SlideShare una empresa de Scribd logo
1 de 44
Descargar para leer sin conexión
1
aOS Strasbourg
4/06/2019
Sécuriser son digital
Workplace
Seyfallah Tagrerout
Votre
photo
◦ MERCI A NOS SPONSORS
2
HELLO!
3
Blog
https://seyfallah-it.blogspot.com
AiM Services Architect Team Lead
Agenda
Microsoft Threat Protection
• Introduction
• Azure Active Directory
Architecture
• Azure AD Deep Dive
• AAD connect
• Authentification
Conclusion
• Bonnes pratiques
Azure AD et la sécurité
• Azure MFA Conditional Access
• Identity Protection
• Smart Lock & password
protection
• Azure Application Proxy
Microsoft
Threat
Protection
◦ Modèle unifié
◦ Plusieurs services
◦ Tous les vecteurs d’un système d’information
6
«Avec un modèle je vais pouvoir
sécuriser mon système
d’information sur tous les plans»
7
Microsoft Threat Protection
◦ Sans oublier:
◦ AIP
◦ Azure Sentinel
◦ Cloud app Security
◦ Intune
◦ Microsoft ATA et AATP
9
Azure Active Directory
Azure AD
Azure Active Directory (Azure AD) est un service dans Azure qui permet de gérer des
annuaires et l’identité, il offre aux utilisateurs une authentification unique à plusieurs
applications et services cloud.
◦ Authentification
◦ Gestion
◦ Contrôle d’accès
◦ Consommation
Exemple:
L’utilisation des services Office 365
10
EMS
Intune
Protect your users,
devices, and apps
Azure Active Directory
Microsoft Cloud App Security
Detect threats early
with visibility and
threat analytics
Advanced
Threat Analytics
Azure Information
Protection
Protect your data,
everywhere
Features P1
Directory Objects1 No Object Limit
User/Group Management (add/update/delete). User-based provisioning, Device registration Available
Single Sign-On (SSO). Free, basic tiers + self-service app integration templates5 No Limit
B2B Collaboration7 Available
Self-Service Password Change for cloud users Available
Connect (Sync engine that extends on-premises directories to Azure Active Directory) Available
Security/Usage Reports Advanced Reports
Group-based access management/provisioning Available
Self-Service Password Reset for cloud users Available
Company Branding (Logon Pages/Access Panel customization) Available
Application Proxy Available
SLA Available
Premium Features
Advanced group features8 Available
Self-Service Password Reset/Change/Unlock with on-premises writeback Available
Device objects 2-way sync between on-premises directories and Azure AD (Device write-back) Available
Multi-Factor Authentication (Cloud and On-premises (MFA Server)) Available
Microsoft Identity Manager user CAL4 Available
Cloud App Discovery9 Available
Connect Health6 Available
Automatic password rollover for group accounts Available
Conditional Access based on group and location Available
Conditional Access based on device state (Allow access from managed devices) Available
3rd party identity governance partners integration Available
Terms of Use Available
SharePoint Limited Access Available
OneDrive for Business Limited Access Available
3rd party MFA partner integration Preview Available
Microsoft Cloud App Security integration Available
Identity Protection
• Detecting vulnerabilities and risky accounts:
• Providing custom recommendations to improve overall security
posture by highlighting vulnerabilities
• Calculating sign-in risk levels
• Calculating user risk levels
• Investigating risk events:
• Sending notifications for risk events
• Investigating risk events using relevant and contextual information
• Providing basic workflows to track investigations
• Providing easy access to remediation actions such as password
reset
• Risk-based conditional access policies:
• Policy to mitigate risky sign-ins by blocking sign-ins or requiring
multi-factor authentication challenges
• Policy to block or secure risky user accounts
• Policy to require users to register for multi-factor authentication
Advanced Identity Governance
• Privileged Identity Management (PIM)
• Access Reviews
Only in Azure AD P2
What is the difference between
Azure AD P1 & P2?
Azure Active Directory
8B 90%
653K1.1B17.5M
90K
Quelques chiffres
Walmart – Exemple
565K2,252K2.5M
880K
SSPR
Azure Active
Directory
Windows
MacOS
iOS
Android
17
Archi
Réplication
18
✓ Tolérance de panne
✓ Durabilité et protection des
données
✓ Cohérence
✓ Sauvegarde
Étendre mon AD vers Azure AD
Identités hybrides : Extension de votre AD Local vers Azure AD
• Pourquoi ? ➔ équation : Plusieurs applications pour une seule et unique identité
Comment aller vers de l’identité hybride ?
✓ Connaitre les besoins
✓ Pour quels usages ?
✓ La stratégie et la roadmap
✓ L’existant :
✓ Méthode d’authentification utilisée
✓ Définir si y a services cloud
✓ Définir si y a de la fédération et identifier les raisons
✓ Kerberos based (SSO)
✓ Authentification des users hors de l’entreprise avec SAML
✓ Etc
Authentification
Authentification
22
Azure AD et la
securité
Microsoft
Secure Score
◦ Here you have a list of items
◦ And some text
◦ But remember not to overload your
slides with content
Your audience will listen to you or read
the content, but won’t do both.
23
Azure MFA
◦ Sécurité
◦ Fiabilité
◦ Facilité
◦ Evolution
◦ Termes :
Double facteur
Authentification forte
24
Azure MFA -
Options
• SMS
• CODE APPLICATION AVEC
AZURE AUTHENTICATOR
• APPEL TÉLÉPHONIQUE
• JETON OATH
• NOTIFICATION SUR
L’APPLICATION
ATTENTION À PLUSIEURS POINTS
AVANT DE L’ACTIVER
25
Password Less
26
27
Conditional Access
AUTORISER OU NON L’ACCÈS AUX RESSOURCES CLOUD DE L’ENTREPRISE
28
Conditional Access
Actions
Bloquer
Autoriser
Autoriser
Corporate
Network
Geo-location
Microsoft
Cloud App SecurityMacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Require
MFA
Allow/block
access
Block legacy
authentication
Force
password
reset
******
Limited
access
Controls
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Physical &
Virtual Location
Client apps &
Auth Method
Conditions
Machin
e
learnin
g
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
30
Conditional Access
RETOUR D’EXPERIENCE
PAS DE CONNEXION POUR TOUS LES DEVICES QUI NE SONT PAS DANS
AZURE AD ET DANS INTUNE
SCOPE : TOUS LES UTILISATEURS
◦ À VOTRE AVIS, IL SE PASSERA QUOI ?
31
Conditional Access
EXEMPLE:
• EXIGER LE MFA
• REFUSER L’ACCÈS EN LECTURE POUR LES UTILISATEURS STANDARD
• REFUSER L’ACCÈS SI DEVICE NON MANAGÉ – NON CONFORME
• EXIGER LE MFA SI L’UTILISATEUR EST DANS UN PAYS RISQUÉ
• BLOQUER TOUTES LES CONNEXIONS DEPUIS UN NAVIGATEUR
◦ VERIFIEZ AVEC LE WHAT IF AVANT LE PASSAGE EN PRODUCTION !
32
Conditional Access
BONNES PRATIQUES:
• UTILISEZ LE !
• TRUSTEZ LES LOCATIONS
• TRUSTEZ LES RANGE IP
• WHAT IF – ATTENTION AVANT PRODUCTION
• PENSEZ AUX EXCLUSIONS ( IMPORTANT)
33
Conditional Access
LES NOUVEAUTÉS DEPUIS LES IGNITE 2018
• BLOCK LEGACY AUTH
• BLOCK LEGACY PROTOCOL ( POP ET IMAP)
• RBAC – GRANULAIRE
• LIMITÉ LES ACCÈS AU NIVEAU DES DATA CLASSIFICATION
• LIMITÉ LES ACCÈS POUR OWA
34
Azure Identity Protection
DÉTECTION DES VULNÉRABILITÉ
REMÉDIATIONS
ACTION AUTOMATIQUE EN FONCTION DES ACTIVITÉS SUSPECTES DÉTECTÉES
35
Azure Identity Protection
6 EVENTS À RISQUE :
- UTILISATEURS SUSPECT : HORS LIGNE
- CONNEXION DEPUIS DES IP NON CONNUS – ANONYMES : TEMPS RÉEL
- CONNEXION DEPUIS DES EMPLACEMENTS INCONNUS: TEMPS RÉEL
- CONNEXION DEPUIS UN APPAREIL INFECTÉ: HORS LIGNE
- CONNEXION DEPUIS UN EMPLACEMENT INHABITUEL: HORS LIGNE
- CONNEXION DEPUIS UNE IP QUI CONTIENT UNE ACTIVITÉ SUSPECTE :HORS LIGNE
36
Azure Identity Protection
TYPE DE DÉTECTION :
NIVEAU DE RISQUE : ELEVÉ – MOYEN – FAIBLE
Temps réel
5 à 10 minutes
Hors ligne
2 à 24 heurs
37
Azure Identity Protection
Setting Value
Users xxx
Conditions Sign-in risk, Medium
Controls Access Block – Ou MFA
REMEDIATION
38
Azure Identity Protection
LES NOUVEAUTÉS:
• END USER ACTIVITY REPORTING – RAPPORT DÉTAILLÉ
• MACHINE LEARNING
• AZURE ATP INTÉGRATION SECOPS
39
Smart Lockout et password Protetion
40
Smart Lockout et password Protection
41
Azure Application Proxy
VPN ET DMZ : ON PEUT OUBLIER ?
42
CONCLUSION
CONCLUSION
43
SUIVRE LE MICROSOFT SECURE SCORE
ACTIVEZ LE PTA :
• ACTIVEZ LE SEAMLESS SSO
AZURE MFA
• TRUST DES IP ET LOCATIONS
• CONDITIONAL ACCESS
IDENTITY PROTECTION:
• POLICY DE REMÉDIATION
• ACTIVEZ LE MFA POUR TOUT LE MONDE EN FONCTION DES LOCATION
• REPORTING
• DEVICE
• RISQUE USER – CONNEXION – LOCATION – IP
• PASSWORD:
• ACTIVEZ LE SELF PASSWORD - SMART LOCKOUT – PASSWORD PROTECTION
• AZURE APPLICATION PROXY
CONCLUSION
44
45
MERCI DE VOTRE ATTENTION !

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Azure vm introduction
Azure  vm introductionAzure  vm introduction
Azure vm introduction
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web Apps
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web Attacks
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloud
 
Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security Center
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWS
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
 Importance of Azure infrastructure?-Microsoft Azure security infrastructure Importance of Azure infrastructure?-Microsoft Azure security infrastructure
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
 
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App Security
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 

Similar a 2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Tagrerout

Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
Gaurav "GP" Pal
 

Similar a 2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Tagrerout (20)

04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
Securing your Azure Identity Infrastructure
Securing your Azure Identity InfrastructureSecuring your Azure Identity Infrastructure
Securing your Azure Identity Infrastructure
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
Building a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data CenterBuilding a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data Center
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
CASBs: Critical Capabilities - in partnership with ISC(2)
CASBs: Critical Capabilities - in partnership with ISC(2)CASBs: Critical Capabilities - in partnership with ISC(2)
CASBs: Critical Capabilities - in partnership with ISC(2)
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
 
NVS_Sentinel
NVS_SentinelNVS_Sentinel
NVS_Sentinel
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Building Bulletproof Infrastructure on AWS
Building Bulletproof Infrastructure on AWSBuilding Bulletproof Infrastructure on AWS
Building Bulletproof Infrastructure on AWS
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 

Más de aOS Community

Más de aOS Community (20)

Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
 
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
 
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
 
Serverless avec azure functions - aOS Tahiti 03-03-2020
Serverless avec azure functions - aOS Tahiti 03-03-2020Serverless avec azure functions - aOS Tahiti 03-03-2020
Serverless avec azure functions - aOS Tahiti 03-03-2020
 
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020 Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020
 
Introduction a Power Automate - aOS Nouméa 28-02-2020
Introduction a Power Automate  - aOS Nouméa 28-02-2020 Introduction a Power Automate  - aOS Nouméa 28-02-2020
Introduction a Power Automate - aOS Nouméa 28-02-2020
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent PiloaOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
 
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
 
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
 
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
 
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
 
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
 
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi VoncinaaOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
 
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
 
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
 
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
 
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Tagrerout

  • 1. 1 aOS Strasbourg 4/06/2019 Sécuriser son digital Workplace Seyfallah Tagrerout Votre photo
  • 2. ◦ MERCI A NOS SPONSORS 2
  • 4. Agenda Microsoft Threat Protection • Introduction • Azure Active Directory Architecture • Azure AD Deep Dive • AAD connect • Authentification Conclusion • Bonnes pratiques Azure AD et la sécurité • Azure MFA Conditional Access • Identity Protection • Smart Lock & password protection • Azure Application Proxy
  • 5. Microsoft Threat Protection ◦ Modèle unifié ◦ Plusieurs services ◦ Tous les vecteurs d’un système d’information 6 «Avec un modèle je vais pouvoir sécuriser mon système d’information sur tous les plans»
  • 6. 7
  • 7. Microsoft Threat Protection ◦ Sans oublier: ◦ AIP ◦ Azure Sentinel ◦ Cloud app Security ◦ Intune ◦ Microsoft ATA et AATP
  • 9. Azure AD Azure Active Directory (Azure AD) est un service dans Azure qui permet de gérer des annuaires et l’identité, il offre aux utilisateurs une authentification unique à plusieurs applications et services cloud. ◦ Authentification ◦ Gestion ◦ Contrôle d’accès ◦ Consommation Exemple: L’utilisation des services Office 365 10
  • 10. EMS Intune Protect your users, devices, and apps Azure Active Directory Microsoft Cloud App Security Detect threats early with visibility and threat analytics Advanced Threat Analytics Azure Information Protection Protect your data, everywhere
  • 11. Features P1 Directory Objects1 No Object Limit User/Group Management (add/update/delete). User-based provisioning, Device registration Available Single Sign-On (SSO). Free, basic tiers + self-service app integration templates5 No Limit B2B Collaboration7 Available Self-Service Password Change for cloud users Available Connect (Sync engine that extends on-premises directories to Azure Active Directory) Available Security/Usage Reports Advanced Reports Group-based access management/provisioning Available Self-Service Password Reset for cloud users Available Company Branding (Logon Pages/Access Panel customization) Available Application Proxy Available SLA Available Premium Features Advanced group features8 Available Self-Service Password Reset/Change/Unlock with on-premises writeback Available Device objects 2-way sync between on-premises directories and Azure AD (Device write-back) Available Multi-Factor Authentication (Cloud and On-premises (MFA Server)) Available Microsoft Identity Manager user CAL4 Available Cloud App Discovery9 Available Connect Health6 Available Automatic password rollover for group accounts Available Conditional Access based on group and location Available Conditional Access based on device state (Allow access from managed devices) Available 3rd party identity governance partners integration Available Terms of Use Available SharePoint Limited Access Available OneDrive for Business Limited Access Available 3rd party MFA partner integration Preview Available Microsoft Cloud App Security integration Available Identity Protection • Detecting vulnerabilities and risky accounts: • Providing custom recommendations to improve overall security posture by highlighting vulnerabilities • Calculating sign-in risk levels • Calculating user risk levels • Investigating risk events: • Sending notifications for risk events • Investigating risk events using relevant and contextual information • Providing basic workflows to track investigations • Providing easy access to remediation actions such as password reset • Risk-based conditional access policies: • Policy to mitigate risky sign-ins by blocking sign-ins or requiring multi-factor authentication challenges • Policy to block or secure risky user accounts • Policy to require users to register for multi-factor authentication Advanced Identity Governance • Privileged Identity Management (PIM) • Access Reviews Only in Azure AD P2 What is the difference between Azure AD P1 & P2?
  • 17. Réplication 18 ✓ Tolérance de panne ✓ Durabilité et protection des données ✓ Cohérence ✓ Sauvegarde
  • 18. Étendre mon AD vers Azure AD Identités hybrides : Extension de votre AD Local vers Azure AD • Pourquoi ? ➔ équation : Plusieurs applications pour une seule et unique identité Comment aller vers de l’identité hybride ? ✓ Connaitre les besoins ✓ Pour quels usages ? ✓ La stratégie et la roadmap ✓ L’existant : ✓ Méthode d’authentification utilisée ✓ Définir si y a services cloud ✓ Définir si y a de la fédération et identifier les raisons ✓ Kerberos based (SSO) ✓ Authentification des users hors de l’entreprise avec SAML ✓ Etc
  • 21. 22 Azure AD et la securité
  • 22. Microsoft Secure Score ◦ Here you have a list of items ◦ And some text ◦ But remember not to overload your slides with content Your audience will listen to you or read the content, but won’t do both. 23
  • 23. Azure MFA ◦ Sécurité ◦ Fiabilité ◦ Facilité ◦ Evolution ◦ Termes : Double facteur Authentification forte 24
  • 24. Azure MFA - Options • SMS • CODE APPLICATION AVEC AZURE AUTHENTICATOR • APPEL TÉLÉPHONIQUE • JETON OATH • NOTIFICATION SUR L’APPLICATION ATTENTION À PLUSIEURS POINTS AVANT DE L’ACTIVER 25
  • 26. 27 Conditional Access AUTORISER OU NON L’ACCÈS AUX RESSOURCES CLOUD DE L’ENTREPRISE
  • 28. Corporate Network Geo-location Microsoft Cloud App SecurityMacOS Android iOS Windows Windows Defender ATP Client apps Browser apps Google ID MSA Azure AD ADFS Require MFA Allow/block access Block legacy authentication Force password reset ****** Limited access Controls Employee & Partner Users and Roles Trusted & Compliant Devices Physical & Virtual Location Client apps & Auth Method Conditions Machin e learnin g Policies Real time Evaluation Engine Session Risk 3 40TB Effective policy
  • 29. 30 Conditional Access RETOUR D’EXPERIENCE PAS DE CONNEXION POUR TOUS LES DEVICES QUI NE SONT PAS DANS AZURE AD ET DANS INTUNE SCOPE : TOUS LES UTILISATEURS ◦ À VOTRE AVIS, IL SE PASSERA QUOI ?
  • 30. 31 Conditional Access EXEMPLE: • EXIGER LE MFA • REFUSER L’ACCÈS EN LECTURE POUR LES UTILISATEURS STANDARD • REFUSER L’ACCÈS SI DEVICE NON MANAGÉ – NON CONFORME • EXIGER LE MFA SI L’UTILISATEUR EST DANS UN PAYS RISQUÉ • BLOQUER TOUTES LES CONNEXIONS DEPUIS UN NAVIGATEUR ◦ VERIFIEZ AVEC LE WHAT IF AVANT LE PASSAGE EN PRODUCTION !
  • 31. 32 Conditional Access BONNES PRATIQUES: • UTILISEZ LE ! • TRUSTEZ LES LOCATIONS • TRUSTEZ LES RANGE IP • WHAT IF – ATTENTION AVANT PRODUCTION • PENSEZ AUX EXCLUSIONS ( IMPORTANT)
  • 32. 33 Conditional Access LES NOUVEAUTÉS DEPUIS LES IGNITE 2018 • BLOCK LEGACY AUTH • BLOCK LEGACY PROTOCOL ( POP ET IMAP) • RBAC – GRANULAIRE • LIMITÉ LES ACCÈS AU NIVEAU DES DATA CLASSIFICATION • LIMITÉ LES ACCÈS POUR OWA
  • 33. 34 Azure Identity Protection DÉTECTION DES VULNÉRABILITÉ REMÉDIATIONS ACTION AUTOMATIQUE EN FONCTION DES ACTIVITÉS SUSPECTES DÉTECTÉES
  • 34. 35 Azure Identity Protection 6 EVENTS À RISQUE : - UTILISATEURS SUSPECT : HORS LIGNE - CONNEXION DEPUIS DES IP NON CONNUS – ANONYMES : TEMPS RÉEL - CONNEXION DEPUIS DES EMPLACEMENTS INCONNUS: TEMPS RÉEL - CONNEXION DEPUIS UN APPAREIL INFECTÉ: HORS LIGNE - CONNEXION DEPUIS UN EMPLACEMENT INHABITUEL: HORS LIGNE - CONNEXION DEPUIS UNE IP QUI CONTIENT UNE ACTIVITÉ SUSPECTE :HORS LIGNE
  • 35. 36 Azure Identity Protection TYPE DE DÉTECTION : NIVEAU DE RISQUE : ELEVÉ – MOYEN – FAIBLE Temps réel 5 à 10 minutes Hors ligne 2 à 24 heurs
  • 36. 37 Azure Identity Protection Setting Value Users xxx Conditions Sign-in risk, Medium Controls Access Block – Ou MFA REMEDIATION
  • 37. 38 Azure Identity Protection LES NOUVEAUTÉS: • END USER ACTIVITY REPORTING – RAPPORT DÉTAILLÉ • MACHINE LEARNING • AZURE ATP INTÉGRATION SECOPS
  • 38. 39 Smart Lockout et password Protetion
  • 39. 40 Smart Lockout et password Protection
  • 40. 41 Azure Application Proxy VPN ET DMZ : ON PEUT OUBLIER ?
  • 42. CONCLUSION 43 SUIVRE LE MICROSOFT SECURE SCORE ACTIVEZ LE PTA : • ACTIVEZ LE SEAMLESS SSO AZURE MFA • TRUST DES IP ET LOCATIONS • CONDITIONAL ACCESS IDENTITY PROTECTION: • POLICY DE REMÉDIATION • ACTIVEZ LE MFA POUR TOUT LE MONDE EN FONCTION DES LOCATION • REPORTING • DEVICE • RISQUE USER – CONNEXION – LOCATION – IP • PASSWORD: • ACTIVEZ LE SELF PASSWORD - SMART LOCKOUT – PASSWORD PROTECTION • AZURE APPLICATION PROXY
  • 44. 45 MERCI DE VOTRE ATTENTION !