SlideShare a Scribd company logo
http://aka.ms/MSFTSecDay2017
Session Code: WS 1.4
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Hello, I would like
to read this
document.
First, tell me who
you are
Let me check if I
can trust you
Azure AD MFA
Require MFA
Allow access
Deny access
Force
password reset******
Limit access
Controls
Users
Devices
Location
Apps
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
10TB
Effective
policy
Identity Protection at its best
Risk severity calculation
Remediation recommendations
Risk-based conditional access automatically
protects against suspicious logins and
compromised credentials
Gain insights from a consolidated view of
machine learning based threat detection
Leaked
credentials
Infected
devices Configuration
vulnerabilities
Risk-based
policies
MFA Challenge
Risky Logins
Block attacks
Change bad
credentials
Machine-Learning Engine
Suspicious sign-
in activities
Brute force
attacks
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Every day we:
Machine
Learning
for security
Azure Active Directory
Azure Active Directory
Credentials
Azure Active Directory
Azure Active Directory
Credentials
Schroedinger's
User
?
Seems
Good
Seems
Bad
Coder
Azure Active DirectorySchroedinger's
User
?
Credentials
Classifier
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Schroedinger's
User
?
Credentials
Self-reporting Threat dataRelying parties Behavior10+ TB Logs
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior10+ TB Logs
Schroedinger's
User
?
Credentials
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior
Schroedinger's
User
?
Label
Data We were right!
Credentials
10+ TB Logs
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior
Schroedinger's
User
?
Label
Data
We were wrong!
Credentials
10+ TB Logs
We were right!
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior
Schroedinger's
User
?
Security
Analyst Label
Data
We were wrong!
Credentials
10+ TB Logs
We were right!
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior
Schroedinger's
User
?
Security
Analyst Label
Data
Code updates
to Classifier
We were wrong!
Credentials
10+ TB Logs
We were right!
Credentials
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior
Schroedinger's
User
?
Security
Analyst Label
Data
Deploy new
Classifier
Code updates
to Classifier
We were wrong!
10+ TB Logs
We were right!
Credentials
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior
Schroedinger's
User
?
We were wrong!
Analyze
Label
Data
Update
Deploy
10+ TB Logs
We were right!
Learner
Credentials
Azure Active Directory
Analysis
Seems
Good
Seems
Bad
Classifier
Self-reporting Threat dataRelying parties Behavior
Schroedinger's
User
?
Label
Data We were right!
We were wrong!
Analyze
Update
Deploy
10+ TB Logs
Identity Protection in Action: EDU Attack
We noticed a sharp increase in password lockouts
Large elevation in user lockouts.
Inspection show lockout increase
from single org.
Users
Locked Out
Per Day
Suspicious IP activity very different from in-country IPs
Generally lower user volume
Generally successful
In-
Country
Traffic
Suspect
IP
Mostly failure traffic
Single UserAgent
Detailed suspicious IP view showed automated attacks
Initial bad guy
test run
Large scale account
failures/minuteAccounts
Accessed
Per-Minute,
Suspect IP
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Microsoft Security Days
18.Oktober 2017
Axel Ciml
Oxford Computer Group GmbH
10.2017
Unternehmen
• Fokussiert auf Identity and Security Management inkl. organisatorischer
Unterstützung seit 1999
• 8 Niederlassungen weltweit, ca. 180 Consultants
• Büro am MS Campus in Redmond
• Erstellen Webcast für MS und OCG (eigener Youtube Kanal)
• Erstellen offizielle Microsoft Trainingsunterlagen (ADFS, PKI, IdM etc)
User Story
Herausforderung
Wirtschaftsprüfer Hinweise:
Probleme bei MA Austritt
Probleme bei Verwaltung externe
Mitarbeiter
Mangelhaftes Reporting
Einführung Azure Dienste
Office 365
Azure RMS(AIP)
Azure MFA
Rechtekonzept in Azure
Hybridszenario und Anbindung weiterer
SAS Dienste (z.B. Salesforce)
Lösung
• Anbindung HR, externe MA
Verwaltung
• Userselfservice, Zutrittskontrolle,
• Rollenmanagement,
Smartcardverwaltung
• Zentrales Reporting über “alle”
Systeme
• Synchronisation OrgDaten mit Azure
• Implementierung von Azure RMS
• inkl. Datenklassifizierung
• Automatische Lizenzzuweisung
(intern/extern)
• Rechtevergabe auf Zeit (PIM)
• Integration Salesforce in bestehende
Umgebung
• Hybrid da Vorgabe durch Kunden
Mehrwert
Kostenersparnis,
Servicelevel wurde erhöht
Hohe Dezentralisierung der
administrativen Tätigkeiten
Sicherheitsvorgaben des Kunden
erfüllen
Schutz des geistigen Eigentums
Flexibilität bei Produktauswahl (Cloud –
on Prem)
Erhöhung der Sicherheit durch gezielte
Lizenzvergabe
Vereinfachung der Benutzerverwaltung
Rasche Erweiterung ohne Änderung
bestehender Infrastruktur
Nutzung unserer Expertise
• ½ tägiger Workshop: Einführung in ein IdM Projekt
• Zugriff auf fast 20 Jahre Expertise in der Umsetzung von IdM Projekten
• Wie bereit ist Ihr Unternehmen?
• Worauf ist zu achten?
• Wen benötigt man in einem IdM Projektteam?
• Welche sind die nächsten Schritte?
• Beantwortung Ihrer Fragen zu diesem Thema
• Ziel:
• Persönlicher Fahrplan wie Sie in ein IdM Projekt starten können
Offering
Kontakt
axel.ciml@oxfordcomputergroup.at
www.oxfordcomputergroup.at
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level
Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level

More Related Content

PDF
Daniel Grabski | Microsofts cybersecurity story
PDF
Emma Aubert | Information Protection
PDF
Nicholas DiCola | Secure your IT resources with Azure Security Center
PDF
Arbel Zinger | Microsoft Advanced Threat Analytics
PDF
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
PPTX
cyber-security-reference-architecture
PDF
Msft cloud architecture_security_commonattacks
PPSX
Thread Legal and Microsoft 365 Security
Daniel Grabski | Microsofts cybersecurity story
Emma Aubert | Information Protection
Nicholas DiCola | Secure your IT resources with Azure Security Center
Arbel Zinger | Microsoft Advanced Threat Analytics
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
cyber-security-reference-architecture
Msft cloud architecture_security_commonattacks
Thread Legal and Microsoft 365 Security

What's hot (20)

PDF
Protect your business with identity and access management in the cloud
PDF
Azure Security Center
PPTX
MCAS High Level Architecture May 2021
PDF
How to protect your corporate from advanced attacks
PPTX
Microsoft Cloud Application Security Overview
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PPTX
20181213 - wazug protecting your data with azure ad
PPTX
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
PPTX
Zero Trust Model
PPTX
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
PPTX
1 Modern Security - Keynote
PDF
Azure Information Protection
PDF
Microsoft Cloud App Security
PPTX
Microsoft Platform Security Briefing
PDF
Microsoft Cloud App Security CASB
PPTX
Zero Trust Networks
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PPTX
The Top Cloud Security Issues
PPTX
Using m365 defender to protect against solorigate
PPTX
Mobile App Security: Enterprise Checklist
Protect your business with identity and access management in the cloud
Azure Security Center
MCAS High Level Architecture May 2021
How to protect your corporate from advanced attacks
Microsoft Cloud Application Security Overview
3 Modern Security - Secure identities to reach zero trust with AAD
20181213 - wazug protecting your data with azure ad
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Zero Trust Model
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
1 Modern Security - Keynote
Azure Information Protection
Microsoft Cloud App Security
Microsoft Platform Security Briefing
Microsoft Cloud App Security CASB
Zero Trust Networks
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
The Top Cloud Security Issues
Using m365 defender to protect against solorigate
Mobile App Security: Enterprise Checklist
Ad

Similar to Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level (20)

PPTX
5 steps to securing your identity infrastructure.pptx
PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PPTX
Azure security and Compliance
PPTX
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
Module2jxcnckvjzdxcnvkzjxnvkdsnfkvzsdf.pptx
PDF
Microsoft security compass presentation latest
PPTX
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
PPTX
Azure security basics
PPTX
20180120 spsbre - we are moving to the cloud what about security
PPTX
security-compass-presentation-microsft.pptx
PPTX
Identity and Security in the Cloud
PPTX
ciso-workshop-3-identity-protection.pptx
PPTX
2018 November - AZUGDK - Azure AD
PPTX
Zero trust deck 2020
PDF
Protect your data in / with the Cloud
PDF
Microsoft 365 Compliance and Security Overview
PDF
Best Practices in Cloud Security
PPTX
20171207 we are moving to the cloud what about security
PPTX
Interesting EMS Sessions for Ignite 2018
5 steps to securing your identity infrastructure.pptx
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Azure security and Compliance
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Module2jxcnckvjzdxcnvkzjxnvkdsnfkvzsdf.pptx
Microsoft security compass presentation latest
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
Azure security basics
20180120 spsbre - we are moving to the cloud what about security
security-compass-presentation-microsft.pptx
Identity and Security in the Cloud
ciso-workshop-3-identity-protection.pptx
2018 November - AZUGDK - Azure AD
Zero trust deck 2020
Protect your data in / with the Cloud
Microsoft 365 Compliance and Security Overview
Best Practices in Cloud Security
20171207 we are moving to the cloud what about security
Interesting EMS Sessions for Ignite 2018
Ad

Recently uploaded (20)

PDF
How to Get Business Funding for Small Business Fast
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
Amazon (Business Studies) management studies
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Chapter 5_Foreign Exchange Market in .pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PPT
Chapter four Project-Preparation material
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Roadmap Map-digital Banking feature MB,IB,AB
How to Get Business Funding for Small Business Fast
Lecture (1)-Introduction.pptx business communication
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Tata consultancy services case study shri Sharda college, basrur
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Amazon (Business Studies) management studies
COST SHEET- Tender and Quotation unit 2.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Power and position in leadershipDOC-20250808-WA0011..pdf
2025 Product Deck V1.0.pptxCATALOGTCLCIA
Reconciliation AND MEMORANDUM RECONCILATION
Chapter 5_Foreign Exchange Market in .pdf
New Microsoft PowerPoint Presentation - Copy.pptx
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Chapter four Project-Preparation material
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Roadmap Map-digital Banking feature MB,IB,AB

Stefan van der Wiele | Protect users identities and control access to valuable resources based on risk level