{"id":13265,"date":"2018-09-04T14:00:32","date_gmt":"2018-09-04T22:00:32","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/09\/04\/news-7032\/"},"modified":"2018-09-04T14:00:32","modified_gmt":"2018-09-04T22:00:32","slug":"news-7032","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/09\/04\/news-7032\/","title":{"rendered":"Protecting user identities"},"content":{"rendered":"<p><strong>Credit to Author: toddvanderark| Date: Tue, 04 Sep 2018 21:20:18 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84313\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/Enable-your-users-to-work-securely-from-anywhere-1-1024x714.jpg\" alt=\"Image of four hands collaborating over a drawing of a lightbulb.\" width=\"780\" height=\"544\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/Enable-your-users-to-work-securely-from-anywhere-1.jpg 1024w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/Enable-your-users-to-work-securely-from-anywhere-1-300x209.jpg 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/Enable-your-users-to-work-securely-from-anywhere-1-768x536.jpg 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/Enable-your-users-to-work-securely-from-anywhere-1-330x230.jpg 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/Enable-your-users-to-work-securely-from-anywhere-1-800x558.jpg 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/Enable-your-users-to-work-securely-from-anywhere-1-400x279.jpg 400w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>This is a blog series that responds to common questions we receive from customers about the deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/13\/cybersecurity-threats-how-to-discover-remediate-and-mitigate\/\">Cybersecurity threats: How to discover, remediate, and mitigate<\/a>, the third blog in our eight-part series on deploying Intelligent Security scenarios.<\/em><\/p>\n<p>&#10;<\/p>\n<p>Its not just a problem for consumers. Identity theft in the workplace is also on the riseand with good reason. Stealing employee credentials is an easy path to bypassing security around sensitive data, making unauthorized purchases, and many other cybercrimes.<\/p>\n<p>&#10;<\/p>\n<p>Microsoft 365 security solutions help you protect users and corporate accounts. By making identity the control plane, Microsoft 365 offerings manage identities as the first step to providing access to corporate resources and restricting users who are high risk. Tools like single sign-on (SSO), Multi-Factor Authentication (MFA), and Windows 10 Hello for Business help you secure access. Additionally, there are actions you can take if an identity is compromised and ways to lock down or wipe devices to protect sensitive data in case of loss or theft.<\/p>\n<p>&#10;<\/p>\n<h3>How do I provide secure access for my users?<\/h3>\n<p>&#10;<\/p>\n<p>Managing identities is the first step in protecting your environment. You can provision user identities through Azure Active Directory (Azure AD) and then connect to your on-premises Active Directory, allowing you to centralize identities for each user. Then you can set <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/app-based-mfa\">conditional access<\/a> policies in Azure AD (Figure 1) for users in your organization. Conditional access policies allow you to control how users access cloud apps. You can set conditions that restrict access based on sign-in risk, user location, or client app, as well as only allowing access to managed devices. Start by <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/untrusted-networks\">implementing recommended identity access policies<\/a>.<\/p>\n<p>&#10;<\/p>\n<p>Managing user access is your next step. <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/untrusted-networks\">Azure AD SSO<\/a> lets you manage authentication across devices, cloud apps, and on-premises apps with one user sign-in. Once you enable SSO, your employees can access resources in real-time on any device in addition to confidential or sensitive work documents away from the office. Next, deploy <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/multi-factor-authentication\/\">MFA<\/a> in Azure AD to reauthenticate high-risk users, and take automated action to secure your network.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85237\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Protecting-user-identities-infographic.png\" alt=\"\" width=\"701\" height=\"459\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Protecting-user-identities-infographic.png 701w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Protecting-user-identities-infographic-300x196.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Protecting-user-identities-infographic-330x216.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Protecting-user-identities-infographic-400x262.png 400w\" sizes=\"auto, (max-width: 701px) 100vw, 701px\" \/><\/p>\n<p>&#10;<\/p>\n<p style=\"text-align: center\"><em>Figure 1. Set user policies using Azure AD conditional access.<\/em><\/p>\n<p>&#10;<\/p>\n<p>Finally, encourage your employees to use Windows Hello for Business. Its a security feature that allows users unlock their device using their PCs camera, PIN, or their fingerprint.<\/p>\n<p>&#10;<\/p>\n<h3>How do I ensure that my employees credentials are not compromised?<\/h3>\n<p>&#10;<\/p>\n<p>Whats needed is a multi-layered approach to identity protection that goes beyond passwords and starts to identify risk even before a password is entered.<\/p>\n<p>&#10;<\/p>\n<p>Early and active monitoring of potential threats is essential. With <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/active-directory-identityprotection\">Azure AD Identity Protection<\/a>, you get an overview of risk and vulnerabilities that may be affecting your organizations identities. You can then set up risk-based <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/active-directory-conditional-access-azure-portal-get-started\">conditional access<\/a> policies to automatically mitigate threats. <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/active-directory-reporting-risk-events\">Risk-based conditional access<\/a> uses machine learning to identify high-risk users. For example, a user may be flagged based on unfamiliar locations or failed sign-ins from the same IP address. Once flagged, a user can be required to use <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/multi-factor-authentication\/\">MFA in Azure AD<\/a> or be blocked altogether (Figure 1).<\/p>\n<p>&#10;<\/p>\n<p>Another useful monitoring tool is Azure AD Privileged Identity Management (PIM). With <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/active-directory-privileged-identity-management-configure\">Azure AD PIM<\/a>, you can monitor admin access to resources and minimize the number of people who have access to them. By continuously monitoring these high access points, you limit vulnerabilities. You can configure <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/active-directory-privileged-identity-management-getting-started\">Azure AD PIM<\/a> in the <a href=\"https:\/\/microsoft-my.sharepoint.com\/personal\/dseres_microsoft_com\/Documents\/portal.azure.com\">Azure portal<\/a> to generate alerts when theres suspicious or unsafe activity in your environment and then recommend mitigation strategies.<\/p>\n<p>&#10;<\/p>\n<p>Along with monitoring, Microsoft 365 security solutions offer tools to better protect a users credentials. <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/credential-guard\/credential-guard\">Windows Defender Credential Guard<\/a> uses virtualization-based security to isolate secrets so that only privileged system software can access them, thus helping prevent unauthorized access to these secrets which can lead to credential theft attacks.<\/p>\n<p>&#10;<\/p>\n<h3>Deployment tips from the experts<\/h3>\n<p>&#10;<\/p>\n<p><strong>Start by managing user identities as your control plane.<\/strong> Provision your user identities through Azure AD and use Azure AD Connect to integrate identities across Azure AD and your on-premises AD. Enable <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/multi-factor-authentication\/\">MFA<\/a> for all administrators, set <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/active-directory-conditional-access-azure-portal-get-started\">conditional access<\/a> policies, and initiate SSO.<\/p>\n<p>&#10;<\/p>\n<p><strong>Manage your devices from the cloud.<\/strong> Managing employee devices remotely engenders productivity and bolsters security. Deploy <a href=\"https:\/\/www.microsoft.com\/en-us\/cloud-platform\/microsoft-intune\">Microsoft Intune<\/a> as your mobile device manager for company- and employee-owned devices.<\/p>\n<p>&#10;<\/p>\n<p><strong>Plan for success with Microsoft FastTrack.<\/strong> FastTrack comes with your subscription at no additional charge. Whether youre planning your initial rollout, needing to onboard your product, or driving end-user adoption, FastTrack is your benefit service that is ready to assist you. <a href=\"https:\/\/fasttrack.microsoft.com\/microsoft365\/journey\">Get started at FastTrack for Microsoft 365<\/a>.<\/p>\n<p>&#10;<\/p>\n<h3>Want to learn more?<\/h3>\n<p>&#10;<\/p>\n<p>For more information and guidance on this topic, check out the <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE2x0Mb\">Protect your users and their identity<\/a> white paper. You can find additional <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/Resources\">security resources on Microsoft.com<\/a>.<\/p>\n<p>&#10;<\/p>\n<p>More blog posts from this series:<\/p>\n<p>&#10;<\/p>\n<ul>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/06\/tips-for-getting-started-on-your-security-deployment\/\">Tips for getting started on your security deployment<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/20\/accelerate-your-security-deployment-with-fasttrack-for-microsoft-365\/\">Accelerate your security deployment with FastTrack for Microsoft 365<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/05\/01\/first-things-first-envisioning-your-security-deployment\/\">First things first: Envisioning your security deployment<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/05\/17\/now-that-you-have-a-plan-its-time-to-start-deploying\/\">Now that you have a plan, its time to start deploying<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/06\/18\/new-fasttrack-benefit-deployment-support-for-co-management-on-windows-10-devices\/\">New FastTrack benefit: Deployment support for co-management on Windows 10 devices<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/07\/02\/assessing-microsoft-365-security-solutions-using-the-nist-cybersecurity-framework\/\">Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/07\/18\/enable-your-users-to-work-securely-from-anywhere-anytime-across-all-of-their-devices\/\">Enable your users to work securely from anywhere, anytime, across all of their devices<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/02\/protect-your-data-in-files-apps-and-devices\/\">Protect your data in files, apps, and devices<\/a><\/li>\n<p>&#10;<\/p>\n<li><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/13\/cybersecurity-threats-how-to-discover-remediate-and-mitigate\/\">Cybersecurity threats: How to discover, remediate, and mitigate<\/a><\/li>\n<p>&#10;<\/ul>\n<p>&#10;<br \/><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/09\/04\/protecting-user-identities\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: toddvanderark| Date: Tue, 04 Sep 2018 21:20:18 +0000<\/strong><\/p>\n<p>This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions help you protect your users and their identities.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-13265","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13265"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13265\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}