SlideShare uma empresa Scribd logo
1 de 195
Baixar para ler offline
Azure Active Directory –
Secure and Govern
Secure Authentication
Conditional Access
Mitigate Admin Risk with Privileged Identity
Management
Terms of Use
Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance
Azure Active Directory - Secure Authentication and Identity Governance

Mais conteúdo relacionado

Mais de Cheah Eng Soon

MEM for OnPrem Environments
MEM for OnPrem EnvironmentsMEM for OnPrem Environments
MEM for OnPrem EnvironmentsCheah Eng Soon
 
Microsoft Threat Protection Automated Incident Response
Microsoft Threat Protection Automated Incident Response Microsoft Threat Protection Automated Incident Response
Microsoft Threat Protection Automated Incident Response Cheah Eng Soon
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration TestingCheah Eng Soon
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration TestingCheah Eng Soon
 
Penetration Testing Azure for Ethical Hackers
Penetration Testing Azure for Ethical HackersPenetration Testing Azure for Ethical Hackers
Penetration Testing Azure for Ethical HackersCheah Eng Soon
 
Microsoft Threat Protection Automated Incident Response Demo
Microsoft Threat Protection Automated Incident Response DemoMicrosoft Threat Protection Automated Incident Response Demo
Microsoft Threat Protection Automated Incident Response DemoCheah Eng Soon
 
Microsoft Secure Score Demo
Microsoft Secure Score DemoMicrosoft Secure Score Demo
Microsoft Secure Score DemoCheah Eng Soon
 
Microsoft Cloud App Security Demo
Microsoft Cloud App Security DemoMicrosoft Cloud App Security Demo
Microsoft Cloud App Security DemoCheah Eng Soon
 
M365 Attack Simulation Demo
M365 Attack Simulation DemoM365 Attack Simulation Demo
M365 Attack Simulation DemoCheah Eng Soon
 
Azure Active Directory - External Identities Demo
Azure Active Directory - External Identities Demo Azure Active Directory - External Identities Demo
Azure Active Directory - External Identities Demo Cheah Eng Soon
 
Azure Weekend 2020 Build Malaysia Bus Uncle Chatbot
Azure Weekend 2020 Build Malaysia Bus Uncle ChatbotAzure Weekend 2020 Build Malaysia Bus Uncle Chatbot
Azure Weekend 2020 Build Malaysia Bus Uncle ChatbotCheah Eng Soon
 
Microsoft Azure的20大常见安全漏洞与配置错误
Microsoft Azure的20大常见安全漏洞与配置错误Microsoft Azure的20大常见安全漏洞与配置错误
Microsoft Azure的20大常见安全漏洞与配置错误Cheah Eng Soon
 
20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in AzureCheah Eng Soon
 
Integrate Microsoft Graph with Azure Bot Services
Integrate Microsoft Graph with Azure Bot ServicesIntegrate Microsoft Graph with Azure Bot Services
Integrate Microsoft Graph with Azure Bot ServicesCheah Eng Soon
 
Azure Sentinel with Office 365
Azure Sentinel with Office 365Azure Sentinel with Office 365
Azure Sentinel with Office 365Cheah Eng Soon
 
3 Steps Integrate Microsoft Graph with Azure Bot Services
3 Steps Integrate Microsoft Graph with Azure Bot Services3 Steps Integrate Microsoft Graph with Azure Bot Services
3 Steps Integrate Microsoft Graph with Azure Bot ServicesCheah Eng Soon
 
Data Science - The Most Profitable Movie Characteristic
Data Science -  The Most Profitable Movie CharacteristicData Science -  The Most Profitable Movie Characteristic
Data Science - The Most Profitable Movie CharacteristicCheah Eng Soon
 
Modernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure SentinelModernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure SentinelCheah Eng Soon
 

Mais de Cheah Eng Soon (20)

MEM for OnPrem Environments
MEM for OnPrem EnvironmentsMEM for OnPrem Environments
MEM for OnPrem Environments
 
Microsoft Threat Protection Automated Incident Response
Microsoft Threat Protection Automated Incident Response Microsoft Threat Protection Automated Incident Response
Microsoft Threat Protection Automated Incident Response
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration Testing
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration Testing
 
Penetration Testing Azure for Ethical Hackers
Penetration Testing Azure for Ethical HackersPenetration Testing Azure for Ethical Hackers
Penetration Testing Azure for Ethical Hackers
 
Microsoft Threat Protection Automated Incident Response Demo
Microsoft Threat Protection Automated Incident Response DemoMicrosoft Threat Protection Automated Incident Response Demo
Microsoft Threat Protection Automated Incident Response Demo
 
Microsoft Secure Score Demo
Microsoft Secure Score DemoMicrosoft Secure Score Demo
Microsoft Secure Score Demo
 
Microsoft Cloud App Security Demo
Microsoft Cloud App Security DemoMicrosoft Cloud App Security Demo
Microsoft Cloud App Security Demo
 
M365 Attack Simulation Demo
M365 Attack Simulation DemoM365 Attack Simulation Demo
M365 Attack Simulation Demo
 
Cloud Security Demo
Cloud Security DemoCloud Security Demo
Cloud Security Demo
 
Azure Active Directory - External Identities Demo
Azure Active Directory - External Identities Demo Azure Active Directory - External Identities Demo
Azure Active Directory - External Identities Demo
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
 
Azure Weekend 2020 Build Malaysia Bus Uncle Chatbot
Azure Weekend 2020 Build Malaysia Bus Uncle ChatbotAzure Weekend 2020 Build Malaysia Bus Uncle Chatbot
Azure Weekend 2020 Build Malaysia Bus Uncle Chatbot
 
Microsoft Azure的20大常见安全漏洞与配置错误
Microsoft Azure的20大常见安全漏洞与配置错误Microsoft Azure的20大常见安全漏洞与配置错误
Microsoft Azure的20大常见安全漏洞与配置错误
 
20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure
 
Integrate Microsoft Graph with Azure Bot Services
Integrate Microsoft Graph with Azure Bot ServicesIntegrate Microsoft Graph with Azure Bot Services
Integrate Microsoft Graph with Azure Bot Services
 
Azure Sentinel with Office 365
Azure Sentinel with Office 365Azure Sentinel with Office 365
Azure Sentinel with Office 365
 
3 Steps Integrate Microsoft Graph with Azure Bot Services
3 Steps Integrate Microsoft Graph with Azure Bot Services3 Steps Integrate Microsoft Graph with Azure Bot Services
3 Steps Integrate Microsoft Graph with Azure Bot Services
 
Data Science - The Most Profitable Movie Characteristic
Data Science -  The Most Profitable Movie CharacteristicData Science -  The Most Profitable Movie Characteristic
Data Science - The Most Profitable Movie Characteristic
 
Modernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure SentinelModernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure Sentinel
 

Último

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Último (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Azure Active Directory - Secure Authentication and Identity Governance

  • 1. Azure Active Directory – Secure and Govern
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Mitigate Admin Risk with Privileged Identity Management
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.

Notas do Editor

  1. In the modern workplace, the end user’s needs can easily be at odds with the requirements an IT department faces. Deana runs a lean team in IT and is tasked with modernizing Contoso’s identity and access management solution, all while reducing support costs. Not only is Contoso experiencing a hiring surge to support their latest product, but Deana is also dealing with an explosion in the number of apps employees use every day to do their jobs. For Isaiah, as a new member of the Sales team, the ability to interact with teammates across groups and even outside the company is important. He must work seamlessly across a wide array of apps, both external and internal. The question is can he do all of this securely and easily and still be empowered to make good decisions for Contoso on his own. CLICK STEP Click to advance the slide.
  2. While most of Contoso’s applications are enabled for one-click access, other applications, like BrowserStack, require very high security. IT needs to know that no one but Isaiah is accessing this application. So when Isaiah uses this application, he is prompted to confirm that his identity via authentication using his phone. CLICK STEP Click the BrowserStack app.
  3. The Microsoft Authenticator app on his mobile device was previously configured to provide passwordless authentication for his work account. CLICK STEP Click Code to trigger typing animation.
  4. [Presentation will auto type 123456.] This is a very secure method of authentication because: He’s authenticating with something he owns (his personal mobile device) and something he has (his biometrics). Isaiah doesn’t have to use a password anywhere in this entire process. CLICK STEP Click Verify.
  5. CLICK STEP Click Yes.
  6. CLICK STEP Click to advance the slide.
  7. Conditional Access provides the control and protection that Contoso needs to keep corporate data secure, while giving people an experience that allows them to do their best work from any device. With Conditional Access, Deanna can define policies that provide contextual controls at the user, location, device, and app levels. She can allow or block access or challenge users with multi-factor authentication, device enrollment, or a password change. Plus, machine learning-based identity protection, which leverages billions of signals daily, detects suspicious behavior and applies risk-based conditional access that protects Contoso’s applications and critical company data in real time. With Conditional Access by Microsoft, Contoso gets the control needed to ensure that corporate data is secure, while allowing people to roam freely between apps and devices, accessing their data in the cloud and on‑premises. CLICK STEP Click to advance the slide.
  8. Deana is going to configure Contoso’s environment to require multifactor authentication (MFA) for admins. Requiring MFA for admins protects the following administrator roles:   Global administrator SharePoint administrator Exchange administrator Conditional access administrator Security administrator Helpdesk administrator/Password administrator Billing administrator User administrator CLICK STEP In the Contoso – Overview pane, click the scroll bar next to Manage to trigger scroll animation.
  9. [Presentation will auto scroll.] CLICK STEP Under Security, click Identity Secure Score.
  10. POINT OUT: Point out Your Identity Secure Score Current Score/Maximum Score Improvement Actions CLICK STEP Under Improvement Actions, click Require MFA for Azure AD p….
  11. POINT OUT: Point to, but do not click, SCORE IMPACT, MAX SCORE, and DESCRIPTION. CLICK STEP In the Improvement action pane, click the scroll bar to begin scroll animation.
  12. [Presentation will auto scroll.] POINT OUT: Point to, but do not click, WHAT AM I ABOUT TO CHANGE? and HOW WILL IT AFFECT MY USERS? CLICK STEP Click Get Started.
  13. CLICK STEP On the Conditional Access – Policies blade, click Baseline policy: Require MFA for admins (Preview).
  14. POINT OUT: Point to, but do not click, the bulleted list of directory roles. CLICK STEP On the Baseline policy: Require MFA for admins blade, click Use policy immediately.
  15. CLICK STEP Click Save.
  16. Deana’s CTO is adamant about higher security on SharePoint due to the sensitive nature of the documents stored there. No one should be able to access the SharePoint site from an unmanaged device. Deana will ensure that these security requirements are set for SharePoint and publish the appropriate policy. CLICK STEP Click the SharePoint admin center browser tab.
  17. Deana first enables the Access Control Policy for Unmanaged Devices in the SharePoint admin center. This will auto-generate the Conditional Access Policy in Azure Active Directory (Azure AD) for fine tuning and further control. CLICK STEP Click Unmanaged devices.
  18. CLICK STEP In the Unmanaged devices pane, click Block access.
  19. CLICK STEP Click Save.
  20. CLICK STEP Click the Conditional Access – Policies browser tab.
  21. In Azure Active Directory, Deana adds mobile apps and desktop clients to the devices that must be managed in order to access SharePoint. CLICK STEP Click [SharePoint admin center]Use app-enforced Restrictions for browser access.
  22. CLICK STEP Under Assignments, click Conditions.
  23. CLICK STEP Click Client apps (preview).
  24. CLICK STEP Click Mobile apps and desktop clients.
  25. CLICK STEP Click Other clients.
  26. CLICK STEP In the Clients apps (preview) pane, click Done.
  27. CLICK STEP In the Conditions pane click Done.
  28. CLICK STEP In the [SharePoint admin center]… pane click the scroll bar to trigger scroll animation.
  29. [Presentation will auto scroll.] CLICK STEP Under Access controls, click Session.
  30. POINT OUT Point to, but do not click, Use app enforced restrictions. CLICK STEP Click Select.
  31. CLICK STEP Click Save.
  32. Once this policy is enabled, users will no longer be able to access SharePoint from browsers that are not managed by Azure Active Directory. Now, lets see the policy in action from an end user perspective. CLICK STEP Click to advance the slide.
  33. CLICK STEP Click SharePoint.
  34. POINT OUT: Point to, but do not click, the Access Denied message. CLICK STEP Click to advance the slide.
  35. Legacy authentication protocols (ex: IMAP, SMTP, POP3) are normally used by mail clients to authenticate. Legacy protocols do NOT support MFA. Even if you have an MFA policy for your tenant, a bad actor can authenticate using one of these legacy protocols and bypass MFA. CLICK STEP In the left-hand navigation, click Azure Active Directory.
  36. CLICK STEP In the Contoso – Overview pane, click the scroll bar next to Manage to trigger scroll animation.
  37. [Presentation will auto scroll.] CLICK STEP Under Security, click Conditional Access.
  38. Today, majority of all compromising sign-in attempts come from legacy authentication. What better way to get protected than blocking these sign-in attempts altogether! To make it easier for you to block all sign-in requests made by legacy protocols, we recommend enabling the baseline policy that does just that. In fact, Security Basics, a new feature of Azure AD, will be applying these Baseline policies to all new tenants by default. CLICK STEP Under POLICY NAME, click Baseline policy: Block legacy authentication (Preview).
  39. POINT OUT Point to, but do not click, the bulleted list of apps the policy applies to. CLICK STEP In the Baseline policy: Block lega… pane, click the X.
  40. POINT OUT: Point to, but do not click, Baseline policy: Require MFA for admins (Preview), Baseline policy: End user protection (Preview), and Baseline policy: Require MFA for Service Management (Preview). CLICK STEP In the left-hand navigation, click Azure Active Directory.
  41. A great way to keep users secure while empowering employee productivity is by setting up automated remediation policies for any risky users. CLICK STEP In the Contoso – Overview pane, click the scroll bar to trigger scroll animation.
  42. [Presentation will auto scroll.] First, you’ll want to understand your security posture. Reviewing your Identity Secure Score is a great way to see how many of your users represent low, medium, or high risk. Based on the user risk, you can automatically set risk mediation policies—like requiring a password change when the user risk is medium or higher. CLICK STEP Under Security, click Identity Secure Score.
  43. CLICK STEP Under Security, click Overview (Preview).
  44. CLICK STEP Halfway down the Overview (Preview) pane, click Configure user risk policy.
  45. With so many users being flagged as risky, a policy requiring them to change their password on next logon is a good idea. That way, Deana can be sure any Identities that were leaked are now protected by new passwords. CLICK STEP Click All users.
  46. CLICK STEP Click Select individuals and groups.
  47. CLICK STEP Click Select users.
  48. CLICK STEP Click Search by name or email address, to trigger typing animation.
  49. [Presentation will auto type sg-s.] CLICK STEP Click sg-Sales and Marketing.
  50. CLICK STEP Click Select.
  51. CLICK STEP Click Done.
  52. CLICK STEP Under Assignments, click Conditions.
  53. CLICK STEP Click Select a risk level.
  54. CLICK STEP Click Medium and above.
  55. CLICK STEP Click Select.
  56. CLICK STEP Click Done.
  57. CLICK STEP Under Controls click Select a control.
  58. POINT OUT Point to, but do not click, Allow access and Require password change. CLICK STEP Click Select.
  59. CLICK STEP Click Save.
  60. CLICK STEP Click to advance the slide.
  61. CLICK STEP Click to advance the slide.
  62. With Azure AD Privileged Identity Management, Contoso can manage, control, and monitor access within the organization. This includes access to resources in Azure AD and other Microsoft online services like Office 365 or Microsoft Intune. CLICK STEP At the top, click Search resources, services, and docs to trigger typing animation.
  63. [Presentation will auto type Azure AD Pri.] CLICK STEP Click Azure AD Privileged Identity Management.
  64. The Azure AD Privileged Identity Management console in the Azure Portal gives Deana important information such as: Alerts that point out opportunities to improve security The number of users who are assigned to each privileged role The number of eligible and permanent admins Ongoing access reviews CLICK STEP Under Manage, click Azure AD roles.
  65. CLICK STEP Under Manage, click Roles.
  66. POINT OUT: Point to, but do not click, the ROLE and DESCRIPTION columns. CLICK STEP On the far right click the scroll bar to trigger scroll animation.
  67. [Presentation will auto scroll.] CLICK STEP Click Global Administrator.
  68. Contoso has several permanent Global Admins. They have full access and control over the directory and the Office 365 tenant all the time. This means that Contoso is continually open to malicious attacks.  CLICK STEP In the Global Administrator - Members blade, on the entry for Isaiah Langer, click the ellipsis (…).
  69. With Privileged Identity Management, Contoso can decide who should have permanent access and who should just have temporary access when required. Isaiah does not need permanent admin access, so the admin sets him to eligible. CLICK STEP Click Make eligible.
  70. Eligible admins are users that need privileged access now and then, but not every day. The role is inactive until Isaiah needs access. When he needs access, he will complete an activation process and becomes an active admin for a predetermined amount of time. CLICK STEP Click X to close the Global Administrator - Members blade.
  71. CLICK STEP Under Manage, click Settings.
  72. CLICK STEP Click Roles.
  73. CLICK STEP On the Roles pane, click the scroll bar to trigger scroll animation.
  74. [Presentation will auto scroll.] CLICK STEP Click Global Administrator.
  75. The admin can also configure the details of the admins access, including how long it lasts, and if any notification or additional authentication is needed. Note that for certain high privileged roles, MFA is always required. CLICK STEP Click the bar under Maximum activation duration (hours).
  76. CLICK STEP Under Notifications, click Enable.
  77. CLICK STEP At the top of the Global Administrator pane, click Save.
  78. CLICK STEP Click to advance the slide.
  79. When Isaiah needs higher privileges for a specific task, he can go into Privileged Identity Management in the Azure portal and request activation for the access role. Any type of admin can use Azure AD Privileged Identity Management to activate. CLICK STEP Click the email from Microsoft Azure with the title PIM: You can now active…
  80. CLICK STEP Click Activate role.
  81. CLICK STEP Click Maybe later.
  82. CLICK STEP Click We have deprecated this blade.
  83. CLICK STEP Under Tasks, click My roles.
  84. CLICK STEP On the line for Global Administrator, click Activate.
  85. CLICK STEP At the top of the Global Administrator pane, click Activate.
  86. CLICK STEP In the Activation reason (max 500 characters), click to trigger typing animation.
  87. [Presentation will auto type Demo.] Isaiah can now activate the request. Role activation is customizable. In the PIM settings, Isaiah can determine the length of the activation and provide a business justification. CLICK STEP At the bottom, click Activate.
  88. Isaiah is auto-approved for the requested access with an expiration time for that permission. CLICK STEP In the Activation status pane, click Sign out.
  89. Using Azure AD Privileged Identity Management, the admin can track changes in privileged role assignments and role activation history. CLICK STEP On the Roles pane, click the X.
  90. CLICK STEP On the Azure AD roles – Settings pane, click the scroll bar to trigger scroll animation.
  91. CLICK STEP Under Activity, click Directory roles audit history.
  92. The admin can see Isaiah just requested access as a Global Administrator. This information can be critical for auditing and forensic investigations. CLICK STEP Click to advance the slide.
  93. This demo shows how a Global Administrator can require users to accept the Terms of Use. CLICK STEP Click to advance the slide.
  94. Azure AD Terms of Use provides a simple method that organizations can use to present information to end users. This presentation ensures users see relevant disclaimers for legal or compliance requirements. CLICK STEP In the Contoso – Overview pane, next to Manage, click the scroll bar to trigger scroll animation.
  95. [Presentation will auto scroll.] CLICK STEP Under Security, click Conditional Access.
  96. CLICK STEP Under Manage, click Terms of use.
  97. CLICK STEP Click + New terms.
  98. Azure AD Terms of Use uses the PDF format to present content. The PDF file can be any content, such as an existing contract documents, allowing you to collect end-user agreements during user sign-in. CLICK STEP Next to Terms of use document, click the folder icon.
  99. CLICK STEP Click ToUPDF.pdf.
  100. CLICK STEP Click Open.
  101. CLICK STEP In the Example: ‘All users terms of use’ box, click to trigger typing animation.
  102. [Presentation will auto type Contoso Terms of Use Policy.] CLICK STEP In the Example: ‘Contoso Terms of Use’ box, click to trigger typing animation.
  103. [Presentation will auto type Contoso Terms of Use.] CLICK STEP Click Select default language.
  104. CLICK STEP In the drop-down list, click the scroll bar to trigger scroll animation.
  105. CLICK STEP Click English.
  106. CLICK STEP Next to Require users to expand the terms of use, click On.
  107. CLICK STEP In the New terms of use pane, click the scroll bar to trigger scroll animation.
  108. CLICK STEP Click Policy templates.
  109. When the option Create conditional access policy later is selected, the terms of use will appear in the grant control list when creating a conditional access policy. CLICK STEP Click Create conditional access policy later.
  110. CLICK STEP Click Create.
  111. CLICK STEP In the Conditional Access – Terms of use pane, click Policies.
  112. CLICK STEP Click + New policy.
  113. CLICK STEP Click Example: ‘Device compliance app policy’, to trigger typing animation.
  114. [Presentation will auto type External User Saas Apps Terms of Use Policy.] CLICK STEP Under Assignments, click Users and groups.
  115. CLICK STEP Click Select users and groups.
  116. CLICK STEP Click Users and groups.
  117. CLICK STEP Click Select.
  118. CLICK STEP Click Search by name or email address to trigger typing animation.
  119. [Presentation will auto type sg-s.] CLICK STEP Click sg-Sales and Marketing.
  120. CLICK STEP Click Select.
  121. CLICK STEP Click Done.
  122. CLICK STEP Under Assignments, click Cloud apps or actions.
  123. CLICK STEP Click Select apps.
  124. CLICK STEP Click Select.
  125. CLICK STEP In the Select pane, click the scroll bar to trigger scroll animation.
  126. [Presentation will auto scroll.] CLICK STEP Click Salesforce.
  127. CLICK STEP Click Select.
  128. CLICK STEP Click Done.
  129. CLICK STEP Under Access controls, click Grant.
  130. CLICK STEP Click Contoso Terms of Use Policy.
  131. CLICK STEP Click Select.
  132. CLICK STEP In the New pane, click the scroll bar to trigger scroll animation.
  133. CLICK STEP Under Enable policy, click On.
  134. CLICK STEP Click Create.
  135. CLICK STEP Click to advance the slide.
  136. An external user’s Terms of Use policy can be verified via the newly enhanced Conditional Access feature. This custom control enables verification of a complete set of terms of use to manage users and group access. CLICK STEP Click Salesforce.
  137. CLICK STEP Click Accept.
  138. POINT OUT: Point to, but do not click, the warning message. CLICK STEP Click Ok.
  139. CLICK STEP Click Contoso Terms of Use.
  140. CLICK STEP Click the far-right scroll bar to trigger scroll animation.
  141. CLICK STEP Click Accept.
  142. When a company policy changes or new compliance rules are to be enforced, Conditional Access for Terms of Use easily manages the changes for all users, in a systematic and targeted way. CLICK STEP Click to advance the slide.
  143. The Terms of use blade shows a count of the users who have accepted and declined. CLICK STEP In the Contoso – Overview pane, click the scroll bar next to Manage to trigger scroll animation.
  144. CLICK STEP Under Security, click Conditional Access.
  145. CLICK STEP Under Manage, click Terms of use.
  146. These counts and who accepted/declined are stored for the life of the Terms of use. CLICK STEP Under ACCEPTED, click 1.
  147. POINT OUT: Point to, but do not click, Isaiah Langer’s status as Accepted. CLICK STEP Click to advance the slide.
  148. In the modern workplace, the end user’s needs can easily be at odds with the requirements an IT department faces. Deana runs a lean team in IT and is tasked with modernizing Contoso’s identity and access management solution, all while reducing support costs. Not only is Contoso experiencing a hiring surge to support their latest product, but Deana is dealing with an explosion in the number of apps employees are using every day to do their jobs. For Isaiah, as a new member of the Sales team, the ability to interact with teammates across groups and even outside the company is important. He must work seamlessly across a wide array of apps, both internal and external. The question is whether he can do all of this securely and easily, and still be empowered to make good decisions for Contoso on his own. CLICK STEP Click to advance the slide.
  149. Identity is the center of security. More than ever before, employees, customers and partners share information across devices, locations, and a world of apps. Today, the power of the cloud is leveraged to ensure identities and access to information and apps are seamless and secure. Let’s look at a specific example of how identity improves both security and productivity–Identity governance.​ Identity Governance allows Deana to manage, monitor and audit the end-to-end Identity Access management lifecycle. ​ CLICK STEP Under Entitlement management (Preview), click Access packages.
  150. When users request access to resources, governance policies ensure access is granted easily, securely and in line with your security and compliance requirements.  Let me show you how an admin can grant resource access to a partner company using this capability. CLICK STEP Click Sales and Marketing.
  151. The admin for Adatum Corporation wants to enable a business partner inside Contoso to collaborate with their Sales and Marketing team. With the new Azure AD Identity Governance feature, he creates an entitlement. CLICK STEP Under Manage click Policies.
  152. CLICK STEP Click Initial Policy.
  153. CLICK STEP Click Edit.
  154. CLICK STEP Under Users who can request access, click For users not in your directory.
  155. CLICK STEP Click the far-right scroll bar to trigger scroll animation.
  156. CLICK STEP Click + Add directories.
  157. CLICK STEP Click Search by domain, example: contoso.com to trigger typing animation.
  158. [Presentation will auto type adatum.com.] CLICK STEP In the Select directories pane, click the scroll bar to trigger scroll animation.
  159. [Presentation will auto scroll.] CLICK STEP Click Add.
  160. CLICK STEP Click Select.
  161. POINT OUT: Point to, but do not click, Request approval, Access package expires, and Enable policy. CLICK STEP Click Updated.
  162. Entitlements are the cornerstone of governance, and allow the Administrator to group users, resources and policies needed to grant access. CLICK STEP Under Manage, click Resource roles.
  163. For this demo, the Adatum Administrator has already created a set of entitlements for his organization. Let’s look at the Sales and Marketing entitlement that will enable employees from Contoso, a partner organization, to collaborate with Adatum. ​   First, resources must be specified and associated with the entitlement. Here, 2 apps, 1 user group, and 1 SharePoint site are listed. More resources can be added here, as necessary. CLICK STEP At the top, click Search resources, services, and docs.
  164. [Presentation will auto type Identity Gov.] There are quite a few ways to control application access in Azure AD. A lot of organizations use groups in AD or Azure AD to control access. Users can also request application access. The Office 365 Groups feature allows more users across your organization to create their own groups and pick who they want in those groups. CLICK STEP Click Identity Governance.
  165. Of course, over time, group memberships and application access assignments can get stale–people change jobs or no longer need access to a particular application. For example, maybe a guest who was given access isn’t affiliated with their original organization any longer. This staleness can cause a problem for protecting business-sensitive assets or applications subject to compliance. To avoid access getting out of hand, organizations can now schedule access reviews to make sure only the users they want to have access to their assets and applications o. CLICK STEP Under Access reviews, click Access reviews.
  166. CLICK STEP Click Salesforce Access Review.
  167. POINT OUT: Point to, but do not click, Owner, App, Scope, Review status, and Recurrence. An access review asks users to recertify (or “attest”) to access rights to an app or membership in a group. You can ask users to review their own rights or select reviewers to review everyone in a group, or everyone currently assigned access to an app. You can also ask the group owners to review. And finally, for those organizations that have other processes in place to manage employee access, you can scope the review to include only guest members or guests who have access. CLICK STEP Click + to open a new browser tab.
  168. There are two ways users’ access can be reviewed: by group membership or by application access. The access review is configured to run for a time to allow the reviewers to review and respond. Reviewers will receive an email notification that an access review needs their response. To review the results, the reviewers can click on the link in the email or access the results via https://myapps.microsoft.com. CLICK STEP Click Search or enter web address to trigger typing animation.
  169. CLICK STEP Click Access reviews.
  170. CLICK STEP Click Begin review.
  171. For a user that has not signed in recently, the recommendation is access denial. This can be overridden if desired. In one click, all the Access Review recommendations can be accepted. When the review period ends, or if the review is manually stopped, the results can then be applied. CLICK STEP Click Lynne Robbins.
  172. CLICK STEP Click Approve.
  173. POINT OUT: Point to, but do not click, the Reason box is now required. CLICK STEP Click Cancel.
  174. CLICK STEP Click the Salesforce Access Review tab.
  175. Admins can see the results of an access review through Azure Identity Governance at any time once the access review is created. In the Results pane they can see the list of users, the outcome, the recommended action, the reason, and the reviewer for each entry of the access review. Should changes be made to the access review settings, the Admin can use the Audit logs to review them. CLICK STEP Under Manage, click Results.
  176. POINT OUT: Point to, but do not click, User, Outcome, and Reviewed By columns. CLICK STEP Under Activity, click Audit logs.
  177. POINT OUT: Point to, but do not click, Service, Category, Activity, Status, Target(s), and Initiated By columns. Should an Admin wish to create an access review from scratch, they may do this in the Identity Governance – Access reviews blade. CLICK STEP At the top in the breadcrumbs, click Identity Governance – Access reviews.
  178. CLICK STEP Click + New access review.
  179. Admins can set the frequency, scope, and start date for the review to run. The access review can be targeted to members of a group or to an application. Reviewers can be selected individually or given to group owners. Results of the access review can be auto-applied with or without reviewer response. Once an access review is started it can take some time to complete, so reminders can be sent to reviewers once the review is started and to admins when a review completes. CLICK STEP Click the Review name box to trigger typing animation.
  180. [Presentation will auto type Salesforce Access Review Admin.] CLICK STEP Click Members of a group.
  181. CLICK STEP Click Assigned to an application.
  182. CLICK STEP Click the far-right scroll bar to trigger scroll animation.
  183. CLICK STEP Click Everyone.
  184. CLICK STEP Click Select an application.
  185. CLICK STEP Click Search by name or email address to trigger typing animation.
  186. [Presentation will auto type S.] CLICK STEP Click Salesforce.
  187. CLICK STEP Click Select.
  188. CLICK STEP Click 0 users selected.
  189. CLICK STEP Click Search by name or email address to trigger typing animation.
  190. [Presentation will auto type MOD.] CLICK STEP Click MOD Administrator.
  191. CLICK STEP Click Select.
  192. CLICK STEP Click Start.
  193. CLICK STEP Click to advance the slide and end the presentation.
  194. <End of presentation.>