SlideShare a Scribd company logo
 
Jason Langridge Enterprise Mobility Solution Specialist Microsoft Email:  [email_address] Blog :  http://blogs.msdn.com/jasonlan
How can we setup/configure our Windows Mobile devices? Is there a way to control what the user can/can’t do? We want to be able to secure the data and the devices. How can we keep these devices up to date?  We would like to provide secure access to our Intranet and other services.
Lets you deploy and manage Windows Mobile devices like you do PCs/laptops in your IT infrastructure and provides security-enhanced access to corporate data  Management Workload  Deployment:  Inside Firewall Network Access Workload Deployment:  in DMZ Security  Management Active Directory Domain join  Policy enforcement using Active Directory/Group Policy targeting (>130 policies) Communications and camera disablement* File encryption  Application allow and deny Remote wipe  OMA-DM compliant Device  Management Single point of management for mobile devices in enterprise  Full OTA provisioning and bootstrapping  OTA Software distribution based on WSUS 3.0 Inventory  SQL Server 2005 based reporting capabilities  Role based administration  MMC snap-ins and Powershell cmndlets WMU On/Off controlcompliant Mobile Optimized VPN Machine authentication and “double envelope security” Session Persistence Fast Reconnect Internetwork roaming Standards based (IKEv2, MobIKE, IPSEC tunnel mode)
Leverage existing services Active Directory Group Policy Windows Server Update Services
Extends Active Directory & Group Policy to Windows Mobile 130+ configuration settings now managed through Group Policy including Bluetooth WIFI SMS/MMS IR Camera POP/IMAP Extensible architecture
Enterprise-wide OTA software distribution  Wide Selection of Inventory and Reporting options
Smartcard Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile GW Back Firewall SSL  Auth (PIN+Corp Root) SSL  Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service OMA Proxy CA Mobile VPN
Different categories/differing terminology Front door vs Back Door devices Enterprise Managed vs Consumer  Corporate vs Employee Liable  Initial problem - getting the client on the device Zero touch deployment and setup
Administrator invokes enrollment request and sends  One-Time PIN to the user  (email, text message, voicemail, etc.) Or user uses Self-Help Portal to acquire One-Time Pin Here’s your PIN 1234abcd
User runs the “Enterprise Activation” wizard on the device What is your email address? Takes SMTP address and looks for host MobileEnroll.domain.com If host is located, connection to Enrollment Server will be initiated If host is not found, user will be prompted for the FQDN of the Enrollment Server Session establish over SSL (TCP 443) User is prompted to enter their  One-Time PIN
Web Service validates OTP If valid, it passes session on to Network Service OTP now cannot be re-used Enrollment Server Passes  Across OTP to WS Session handed Over to Network Service
Device is then “Domain Joined” SC MDM Client is configured to use Mobile Gateway for all future connectivity Enrollment is complete Device is then setup/configured using Group Policy
Key concerns Preventing unauthorized applications from being run/installed Disabling some of the devices capabilities  (eg. Camera/Wifi) Access to consumer services  (eg. POP3/IMAP) Mobile Device Manager empowers you through Active Directory Integration Group Policies
Data stored on both the physical device and storage card  Windows Mobile 6 provides ability to encrypt storage card  System Center Mobile Device Manager provides Enable Device Perimeter PIN password Ability to enforce encryption on storage card Allow/Disallow the use of removable storage Remotely Wipe devices
Important to separate update needs: Device OS  Applications, Configuration and Settings System Center Mobile Device Manager allows you to: Distribute software and applications through Windows Server Update Services (WSUS) Setup/configure/manage devices through Active Directory and Group Policy
WWAN Internet WIFI https://EAS http://www.microsoft.com
DMZ WWAN Corpnet Internet FW FW Email  Or LOB Servers Mobile Gateway WIFI NAT https://EAS http://www.microsoft.com
Addressed 5 key security and management concerns Showed how to improve and simplify mobile device management and security with  System Center Mobile Device Manager For more information:  www.windowsmobile.com/mobiledevicemanager/
Questions and Answers Submit text questions using the “Ask” button.  Don’t forget to fill out the survey. For upcoming and previously live webcasts:  www.microsoft.com/webcast   Got webcast content ideas? Contact us at:  http://go.microsoft.com/fwlink/?LinkId=41781  
 
© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

PDF
Effective multi factor authentication for people soft
PDF
Iraje brochure v17 master
PPT
Technet System Center Mobile Device Manager Presentation
PDF
Iraje version 6 presentation
PDF
Security 101: Multi-Factor Authentication for IBM i
PPT
e-DMZ Products Overview
PDF
Security 101: Multi-Factor Authentication for IBM i
PDF
Hitachi ID Suite 9.0 Features and Technology
Effective multi factor authentication for people soft
Iraje brochure v17 master
Technet System Center Mobile Device Manager Presentation
Iraje version 6 presentation
Security 101: Multi-Factor Authentication for IBM i
e-DMZ Products Overview
Security 101: Multi-Factor Authentication for IBM i
Hitachi ID Suite 9.0 Features and Technology

What's hot (20)

PPTX
e-capture.net feature tour
PDF
E capture movie (PDF version)
PPTX
Remote access from a smartphone ppt
PPTX
Single sign on - benefits, challenges and case study : iFour consultancy
PPTX
E capture movie (updated)
PDF
Privileged Access Manager Product Q&A
PPT
Single Sign On - Case Study
PDF
Managing Passwords for Mobile Users
PPTX
Best Practices for Multi-Factor Authentication on IBM i
PDF
Strong authentication for your organization in a cost effective cloud-based...
PPTX
Project 1 final power point presentation spa
PDF
From Password Reset to Authentication Management
DOC
ajees resume
PPTX
Dell Password Manager Architecture - Components
PDF
Hitachi ID Password Manager Security Analysis
PPTX
Best Practices for Multi-Factor Authentication on IBM i
PPTX
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
PDF
IBM Traveler and Verse: Device Security and Administration Overview
PDF
Hitachi ID Password Manager Brochure
PDF
Trivadis TechEvent 2017 The future of mobility Daniel von Büren
e-capture.net feature tour
E capture movie (PDF version)
Remote access from a smartphone ppt
Single sign on - benefits, challenges and case study : iFour consultancy
E capture movie (updated)
Privileged Access Manager Product Q&A
Single Sign On - Case Study
Managing Passwords for Mobile Users
Best Practices for Multi-Factor Authentication on IBM i
Strong authentication for your organization in a cost effective cloud-based...
Project 1 final power point presentation spa
From Password Reset to Authentication Management
ajees resume
Dell Password Manager Architecture - Components
Hitachi ID Password Manager Security Analysis
Best Practices for Multi-Factor Authentication on IBM i
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Traveler and Verse: Device Security and Administration Overview
Hitachi ID Password Manager Brochure
Trivadis TechEvent 2017 The future of mobility Daniel von Büren
Ad

Viewers also liked (20)

PPTX
Generally accepted accounting principal
PPTX
Cost and management accounting
PPT
Cost methods
PPT
Chapter03 s
PPTX
Cost behaviour analyais & use
KEY
Old Spice Market Strategies
PPT
An introduction to cost terms and purposes
PPSX
An introduction to cost terms and purpose
DOCX
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...
PPTX
What is cost accounting
PPT
Chapter 2 cost terms, concepts and classifications 2012 students(1)
PPTX
Inventory valuation
PPTX
Job order costing
PPTX
Chapter 1.auditing notes for an auditing students rsa
PPT
Job order costing
PPT
Costing system job costing
PDF
Auditing as a profession
PPT
Auditing Profession – Global Development And Key Issues
PPTX
Job costing
Generally accepted accounting principal
Cost and management accounting
Cost methods
Chapter03 s
Cost behaviour analyais & use
Old Spice Market Strategies
An introduction to cost terms and purposes
An introduction to cost terms and purpose
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...
What is cost accounting
Chapter 2 cost terms, concepts and classifications 2012 students(1)
Inventory valuation
Job order costing
Chapter 1.auditing notes for an auditing students rsa
Job order costing
Costing system job costing
Auditing as a profession
Auditing Profession – Global Development And Key Issues
Job costing
Ad

Similar to Simplify Security And Device Management Final Pres10 23final (20)

PPT
How to deploy Windows Mobile to 40,000 users
PPT
Mobile Device Management
PPT
System Center Mobile Device Manager
PPTX
Net Motion Mobility Overview - Field Service
PPT
ISSE Mobile Device Policy Enforcement
PPTX
Test
PDF
Empower Enterprise Mobility with Microsoft EMS
PDF
Multi-Factor Authentication Evaluation Guide.pdf
PDF
Multi-Factor Authentication Evaluation Guide.pdf
PDF
#EVRYWhatsNext EMS Slide Deck
PPT
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
PPTX
SphereShield for Skype for Business - Compliance and Security
PDF
Knox Manage Tech Sheet
PPTX
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
PPTX
Microsoft Intune y Gestión de Identidad Corporativa
PDF
Identity Manager & AirWatch Cloud Mobile App - Infographic
DOC
Wakeel Ahmed_CV_IT_Admin
PPT
Why Security Teams should care about VMware
PDF
MMS 2015: What is ems and how to configure it
PPTX
3 Steps to Safely Bringing Your Own Devices (BYOD)
How to deploy Windows Mobile to 40,000 users
Mobile Device Management
System Center Mobile Device Manager
Net Motion Mobility Overview - Field Service
ISSE Mobile Device Policy Enforcement
Test
Empower Enterprise Mobility with Microsoft EMS
Multi-Factor Authentication Evaluation Guide.pdf
Multi-Factor Authentication Evaluation Guide.pdf
#EVRYWhatsNext EMS Slide Deck
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
SphereShield for Skype for Business - Compliance and Security
Knox Manage Tech Sheet
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Microsoft Intune y Gestión de Identidad Corporativa
Identity Manager & AirWatch Cloud Mobile App - Infographic
Wakeel Ahmed_CV_IT_Admin
Why Security Teams should care about VMware
MMS 2015: What is ems and how to configure it
3 Steps to Safely Bringing Your Own Devices (BYOD)

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I

Simplify Security And Device Management Final Pres10 23final

  • 1.  
  • 2. Jason Langridge Enterprise Mobility Solution Specialist Microsoft Email: [email_address] Blog : http://blogs.msdn.com/jasonlan
  • 3. How can we setup/configure our Windows Mobile devices? Is there a way to control what the user can/can’t do? We want to be able to secure the data and the devices. How can we keep these devices up to date? We would like to provide secure access to our Intranet and other services.
  • 4. Lets you deploy and manage Windows Mobile devices like you do PCs/laptops in your IT infrastructure and provides security-enhanced access to corporate data Management Workload Deployment: Inside Firewall Network Access Workload Deployment: in DMZ Security Management Active Directory Domain join Policy enforcement using Active Directory/Group Policy targeting (>130 policies) Communications and camera disablement* File encryption Application allow and deny Remote wipe OMA-DM compliant Device Management Single point of management for mobile devices in enterprise Full OTA provisioning and bootstrapping OTA Software distribution based on WSUS 3.0 Inventory SQL Server 2005 based reporting capabilities Role based administration MMC snap-ins and Powershell cmndlets WMU On/Off controlcompliant Mobile Optimized VPN Machine authentication and “double envelope security” Session Persistence Fast Reconnect Internetwork roaming Standards based (IKEv2, MobIKE, IPSEC tunnel mode)
  • 5. Leverage existing services Active Directory Group Policy Windows Server Update Services
  • 6. Extends Active Directory & Group Policy to Windows Mobile 130+ configuration settings now managed through Group Policy including Bluetooth WIFI SMS/MMS IR Camera POP/IMAP Extensible architecture
  • 7. Enterprise-wide OTA software distribution Wide Selection of Inventory and Reporting options
  • 8. Smartcard Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile GW Back Firewall SSL Auth (PIN+Corp Root) SSL Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service OMA Proxy CA Mobile VPN
  • 9. Different categories/differing terminology Front door vs Back Door devices Enterprise Managed vs Consumer Corporate vs Employee Liable Initial problem - getting the client on the device Zero touch deployment and setup
  • 10. Administrator invokes enrollment request and sends One-Time PIN to the user (email, text message, voicemail, etc.) Or user uses Self-Help Portal to acquire One-Time Pin Here’s your PIN 1234abcd
  • 11. User runs the “Enterprise Activation” wizard on the device What is your email address? Takes SMTP address and looks for host MobileEnroll.domain.com If host is located, connection to Enrollment Server will be initiated If host is not found, user will be prompted for the FQDN of the Enrollment Server Session establish over SSL (TCP 443) User is prompted to enter their One-Time PIN
  • 12. Web Service validates OTP If valid, it passes session on to Network Service OTP now cannot be re-used Enrollment Server Passes Across OTP to WS Session handed Over to Network Service
  • 13. Device is then “Domain Joined” SC MDM Client is configured to use Mobile Gateway for all future connectivity Enrollment is complete Device is then setup/configured using Group Policy
  • 14. Key concerns Preventing unauthorized applications from being run/installed Disabling some of the devices capabilities (eg. Camera/Wifi) Access to consumer services (eg. POP3/IMAP) Mobile Device Manager empowers you through Active Directory Integration Group Policies
  • 15. Data stored on both the physical device and storage card Windows Mobile 6 provides ability to encrypt storage card System Center Mobile Device Manager provides Enable Device Perimeter PIN password Ability to enforce encryption on storage card Allow/Disallow the use of removable storage Remotely Wipe devices
  • 16. Important to separate update needs: Device OS Applications, Configuration and Settings System Center Mobile Device Manager allows you to: Distribute software and applications through Windows Server Update Services (WSUS) Setup/configure/manage devices through Active Directory and Group Policy
  • 17. WWAN Internet WIFI https://EAS http://www.microsoft.com
  • 18. DMZ WWAN Corpnet Internet FW FW Email Or LOB Servers Mobile Gateway WIFI NAT https://EAS http://www.microsoft.com
  • 19. Addressed 5 key security and management concerns Showed how to improve and simplify mobile device management and security with System Center Mobile Device Manager For more information: www.windowsmobile.com/mobiledevicemanager/
  • 20. Questions and Answers Submit text questions using the “Ask” button. Don’t forget to fill out the survey. For upcoming and previously live webcasts: www.microsoft.com/webcast Got webcast content ideas? Contact us at: http://go.microsoft.com/fwlink/?LinkId=41781  
  • 21.  
  • 22. © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Editor's Notes

  • #2: Windows Mobile © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.