windows with Chocolatey and Puppet
 
PuppetConf 2017: Modern Software Management on Windows with Chocolatey and Pu...
PuppetConf 2017: Modern Software Management on Windows with Chocolatey and Pu...PuppetConf 2017: Modern Software Management on Windows with Chocolatey and Pu...
PuppetConf 2017: Modern Software Management on Windows with Chocolatey and Pu...
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
 
Chocolatey + Artifactory = A Sweet Solution for Managing Windows
Chocolatey + Artifactory = A Sweet Solution for Managing WindowsChocolatey + Artifactory = A Sweet Solution for Managing Windows
Chocolatey + Artifactory = A Sweet Solution for Managing Windows
 
Easily Manage Patching and Application Updates with Chocolatey + Puppet - Apr...
Easily Manage Patching and Application Updates with Chocolatey + Puppet - Apr...Easily Manage Patching and Application Updates with Chocolatey + Puppet - Apr...
Easily Manage Patching and Application Updates with Chocolatey + Puppet - Apr...
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
 
MAUI.pptx
MAUI.pptxMAUI.pptx
MAUI.pptx
 
Azure mobile services
Azure mobile servicesAzure mobile services
Azure mobile services
 
C days2015
C days2015C days2015
C days2015
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim Mackey
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
IBM Multicloud Management on the OpenShift Container Platform
IBM Multicloud Management on theOpenShift Container PlatformIBM Multicloud Management on theOpenShift Container Platform
IBM Multicloud Management on the OpenShift Container Platform
 
Modern Software Management on Windows w/Chocolatey - That Conference 2017
Modern Software Management on Windows w/Chocolatey - That Conference 2017Modern Software Management on Windows w/Chocolatey - That Conference 2017
Modern Software Management on Windows w/Chocolatey - That Conference 2017
 
Software Engineering - chp8- deployment
Software Engineering - chp8- deploymentSoftware Engineering - chp8- deployment
Software Engineering - chp8- deployment
 
Ibm bluemix paris_techtalks 2015
Ibm bluemix paris_techtalks 2015Ibm bluemix paris_techtalks 2015
Ibm bluemix paris_techtalks 2015
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

MDATP & Chocolatey - we Belgians love our Chocolate(y')s

  • 1. We Belgians love our chocolate(y’)s MDATP & CHOCOLATEY
  • 2. Tim Hermie • Modern Workplace Architect @Synergics • Technical Trainer | MCT • Blog: https://www.cloud-boy.be • Twitter: @_Cloud_boy
  • 3. Jasper Bernaers • Modern Workplace Lead @Synergics • Microsoft Security enthusiast • Blog: blog.bernaers.be • Twitter: @Jasper_be
  • 4. Agenda • What is MDATP? • Why MDATP? • Why Chocolatey? • What is Chocolatey? • How do we deploy Chocolatey? • Key takeaways • MDATP + Chocolatey = <3
  • 6. What is MDATP? • Microsoft Defender Advanced Threat Protection • Endpoint security management, cross platform • Optimized for simplicity - ease of use - while providing flexibility • Security management is extensible through the rich API set • Both on-prem and cloud connected devices
  • 7.
  • 8. Modern Web Protection Any Device Anywhere Intelligent MDATP is enabling customers to identify and secure the connected devices in their enterprise, no matter where users take their devices or how they connect to the internet.
  • 9. DEMO MDATP devices overview. Threat & Vulnerability Management dashboard overview
  • 10. WHY?
  • 11. Software inventory Security recommendations Web threat protection Cloud App Security Microsoft Defender ATP – Quick Wins
  • 12. • Responsible for security monitoring and reducing risk • Analyze threats, security incidents and identify mitigations • Priority is on quick remediation on impacted devices/users Sec Ops IT Team
  • 13. + Sec Ops IT Team SecAdmin
  • 14. Security defined; IT implemented
  • 15. DEMO MDATP Threat and Vulnerability remediation via Microsoft Endpoint Manager Create security tasks
  • 16. WHY?
  • 17. Why implementing Chocolatey? • Different installer formats • Zips and other archive formats • Software installers are messy • How are we handling 3rd party software updates? • Software management is like the Wild West
  • 18. Software management may account for 50 – 90 % of your automation!
  • 19. WHAT?
  • 20. But what is Chocolatey? • Universal approach • The power of PowerShell! • Fancy zip files = “packages” • Auto updating framework that is customizable • The story of modern automation for Windows
  • 21. Community based! • Community package repository • Https://www.chocolatey.org/packages • Community feed • Community maintained • Everything goes through VirusTotal
  • 22. HOW?
  • 23. PowerShell • Easy to deploy • Deploy Chocolatey agent • Deploy Auto Upgrade • Deploy applications • Can be done all together in 1 PowerShell script • Can be done in multiple PowerShell scripts • Not much control!
  • 24. Win32App • Easy to deploy • System requirements • Device restart behavior • Detection rules • Dependencies • Device install status • Only need to wrap one IntuneWin file for all your Apps • powershell -ex bypass -file ChocoInstall.ps1 -package wireshark
  • 25. DEMO Accept security task and resolve it with: - Deploying packages with Microsoft Endpoint Manager = Intune - Automatically update 3rd party apps
  • 27. Key takeaways up till now • Implement MDATP (if your budget allows it) • Use MDATP to check device vulnerabilities • Integrate Chocolatey for standard apps • Deploy Chocolatey apps as W32 apps • Make ur apps auto-updating with Chocolatey • Make use of the security tasks feature in MEM Intune
  • 29. DEMO Software vulnerabilities on machine with Chocolatey apps Resolve security task
  • 30. MDATP + Chocolatey = <3 • Auto updating apps = lower security risk • Auto updating apps = lower exposure score in MDATP • Auto updating apps = watching more Netflix
  • 31. Q&A
  • 32. Thanks to our sponsors!