SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
And InTune

Olav Tvedt
Chief Consultant
MVP – Software Packaging, Deployment & Servicing (SPD&S)

Twitter: @olavtwitt – Blog: http://olavtvedt.blogspot.com
Advanced Group Policy Management (AGPM)
Enhancing group policy through change management

Versioning, history, and rollback of Group Policy
changes

Enables Group Policy change management

Role-based administration and templates

Reduces risk of widespread failure

Flexible delegation model

“We have increased control of Group Policy
Objects (GPOs) and cut downtime previously
linked to improperly configured GPOs.”
Simon Boxall
Active Directory Infrastructure Engineer,
London Borough of Camden

Provides granular administrative control

“Advanced Group Policy Management has been
like a magic bullet for us. Its automated change
management and workflow-enabled delegation
capabilities are impressive. I wouldn't be able to
manage GPOs without it.”
Michael Wilcox
Forsyth
County

MIS Client Services Supervisor
Forsyth County
Architecture
Server Component

AGPM Server

XML File of Backups of
backups
GPO 1

Backups of
GPO 2

Domain Controller

GPO 1

Direct Link
GPO 2

Direct Link

Admin Component

Administrative
Desktop
Delegation - Roles
Full
Control
Approver

Editor

Reviewer

Define granular control without making everyone a Domain Admin
7
What is Microsoft BitLocker Administration
and Monitoring (MBAM)?
MBAM builds on the BitLocker data protection offering in Windows 7 & 8 by
providing IT professionals with an enterprise-grade solution for BitLocker
provisioning, monitoring, and key recovery.
GOALS ARE:

1

Simplify provisioning
and deployment

2

Provide reporting

(e.g.: compliance &
audit)

3

Reduce support costs

(e.g.: improved
recovery)
MBAM Client
Encrypt volumes BEFORE a user receives the computer
o Works with Windows 7 deployment tools (MDT/SCCM)
o Client can:

– Manage TPM reboot process
– Be configured with TPM first and PIN later (e.g.: user provides PIN at first logon)
– Recovery key escrow can be bypassed and then escrowed when user first logs on

o Best Practice

Encrypt volumes AFTER a user receives a computer
o
o
o
o

Client is provides a Policy Driven Experience
Client will manage TPM reboot process
Standard or Admin users can encrypt
Only use when unencrypted machines appear on the network
MBAM Policy Settings
A superset of BitLocker policies
New MBAM Policies

o Policy for Fixed Disk Volume Auto-unlock
o Hardware capability check before
encryption
o Allow user to request an exemption
o Interval client verifies policy compliance
(default = 90 min)

Policy location:

o Computer Configuration > Administrative
Templates > Windows Components >
MDOP MBAM (BitLocker Management)
Hardware Capability Management
Some older computers may not properly support TPM
To ensure those computers aren’t encrypted, a feature is included that can be used to
define which computers are BitLocker capable
How you turn it on:
o
o

Group Policy setting so client checks before encryption starts
From Central Console, define computers that are capable or not

HOW IT WORKS:
1

2

3

4

As new computers are
identified in the org, they
are added to a central HW
list

Website allows IT pros to
move computers from
unknown to a capable or
not-capable state

When this feature is ON,
only computers that are
‘capable’ will be
encrypted

Before MBAM starts
encryption, it verifies the
computer is capable
(make/model)
Compliance and Reporting
Need to know the
last known state of a
lost computer?

Need to know how effective
your rollout is, or how
compliant your company is?

Who and when keys have
been accessed and when
new hardware has been
added?

MBAM agent collects and passes data to reporting server
o All clients pass this up, encrypted or not
o IT can clarify WHY a computer is not compliant

Built on SQL Server® Reporting Services (SSRS), it gives you
flexibility to add your own reports
Central Storage of Recovery Key
Recovery Key(s) are Escrowed
o
o
o
o

Operating System Volume
Fixed Data Volumes
Removable Data Volumes
Stored outside of Microsoft Active Directory®

3-Tier Architecture

o DB encrypted with SQL Server’s Transparent
Data Encryption
o Web Service API to build org-specific solutions
o All logging and authorization are done at web service layer to ensure
parity for custom apps
Helpdesk Key Recovery UI
MBAM provides a web page for helpdesk
functionality

o Provide BitLocker Recovery Key for authorized users
o Provide TPM unlock package for authorized users
o All requests (successful or not) are logged:
who, when, which volume

Role based authorization model to
get recovery info

o Tier 1: Helpdesk needs to have
person/key match
o Tier 2: Key ID is sufficient (limited role)

Create your own custom page
leveraging web service layer
Single Use Recovery Keys
Once a BitLocker Recovery key has been exposed , the
client will create a new one

o As part of regular client/server communication, client checks to
see if Recovery Key has been exposed
o MBAM client will create new one
o Transparent to user

Recovery Keys are created once a volume is unlocked
Client Experience
What is Microsoft BitLocker Administration and Monitoring?
MBAM 1.0 objectives:

MBAM 2.0 improved 1.0 functionality and adds additional focus on:
MBAM 2.0 Release Pillars
MBAM 2.0 – Two Deployment Options
Stand alone mode
Similar to v1 model: SQL Database contains Recovery Keys
and Audit/Compliance

Configuration manager integrated mode
Compliance data and Reports are integrated to Config Manager
MBAM Agent distribution is facilitated via out of the box collection
Key Recovery and Audit data remain in SQL Server as in Stand Alone
Server Improvements
Supported Software

Stand Alone Mode
Server OS:

Configuration
Manager Mode

Windows Server 2008 SP2 Standard/Enterprise/Datacenter

System Center Configuration Manager:

Windows Server 2008 R2 SP1 Standard/Enterprise/Datacenter

Configuration Manager 2007 w/SP2

Windows Server 2012 Standard/Enterprise/Datacenter

Configuration Manager 2012 w/SP1

Client OS:
Windows 7 Ultimate, Enterprise w/SP1 (x86/x64 )
Windows 8 Enterprise (x86/x64 )
Windows 8 Windows to Go

SQL Server:
SQL 2008 R2 Standard edition or greater w/SP1
SQL 2012 Standard edition or greater RTM / SP1
Hardware Configurations
Microsoft Application Virtualization (App-V)

Dynamically streaming software as a centrally managed service

Streams applications to users
Centralizes permissions
Eliminates application installation
Isolates applications
Provides real-time metering

Readily accessible applications
Accelerate Windows deployment
Reduced application conflict
Minimize regression testing
Leverage existing Management systems

“By using App-V, we’’ll be
able to shrink the entire
application deployment
timeframe – from request
through delivery – by more
than 80 percent, from 30
days to just five days.”
Stephen Dula
IT Staff Engineer
Qualcomm
Microsoft Diagnostics & Recovery Toolset
DaRT offers 14 powerful tools to accelerate
desktop repair on site and remotely
Recover unbootable PC
Access deleted files, manipulate services, reset passwords,
and more
Detect and remove malware while the PC is offline

Accelerate TCO savings by minimizing recovery time
Recover instead of reloading Windows
Make PCs safer to use

“This toolset enables us to
restore clients instantly
without rebuilding them saving up to six hours per
instance.”
David Smith
Technical Support Center,
UMC Health System
Microsoft Diagnostics & Recovery Toolset
Customer scenarios

Customer wants to donate PCs to charity and needs to
make sure data is wiped off hard disks

DaRT Disk Wipe tool

Customer has malware on system and real-time scanning
doesn’t work

DaRT Standalone System Sweeper

Customer needs to troubleshoot and repair unbootable PCs

DaRT Crash Analyzer and DaRT tools

Customer uses Windows BitLocker® encryption and needs
access to encrypted drive on unbootable PC

DaRT tools

Customer needs to reset local passwords on servers

DaRT Locksmith

Customer needs to troubleshoot and repair servers
in datacenter

DaRT Crash Analyzer and DaRT tools

Customer needs to locate a file that was deleted from the
hard drive

DaRT File Restore

Customer needs to access a file on unbootable /
unrepairable PC

DaRT File Explorer
WinRE Management Commands
3
4
3
7

Más contenido relacionado

La actualidad más candente

Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationShahab Al Yamin Chawdhury
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekC/D/H Technology Consultants
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012ebuc
 
Viewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCBViewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCBakeophila
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overviewfannaq786
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceScriptLogic
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-labDPA
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013C/D/H Technology Consultants
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012DDLS
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...eG Innovations
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 

La actualidad más candente (20)

Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak PeekSystem Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager 2012 Sneak Peek
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
Viewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCBViewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCB
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled Performance
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
scom
scomscom
scom
 

Destacado

Selling deployment by the pound
Selling deployment by the poundSelling deployment by the pound
Selling deployment by the poundOlav Tvedt
 
Microsoft Days Bergen: Cloud experience
Microsoft Days Bergen: Cloud experienceMicrosoft Days Bergen: Cloud experience
Microsoft Days Bergen: Cloud experienceOlav Tvedt
 
Ignite 2015 - Creating usb install media with mdt
Ignite 2015 - Creating usb install media with mdtIgnite 2015 - Creating usb install media with mdt
Ignite 2015 - Creating usb install media with mdtOlav Tvedt
 
Windows 8 fuzz
Windows 8 fuzzWindows 8 fuzz
Windows 8 fuzzOlav Tvedt
 
Configuring and tuning windows 8
Configuring and tuning windows 8Configuring and tuning windows 8
Configuring and tuning windows 8Olav Tvedt
 
Nic going totally cloud
Nic going totally cloudNic going totally cloud
Nic going totally cloudOlav Tvedt
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAMOlav Tvedt
 

Destacado (7)

Selling deployment by the pound
Selling deployment by the poundSelling deployment by the pound
Selling deployment by the pound
 
Microsoft Days Bergen: Cloud experience
Microsoft Days Bergen: Cloud experienceMicrosoft Days Bergen: Cloud experience
Microsoft Days Bergen: Cloud experience
 
Ignite 2015 - Creating usb install media with mdt
Ignite 2015 - Creating usb install media with mdtIgnite 2015 - Creating usb install media with mdt
Ignite 2015 - Creating usb install media with mdt
 
Windows 8 fuzz
Windows 8 fuzzWindows 8 fuzz
Windows 8 fuzz
 
Configuring and tuning windows 8
Configuring and tuning windows 8Configuring and tuning windows 8
Configuring and tuning windows 8
 
Nic going totally cloud
Nic going totally cloudNic going totally cloud
Nic going totally cloud
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 

Similar a Mdop session from Microsoft partner boot camp

Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Asset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with CiresonAsset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with CiresonCireson
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking systemAkshay Surve
 
V center configuration manager customer facing technical presentation
V center configuration manager   customer facing technical presentationV center configuration manager   customer facing technical presentation
V center configuration manager customer facing technical presentationsolarisyourep
 
Configuration Managment Powerpoint
Configuration Managment PowerpointConfiguration Managment Powerpoint
Configuration Managment PowerpointJeannine Jacobs, MS
 
KTSL Overview July 2014
KTSL Overview July 2014KTSL Overview July 2014
KTSL Overview July 2014Keith Pound
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstractsncct
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 

Similar a Mdop session from Microsoft partner boot camp (20)

Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Asset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with CiresonAsset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with Cireson
 
Leading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManagerLeading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManager
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
SCCM 2019 Demo.pptx
SCCM 2019 Demo.pptxSCCM 2019 Demo.pptx
SCCM 2019 Demo.pptx
 
TQMSOptima QMS Software
TQMSOptima QMS SoftwareTQMSOptima QMS Software
TQMSOptima QMS Software
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
V center configuration manager customer facing technical presentation
V center configuration manager   customer facing technical presentationV center configuration manager   customer facing technical presentation
V center configuration manager customer facing technical presentation
 
Amq Overview Continuous Quality Assurance
Amq Overview Continuous Quality AssuranceAmq Overview Continuous Quality Assurance
Amq Overview Continuous Quality Assurance
 
VBOT
VBOTVBOT
VBOT
 
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
Srs template ieee se-1
Srs template ieee se-1Srs template ieee se-1
Srs template ieee se-1
 
Configuration Managment Powerpoint
Configuration Managment PowerpointConfiguration Managment Powerpoint
Configuration Managment Powerpoint
 
KTSL Overview July 2014
KTSL Overview July 2014KTSL Overview July 2014
KTSL Overview July 2014
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
mBar Product Presentation
mBar Product PresentationmBar Product Presentation
mBar Product Presentation
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Brilient login system
Brilient login systemBrilient login system
Brilient login system
 

Más de Olav Tvedt

MVP Dagen 2021 - Money for nothing
MVP Dagen 2021 - Money for nothingMVP Dagen 2021 - Money for nothing
MVP Dagen 2021 - Money for nothingOlav Tvedt
 
Brk30010 - With so many different ways to secure data across the Office 365 p...
Brk30010 - With so many different ways to secure data across the Office 365 p...Brk30010 - With so many different ways to secure data across the Office 365 p...
Brk30010 - With so many different ways to secure data across the Office 365 p...Olav Tvedt
 
SharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceSharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceOlav Tvedt
 
NIC - Securing one drive and its content
NIC - Securing one drive and its contentNIC - Securing one drive and its content
NIC - Securing one drive and its contentOlav Tvedt
 
NIC - Lets put the business into one drive
NIC - Lets put the business into one driveNIC - Lets put the business into one drive
NIC - Lets put the business into one driveOlav Tvedt
 
Securing the weakest link adding security layers while keeping the use
Securing the weakest link adding security layers while keeping the useSecuring the weakest link adding security layers while keeping the use
Securing the weakest link adding security layers while keeping the useOlav Tvedt
 
The Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last weekThe Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last weekOlav Tvedt
 
What’s new for SMBs in fall creators update
What’s new for SMBs in fall creators updateWhat’s new for SMBs in fall creators update
What’s new for SMBs in fall creators updateOlav Tvedt
 
Let's put the business into onedrive for business
Let's put the business into onedrive for businessLet's put the business into onedrive for business
Let's put the business into onedrive for businessOlav Tvedt
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?Olav Tvedt
 
ALSO Roadshow - Azure and EMS presentation
ALSO Roadshow - Azure and EMS presentation ALSO Roadshow - Azure and EMS presentation
ALSO Roadshow - Azure and EMS presentation Olav Tvedt
 
Microsoft Windows 10 Bootcamp - Windows as a service
Microsoft Windows 10 Bootcamp - Windows as a serviceMicrosoft Windows 10 Bootcamp - Windows as a service
Microsoft Windows 10 Bootcamp - Windows as a serviceOlav Tvedt
 
Microsoft Windows 10 Bootcamp - MDT Offline media
Microsoft Windows 10 Bootcamp - MDT Offline mediaMicrosoft Windows 10 Bootcamp - MDT Offline media
Microsoft Windows 10 Bootcamp - MDT Offline mediaOlav Tvedt
 
Microsoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directoryMicrosoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directoryOlav Tvedt
 
Modern Workplace Summit 2015 - Management
Modern Workplace Summit 2015 - ManagementModern Workplace Summit 2015 - Management
Modern Workplace Summit 2015 - ManagementOlav Tvedt
 
Modern Workplace Summit 2015 - Surface and offline media
Modern Workplace Summit 2015 - Surface and offline mediaModern Workplace Summit 2015 - Surface and offline media
Modern Workplace Summit 2015 - Surface and offline mediaOlav Tvedt
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 

Más de Olav Tvedt (20)

MVP Dagen 2021 - Money for nothing
MVP Dagen 2021 - Money for nothingMVP Dagen 2021 - Money for nothing
MVP Dagen 2021 - Money for nothing
 
Brk30010 - With so many different ways to secure data across the Office 365 p...
Brk30010 - With so many different ways to secure data across the Office 365 p...Brk30010 - With so many different ways to secure data across the Office 365 p...
Brk30010 - With so many different ways to secure data across the Office 365 p...
 
SharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceSharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the device
 
NIC - Securing one drive and its content
NIC - Securing one drive and its contentNIC - Securing one drive and its content
NIC - Securing one drive and its content
 
NIC - Lets put the business into one drive
NIC - Lets put the business into one driveNIC - Lets put the business into one drive
NIC - Lets put the business into one drive
 
Securing the weakest link adding security layers while keeping the use
Securing the weakest link adding security layers while keeping the useSecuring the weakest link adding security layers while keeping the use
Securing the weakest link adding security layers while keeping the use
 
The Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last weekThe Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last week
 
What’s new for SMBs in fall creators update
What’s new for SMBs in fall creators updateWhat’s new for SMBs in fall creators update
What’s new for SMBs in fall creators update
 
Let's put the business into onedrive for business
Let's put the business into onedrive for businessLet's put the business into onedrive for business
Let's put the business into onedrive for business
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Hackcon 2017
Hackcon 2017Hackcon 2017
Hackcon 2017
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?
 
ALSO Roadshow - Azure and EMS presentation
ALSO Roadshow - Azure and EMS presentation ALSO Roadshow - Azure and EMS presentation
ALSO Roadshow - Azure and EMS presentation
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
Microsoft Windows 10 Bootcamp - Windows as a service
Microsoft Windows 10 Bootcamp - Windows as a serviceMicrosoft Windows 10 Bootcamp - Windows as a service
Microsoft Windows 10 Bootcamp - Windows as a service
 
Microsoft Windows 10 Bootcamp - MDT Offline media
Microsoft Windows 10 Bootcamp - MDT Offline mediaMicrosoft Windows 10 Bootcamp - MDT Offline media
Microsoft Windows 10 Bootcamp - MDT Offline media
 
Microsoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directoryMicrosoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directory
 
Modern Workplace Summit 2015 - Management
Modern Workplace Summit 2015 - ManagementModern Workplace Summit 2015 - Management
Modern Workplace Summit 2015 - Management
 
Modern Workplace Summit 2015 - Surface and offline media
Modern Workplace Summit 2015 - Surface and offline mediaModern Workplace Summit 2015 - Surface and offline media
Modern Workplace Summit 2015 - Surface and offline media
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Mdop session from Microsoft partner boot camp

  • 1. And InTune Olav Tvedt Chief Consultant MVP – Software Packaging, Deployment & Servicing (SPD&S) Twitter: @olavtwitt – Blog: http://olavtvedt.blogspot.com
  • 2.
  • 3.
  • 4. Advanced Group Policy Management (AGPM) Enhancing group policy through change management Versioning, history, and rollback of Group Policy changes Enables Group Policy change management Role-based administration and templates Reduces risk of widespread failure Flexible delegation model “We have increased control of Group Policy Objects (GPOs) and cut downtime previously linked to improperly configured GPOs.” Simon Boxall Active Directory Infrastructure Engineer, London Borough of Camden Provides granular administrative control “Advanced Group Policy Management has been like a magic bullet for us. Its automated change management and workflow-enabled delegation capabilities are impressive. I wouldn't be able to manage GPOs without it.” Michael Wilcox Forsyth County MIS Client Services Supervisor Forsyth County
  • 5. Architecture Server Component AGPM Server XML File of Backups of backups GPO 1 Backups of GPO 2 Domain Controller GPO 1 Direct Link GPO 2 Direct Link Admin Component Administrative Desktop
  • 6. Delegation - Roles Full Control Approver Editor Reviewer Define granular control without making everyone a Domain Admin
  • 7. 7
  • 8.
  • 9. What is Microsoft BitLocker Administration and Monitoring (MBAM)? MBAM builds on the BitLocker data protection offering in Windows 7 & 8 by providing IT professionals with an enterprise-grade solution for BitLocker provisioning, monitoring, and key recovery. GOALS ARE: 1 Simplify provisioning and deployment 2 Provide reporting (e.g.: compliance & audit) 3 Reduce support costs (e.g.: improved recovery)
  • 10. MBAM Client Encrypt volumes BEFORE a user receives the computer o Works with Windows 7 deployment tools (MDT/SCCM) o Client can: – Manage TPM reboot process – Be configured with TPM first and PIN later (e.g.: user provides PIN at first logon) – Recovery key escrow can be bypassed and then escrowed when user first logs on o Best Practice Encrypt volumes AFTER a user receives a computer o o o o Client is provides a Policy Driven Experience Client will manage TPM reboot process Standard or Admin users can encrypt Only use when unencrypted machines appear on the network
  • 11. MBAM Policy Settings A superset of BitLocker policies New MBAM Policies o Policy for Fixed Disk Volume Auto-unlock o Hardware capability check before encryption o Allow user to request an exemption o Interval client verifies policy compliance (default = 90 min) Policy location: o Computer Configuration > Administrative Templates > Windows Components > MDOP MBAM (BitLocker Management)
  • 12. Hardware Capability Management Some older computers may not properly support TPM To ensure those computers aren’t encrypted, a feature is included that can be used to define which computers are BitLocker capable How you turn it on: o o Group Policy setting so client checks before encryption starts From Central Console, define computers that are capable or not HOW IT WORKS: 1 2 3 4 As new computers are identified in the org, they are added to a central HW list Website allows IT pros to move computers from unknown to a capable or not-capable state When this feature is ON, only computers that are ‘capable’ will be encrypted Before MBAM starts encryption, it verifies the computer is capable (make/model)
  • 13. Compliance and Reporting Need to know the last known state of a lost computer? Need to know how effective your rollout is, or how compliant your company is? Who and when keys have been accessed and when new hardware has been added? MBAM agent collects and passes data to reporting server o All clients pass this up, encrypted or not o IT can clarify WHY a computer is not compliant Built on SQL Server® Reporting Services (SSRS), it gives you flexibility to add your own reports
  • 14. Central Storage of Recovery Key Recovery Key(s) are Escrowed o o o o Operating System Volume Fixed Data Volumes Removable Data Volumes Stored outside of Microsoft Active Directory® 3-Tier Architecture o DB encrypted with SQL Server’s Transparent Data Encryption o Web Service API to build org-specific solutions o All logging and authorization are done at web service layer to ensure parity for custom apps
  • 15. Helpdesk Key Recovery UI MBAM provides a web page for helpdesk functionality o Provide BitLocker Recovery Key for authorized users o Provide TPM unlock package for authorized users o All requests (successful or not) are logged: who, when, which volume Role based authorization model to get recovery info o Tier 1: Helpdesk needs to have person/key match o Tier 2: Key ID is sufficient (limited role) Create your own custom page leveraging web service layer
  • 16. Single Use Recovery Keys Once a BitLocker Recovery key has been exposed , the client will create a new one o As part of regular client/server communication, client checks to see if Recovery Key has been exposed o MBAM client will create new one o Transparent to user Recovery Keys are created once a volume is unlocked
  • 18. What is Microsoft BitLocker Administration and Monitoring? MBAM 1.0 objectives: MBAM 2.0 improved 1.0 functionality and adds additional focus on:
  • 19. MBAM 2.0 Release Pillars
  • 20. MBAM 2.0 – Two Deployment Options Stand alone mode Similar to v1 model: SQL Database contains Recovery Keys and Audit/Compliance Configuration manager integrated mode Compliance data and Reports are integrated to Config Manager MBAM Agent distribution is facilitated via out of the box collection Key Recovery and Audit data remain in SQL Server as in Stand Alone
  • 22. Supported Software Stand Alone Mode Server OS: Configuration Manager Mode Windows Server 2008 SP2 Standard/Enterprise/Datacenter System Center Configuration Manager: Windows Server 2008 R2 SP1 Standard/Enterprise/Datacenter Configuration Manager 2007 w/SP2 Windows Server 2012 Standard/Enterprise/Datacenter Configuration Manager 2012 w/SP1 Client OS: Windows 7 Ultimate, Enterprise w/SP1 (x86/x64 ) Windows 8 Enterprise (x86/x64 ) Windows 8 Windows to Go SQL Server: SQL 2008 R2 Standard edition or greater w/SP1 SQL 2012 Standard edition or greater RTM / SP1
  • 24.
  • 25.
  • 26. Microsoft Application Virtualization (App-V) Dynamically streaming software as a centrally managed service Streams applications to users Centralizes permissions Eliminates application installation Isolates applications Provides real-time metering Readily accessible applications Accelerate Windows deployment Reduced application conflict Minimize regression testing Leverage existing Management systems “By using App-V, we’’ll be able to shrink the entire application deployment timeframe – from request through delivery – by more than 80 percent, from 30 days to just five days.” Stephen Dula IT Staff Engineer Qualcomm
  • 27.
  • 28. Microsoft Diagnostics & Recovery Toolset DaRT offers 14 powerful tools to accelerate desktop repair on site and remotely Recover unbootable PC Access deleted files, manipulate services, reset passwords, and more Detect and remove malware while the PC is offline Accelerate TCO savings by minimizing recovery time Recover instead of reloading Windows Make PCs safer to use “This toolset enables us to restore clients instantly without rebuilding them saving up to six hours per instance.” David Smith Technical Support Center, UMC Health System
  • 29. Microsoft Diagnostics & Recovery Toolset Customer scenarios Customer wants to donate PCs to charity and needs to make sure data is wiped off hard disks DaRT Disk Wipe tool Customer has malware on system and real-time scanning doesn’t work DaRT Standalone System Sweeper Customer needs to troubleshoot and repair unbootable PCs DaRT Crash Analyzer and DaRT tools Customer uses Windows BitLocker® encryption and needs access to encrypted drive on unbootable PC DaRT tools Customer needs to reset local passwords on servers DaRT Locksmith Customer needs to troubleshoot and repair servers in datacenter DaRT Crash Analyzer and DaRT tools Customer needs to locate a file that was deleted from the hard drive DaRT File Restore Customer needs to access a file on unbootable / unrepairable PC DaRT File Explorer
  • 30.
  • 32. 3 4
  • 33.
  • 34.
  • 35. 3 7