Build a strong Zero Trust Foundation starting with identity and endpoint management

Published Jul 14 2021 08:00 AM 2,815 Views
Microsoft

Last year at Microsoft Inspire, we shared gratitude for the amazing work our partners did in helping our joint customers rapidly shift to remote work. As the world continues to evolve and the new reality takes hold, two trends are shaping our customer’s priorities this year: a shift to hybrid work and a growing sophistication of cyber threats. As our customers navigate these changes, they continue to lean on our partner ecosystem to help them adapt. One critical way our partners have helped customers adapt is by helping them adopt a Zero Trust security strategy.

 

While starting a Zero Trust journey can seem intimidating, inaction is no longer a choice. Together, with our partners, we have a shared accountability to guide every customer through this journey. For organizations seeking guidance on where to start, we recommend building a strong foundation by securing identities and endpoints. At Microsoft Inspire this week, we’re sharing key strategies that we recommend in building such foundation.

 

Secure Digital transformation.png

 

 

Modernizing identity and endpoint management

To unlock the advanced security and a comprehensive Zero Trust strategy, accelerate your journey to the cloud by modernizing identity and endpoint management solutions – a growing priority for business leaders.

 

Modernization may look like an overwhelming task, but the key to making it actionable is to focus on managing critical access decisions from the cloud and eliminating common attack vectors. Modernizing authentication from legacy federation allows you to choose the best access path for your business, and staged-roll out can make the migration seamless by testing deployment in a control group. Blocking legacy authentication helps ensure multifactor authentication can be enforced, and can be set as a default policy with Conditional Access. And to unify access management sync all on-premises identities to the cloud with tools like Azure AD connect cloud sync, which works even for complex identity environments with hundreds of disconnected Active Directory (AD) forests.

 

Azure AD Connect.png

 

To modernize endpoint management, Microsoft Endpoint Manager can chart the path to the cloud at a pace that fit your needs. Microsoft Endpoint Manager brings together Configuration Manager and Intune in a single, unified endpoint management solution, to be used individually or together in co-management.

 

Finally, to modernize identity and endpoint management, unify app management with a single cloud identity and cloud endpoint management solution. Connecting all apps to one identity system gives better visibility and control into the apps being used and simplifies access to resources with one set of credentials, and our solutions work across cloud apps to on-premises apps as well as desktop and mobile apps.

 

 

Secure your hybrid workforce

When all employees work in an agile and hybrid environment, securing identities and endpoints becomes even more important. The first step in securing the hybrid workforce is to verify user identities with strong authentication. Passwords are the weakest link in a security chain, so that’s why we believe strongly that if you only do one thing to protect yourself, start with multi-factor authentication – which can prevent 99.9% of identity attacks. For even stronger authentication, we go passwordless - it is more secure and easier to use.

 

Next, limit access to only compliant and trusted devices with policies that prevent vulnerable and compromised devices access to resources​. You can secure your endpoints by enrolling them in device management, applying data protection policies on your devices and using threat protection solutions like Microsoft Defender for Endpoint to ​detect compromised devices. ​

 

Once you established control points for identities and devices, configure adaptive access policies based on context and risk assessment. With Conditional Access, fine-tune access policies based upon user, device, location, and session risk assessment. And we continue to make Conditional Access smarter by enabling more granular controls like building policies upon the authentication context, or Continuous Access Evaluation that constantly re-assesses if access conditions are met and can interrupt a session if a change is detected.

 

Another critical factor in access decisions are permissions that your customers give to their employees and partners, which can be based on roles, projects, or other attributes. While those permissions are easy to grant, they are much harder to track, or revoke access when it is no longer needed. With a growth of extended workforce, having one solution to manage such permissions for everyone is increasingly important. Identity Governance built into Azure AD helps you protect, monitor, and audit access to critical resources.​

 

Require Compliant Device.png

 

 

Transform employee experiences

Delightful employee experiences are a growing priority for business leaders as remote work makes it even harder to rely on traditional approach to IT helpdesks. One example – in the US alone 49 million remote workers report that it takes days—and even weeks—to get IT issues fixed1.

 

Creating a great employee experience starts when a new employee is onboarded and hired. Using Azure AD provisioning, Microsoft Endpoint Manager and Windows Autopilot organizations can shorten this process from days to hours or even minutes and grant access to the appropriate apps and devices on day one. With Azure AD verifiable credentials, you can simplify this experience even more – for example, you can confirm information about a new hire—like their education and professional certifications in minutes, without collecting and storing their personal data.

 

Moving past on-boarding, a  single sign-on can help streamline how employees access the apps they need. One of the easiest actions to improve employee productivity is to connect ALL applications to Azure AD from cloud apps like Workday, ServiceNow, and even AWS to on-premises apps or custom-built apps.​ Once apps have been connected to Azure AD, end users can easily discover and launch all their applications from our centralize app launch portal, My Apps.

 

Screen.png

 

 

Customize secure access for all users

Secure access and delightful experiences should extend to all users. Let’s take one example – frontline workers. Last year we’ve all seen the essential role they play in our society yet 75% still don’t have the right tools to do their work.2 We’re working with our partners and customers to change that by creating experiences that adapt to their work environment. The first step is to streamline the sign-in processes with one-time SMS codes and empower frontline worker credential management, like adding phone numbers and approving password resets, in the My Staff portal. With kiosks being a common tool for frontline roles, shared device mode allows workers to securely sign-in and sign-out of all their apps and browser sessions on such devices.

 

Another critical priority is building long lasting relationships with your customers. With Azure AD B2C, organizations and developers have the flexibility to tailor sign-in experiences of their customer-facing apps and build granular access policies. And to further protect customer accounts and revenue from abuse and fraud, Azure AD B2C integrates with Dynamics Fraud Protection. With this integration, you can defend against fake account creation, account takeovers, and fraudulent account access​. You can also improve transaction acceptance rates with insights that balance revenue opportunity against fraud loss and checkout friction​.

 

Rule Decision.png

 

Join us virtually, live or on-demand at Microsoft Inspire

The changes in how and where we work and increased security threats require a new set of principles and a new security approach: Zero Trust with identity and endpoints as a foundation. Taken together, Azure AD and Microsoft Endpoint Manager, along with our integrated security approach, helps ensure that only the right people are getting the right level of access across your organization, elevating both security and end-user productivity.

 

No matter where you are in the world, I hope you will join us during at Microsoft Inspire for our sessions. Join the conversation on Twitter and LinkedIn with the hashtag #MSInspire.

  • TS03: Build a foundation of trust and security
  • BRK122: Identity and endpoint management – a strong foundation for Zero Trust and profitability
  • OD122: Build a business around helping customers drive towards a Zero Trust framework
  • ATEBRK122: Ask the Experts: Identity and endpoint management – a strong foundation for Zero Trust and profitability

 

Best regards,

Irina Nechaeva

Senior Director, Identity Product Marketing

 

 

 

Source:

  1. 1E American Remote Work Survey, July 20, 2020
  2. Equip Firstline Workers with Better Tools to Drive Engagement, Forrester Opportunity Snapshot: A Customer Study Commissioned by Microsoft, December 2018

 

 

Learn more about Microsoft identity:

%3CLINGO-SUB%20id%3D%22lingo-sub-2520420%22%20slang%3D%22en-US%22%3EBuild%20a%20strong%20Zero%20Trust%20Foundation%20starting%20with%20identity%20and%20endpoint%20management%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2520420%22%20slang%3D%22en-US%22%3E%3CP%3ELast%20year%20at%20Microsoft%20Inspire%2C%20we%20shared%20gratitude%20for%20the%20amazing%20work%20our%20partners%20did%20in%20helping%20our%20joint%20customers%20rapidly%20shift%20to%20remote%20work.%20As%20the%20world%20continues%20to%20evolve%20and%20the%20new%20reality%20takes%20hold%2C%20two%20trends%20are%20shaping%20our%20customer%E2%80%99s%20priorities%20this%20year%3A%20a%20shift%20to%20hybrid%20work%20and%20a%20growing%20sophistication%20of%20cyber%20threats.%20As%20our%20customers%20navigate%20these%20changes%2C%20they%20continue%20to%20lean%20on%20our%20partner%20ecosystem%20to%20help%20them%20adapt.%20One%20critical%20way%20our%20partners%20have%20helped%20customers%20adapt%20is%20by%20helping%20them%20adopt%20a%20Zero%20Trust%20security%20strategy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20starting%20a%20Zero%20Trust%20journey%20can%20seem%20intimidating%2C%20inaction%20is%20no%20longer%20a%20choice.%20Together%2C%20with%20our%20partners%2C%20we%20have%20a%20shared%20accountability%20to%20guide%20every%20customer%20through%20this%20journey.%20For%20organizations%20seeking%20guidance%20on%20where%20to%20start%2C%20we%20recommend%20building%20a%20strong%20foundation%20by%20securing%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fazure-ad-pricing%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eidentities%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fmicrosoft-endpoint-manager%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eendpoints%3C%2FA%3E.%20%3CSPAN%3EAt%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fmyinspire.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Inspire%3C%2FA%3E%3CSPAN%3E%20this%20week%2C%20we%E2%80%99re%20sharing%20key%20strategies%20that%20we%20recommend%20in%20building%20such%20foundation.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Secure%20Digital%20transformation.png%22%20style%3D%22width%3A%20679px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F295095i1B4B3BBA2CB3F534%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Secure%20Digital%20transformation.png%22%20alt%3D%22Secure%20Digital%20transformation.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-289663151%22%20id%3D%22toc-hId-288469427%22%3E%3CSTRONG%3EModernizing%20identity%20and%20endpoint%20management%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3ETo%20unlock%20the%20advanced%20security%20and%20a%20comprehensive%20Zero%20Trust%20strategy%2C%20accelerate%20your%20journey%20to%20the%20cloud%20by%20modernizing%20identity%20and%20endpoint%20management%20solutions%20%E2%80%93%20a%20growing%20priority%20for%20business%20leaders.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EModernization%20may%20look%20like%20an%20overwhelming%20task%2C%20but%20the%20key%20to%20making%20it%20actionable%20is%20to%20focus%20on%20managing%20critical%20access%20decisions%20from%20the%20cloud%20and%20eliminating%20common%20attack%20vectors.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fhybrid%2Fchoose-ad-authn%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EModernizing%20authentication%3C%2FA%3E%20from%20legacy%20federation%20allows%20you%20to%20choose%20the%20best%20access%20path%20for%20your%20business%2C%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fhybrid%2Fhow-to-connect-staged-rollout%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Estaged-roll%20out%3C%2FA%3E%20can%20make%20the%20migration%20seamless%20by%20testing%20deployment%20in%20a%20control%20group.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fblock-legacy-authentication%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EBlocking%20legacy%20authentication%3C%2FA%3E%20helps%20ensure%20multifactor%20authentication%20can%20be%20enforced%2C%20and%20can%20be%20set%20as%20a%20default%20policy%20with%20Conditional%20Access.%20And%20to%20unify%20access%20management%20sync%20all%20on-premises%20identities%20to%20the%20cloud%20with%20tools%20like%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fcloud-sync%2Fwhat-is-cloud-sync%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20connect%20cloud%20sync%3C%2FA%3E%2C%20which%20works%20even%20for%20complex%20identity%20environments%20with%20hundreds%20of%20disconnected%20Active%20Directory%20(AD)%20forests.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Azure%20AD%20Connect.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F295096iDD5705E5F6CE4C19%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Azure%20AD%20Connect.png%22%20alt%3D%22Azure%20AD%20Connect.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20modernize%20endpoint%20management%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fmicrosoft-endpoint-manager%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Endpoint%20Manager%3C%2FA%3E%20can%20chart%20the%20path%20to%20the%20cloud%20at%20a%20pace%20that%20fit%20your%20needs.%20Microsoft%20Endpoint%20Manager%20brings%20together%20Configuration%20Manager%20and%20Intune%20in%20a%20single%2C%20unified%20endpoint%20management%20solution%2C%20to%20be%20used%20individually%20or%20together%20in%20co-management.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFinally%2C%20to%20modernize%20identity%20and%20endpoint%20management%2C%20unify%20app%20management%20with%20a%20single%20cloud%20identity%20and%20cloud%20endpoint%20management%20solution.%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fsecure-app-access%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConnecting%20all%20apps%3C%2FA%3E%20to%20one%20identity%20system%20gives%20better%20visibility%20and%20control%20into%20the%20apps%20being%20used%20and%20simplifies%20access%20to%20resources%20with%20one%20set%20of%20credentials%2C%20and%20our%20solutions%20work%20across%20cloud%20apps%20to%20on-premises%20apps%20as%20well%20as%20desktop%20and%20mobile%20apps.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--1517791312%22%20id%3D%22toc-hId--1518985036%22%3E%3CSPAN%3E%3CSTRONG%3ESecure%20your%20hybrid%20workforce%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FH4%3E%0A%3CP%3EWhen%20all%20employees%20work%20in%20an%20agile%20and%20hybrid%20environment%2C%20securing%20identities%20and%20endpoints%20becomes%20even%20more%20important.%20The%20first%20step%20in%20securing%20the%20hybrid%20workforce%20is%20to%20verify%20user%20identities%20with%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fmfa-multi-factor-authentication%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Estrong%20authentication%3C%2FA%3E.%20Passwords%20are%20the%20weakest%20link%20in%20a%20security%20chain%2C%20so%20that%E2%80%99s%20why%20we%20believe%20strongly%20that%20if%20you%20only%20do%20one%20thing%20to%20protect%20yourself%2C%20start%20with%20multi-factor%20authentication%20%E2%80%93%20which%20can%20prevent%2099.9%25%20of%20identity%20attacks.%20For%20even%20stronger%20authentication%2C%20we%20go%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fpasswordless-authentication%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Epasswordless%3C%2FA%3E%26nbsp%3B-%20it%20is%20more%20secure%20and%20easier%20to%20use.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ENext%2C%20limit%20access%20to%20only%20compliant%20and%20trusted%20devices%20with%20policies%20that%20prevent%20vulnerable%20and%20compromised%20devices%20access%20to%20resources%20.%20You%20can%20secure%20your%20endpoints%20by%20enrolling%20them%20in%20device%20management%2C%20applying%20data%20protection%20policies%20on%20your%20devices%20and%20using%20threat%20protection%20solutions%20like%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fendpoint-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FA%3E%20to%20detect%20compromised%20devices.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20you%20established%20control%20points%20for%20identities%20and%20devices%2C%20configure%20adaptive%20access%20policies%20based%20on%20context%20and%20risk%20assessment.%20With%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fconditional-access-azure-ad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConditional%20Access%3C%2FA%3E%2C%20fine-tune%20access%20policies%20based%20upon%20user%2C%20device%2C%20location%2C%20and%20session%20risk%20assessment.%20And%20we%20continue%20to%20make%20Conditional%20Access%20smarter%20by%20enabling%20more%20granular%20controls%20like%20building%20policies%20upon%20the%20authentication%20context%2C%20or%20Continuous%20Access%20Evaluation%20that%20constantly%20re-assesses%20if%20access%20conditions%20are%20met%20and%20can%20interrupt%20a%20session%20if%20a%20change%20is%20detected.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnother%20critical%20factor%20in%20access%20decisions%20are%20permissions%20that%20your%20customers%20give%20to%20their%20employees%20and%20partners%2C%20which%20can%20be%20based%20on%20roles%2C%20projects%2C%20or%20other%20attributes.%20While%20those%20permissions%20are%20easy%20to%20grant%2C%20they%20are%20much%20harder%20to%20track%2C%20or%20revoke%20access%20when%20it%20is%20no%20longer%20needed.%20With%20a%20growth%20of%20extended%20workforce%2C%20having%20one%20solution%20to%20manage%20such%20permissions%20for%20everyone%20is%20increasingly%20important.%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fidentity-governance%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIdentity%20Governance%3C%2FA%3E%20built%20into%20Azure%20AD%20helps%20you%20protect%2C%20monitor%2C%20and%20audit%20access%20to%20critical%20resources.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Require%20Compliant%20Device.png%22%20style%3D%22width%3A%20828px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F295097i84F7071F32F65DD8%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Require%20Compliant%20Device.png%22%20alt%3D%22Require%20Compliant%20Device.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-969721521%22%20id%3D%22toc-hId-968527797%22%3E%3CSPAN%3E%3CSTRONG%3ETransform%20employee%20experiences%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FH4%3E%0A%3CP%3EDelightful%20employee%20experiences%20are%20a%20growing%20priority%20for%20business%20leaders%20as%20remote%20work%20makes%20it%20even%20harder%20to%20rely%20on%20traditional%20approach%20to%20IT%20helpdesks.%20One%20example%20%E2%80%93%20in%20the%20US%20alone%2049%20million%20remote%20workers%20report%20that%20it%20takes%20days%E2%80%94and%20even%20weeks%E2%80%94to%20get%20IT%20issues%20fixed%3CSUP%3E1%3C%2FSUP%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECreating%20a%20great%20employee%20experience%20starts%20when%20a%20new%20employee%20is%20onboarded%20and%20hired.%20Using%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Flifecycle-management-software%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20provisioning%3C%2FA%3E%2C%20Microsoft%20Endpoint%20Manager%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fwindows%2Fwindows-autopilot%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EWindows%20Autopilot%3C%2FA%3E%20organizations%20can%20shorten%20this%20process%20from%20days%20to%20hours%20or%20even%20minutes%20and%20grant%20access%20to%20the%20appropriate%20apps%20and%20devices%20on%20day%20one.%20With%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fverifiable-credentials%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20verifiable%20credentials%3C%2FA%3E%2C%20you%20can%20simplify%20this%20experience%20even%20more%20%E2%80%93%20for%20example%2C%20you%20can%20confirm%20information%20about%20a%20new%20hire%E2%80%94like%20their%20education%20and%20professional%20certifications%20in%20minutes%2C%20without%20collecting%20and%20storing%20their%20personal%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMoving%20past%20on-boarding%2C%20a%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fsingle-sign-on%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Esingle%20sign-on%3C%2FA%3E%20can%20help%20streamline%20how%20employees%20access%20the%20apps%20they%20need.%20One%20of%20the%20easiest%20actions%20to%20improve%20employee%20productivity%20is%20to%20connect%20%3CSTRONG%3E%3CU%3EALL%3C%2FU%3E%3C%2FSTRONG%3E%20applications%20to%20Azure%20AD%20from%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fintegrated-apps-azure-ad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ecloud%20apps%3C%2FA%3E%20like%20Workday%2C%20ServiceNow%2C%20and%20even%20AWS%20to%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fapplication-management-services%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eon-premises%20apps%3C%2FA%3E%20or%20custom-built%20apps.%20Once%20apps%20have%20been%20connected%20to%20Azure%20AD%2C%20end%20users%20can%20easily%20discover%20and%20launch%20all%20their%20applications%20from%20our%20centralize%20app%20launch%20portal%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fuser-self-service-portals%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMy%20Apps%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screen.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F295098iD7CF66B021F951BA%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Screen.png%22%20alt%3D%22Screen.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--837732942%22%20id%3D%22toc-hId--838926666%22%3E%3CSPAN%3E%3CSTRONG%3ECustomize%20secure%20access%20for%20all%20users%20%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FH4%3E%0A%3CP%3ESecure%20access%20and%20delightful%20experiences%20should%20extend%20to%20all%20users.%20Let%E2%80%99s%20take%20one%20example%20%E2%80%93%20frontline%20workers.%20Last%20year%20we%E2%80%99ve%20all%20seen%20the%20essential%20role%20they%20play%20in%20our%20society%20yet%2075%25%20still%20don%E2%80%99t%20have%20the%20right%20tools%20to%20do%20their%20work.%3CSUP%3E2%3C%2FSUP%3E%20We%E2%80%99re%20working%20with%20our%20partners%20and%20customers%20to%20change%20that%20by%20creating%20experiences%20that%20adapt%20to%20their%20work%20environment.%20The%20first%20step%20is%20to%20streamline%20the%20sign-in%20processes%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fauthentication%2Fhowto-authentication-sms-signin%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eone-time%20SMS%20codes%3C%2FA%3E%20and%20empower%20frontline%20worker%20credential%20management%2C%20like%20adding%20phone%20numbers%20and%20approving%20password%20resets%2C%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Froles%2Fmy-staff-configure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMy%20Staff%20portal%3C%2FA%3E.%20With%20kiosks%20being%20a%20common%20tool%20for%20frontline%20roles%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevelop%2Fmsal-shared-devices%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eshared%20device%20mode%3C%2FA%3E%20allows%20workers%20to%20securely%20sign-in%20and%20sign-out%20of%20all%20their%20apps%20and%20browser%20sessions%20on%20such%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnother%20critical%20priority%20is%20building%20long%20lasting%20relationships%20with%20your%20customers.%20With%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory-b2c%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20B2C%3C%2FA%3E%2C%20organizations%20and%20developers%20have%20the%20flexibility%20to%20tailor%20sign-in%20experiences%20of%20their%20customer-facing%20apps%20and%20build%20granular%20access%20policies.%20And%20to%20further%20protect%20customer%20accounts%20and%20revenue%20from%20abuse%20and%20fraud%2C%20%3CA%20href%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fdynamics365%2Fbdm%2F2021%2F05%2F12%2Ffraud-trends-part-4-balancing-identity-authentication-with-user-experience%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20B2C%20integrates%20with%20Dynamics%20Fraud%20Protection%3C%2FA%3E.%20With%20this%20integration%2C%20you%20can%20defend%20against%20fake%20account%20creation%2C%20account%20takeovers%2C%20and%20fraudulent%20account%20access%20.%20You%20can%20also%20improve%20transaction%20acceptance%20rates%20with%20insights%20that%20balance%20revenue%20opportunity%20against%20fraud%20loss%20and%20checkout%20friction%20.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Rule%20Decision.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F295099iBC552AE365D18D48%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Rule%20Decision.png%22%20alt%3D%22Rule%20Decision.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-1649779891%22%20id%3D%22toc-hId-1648586167%22%3E%3CSTRONG%3EJoin%20us%20virtually%2C%20live%20or%20on-demand%20at%20Microsoft%20Inspire%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3EThe%20changes%20in%20how%20and%20where%20we%20work%20and%20increased%20security%20threats%20require%20a%20new%20set%20of%20principles%20and%20a%20new%20security%20approach%3A%20Zero%20Trust%20with%20identity%20and%20endpoints%20as%20a%20foundation.%20Taken%20together%2C%20Azure%20AD%20and%20Microsoft%20Endpoint%20Manager%2C%20along%20with%20our%20integrated%20security%20approach%2C%20helps%20ensure%20that%20only%20the%20right%20people%20are%20getting%20the%20right%20level%20of%20access%20across%20your%20organization%2C%20elevating%20both%20security%20and%20end-user%20productivity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENo%20matter%20where%20you%20are%20in%20the%20world%2C%20I%20hope%20you%20will%20join%20us%20during%20at%20Microsoft%20Inspire%20for%20our%20sessions.%20Join%20the%20conversation%20on%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2Fazuread%2Fstatus%2F1278418103903363074%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ETwitter%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ELinkedIn%3C%2FA%3E%20with%20the%20hashtag%20%23MSInspire.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fmyinspire.microsoft.com%2Fsessions%2Fa5411f0e-7928-41c2-850f-c7dfbed207a3%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETS03%3C%2FA%3E%3A%20Build%20a%20foundation%20of%20trust%20and%20security%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fmyinspire.microsoft.com%2Fsessions%2Faf379ebd-9be9-4985-9443-068f4a584344%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EBRK122%3C%2FA%3E%3A%20Identity%20and%20endpoint%20management%20%E2%80%93%20a%20strong%20foundation%20for%20Zero%20Trust%20and%20profitability%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fmyinspire.microsoft.com%2Fsessions%2F8f6f4cf4-3712-4e74-bd31-9efeb249298c%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EOD122%3C%2FA%3E%3A%20Build%20a%20business%20around%20helping%20customers%20drive%20towards%20a%20Zero%20Trust%20framework%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fmyinspire.microsoft.com%2Fsessions%2Fb9f77c58-b8c7-4e95-992b-6875efa7da68%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EATEBRK122%3C%2FA%3E%3A%20Ask%20the%20Experts%3A%20Identity%20and%20endpoint%20management%20%E2%80%93%20a%20strong%20foundation%20for%20Zero%20Trust%20and%20profitability%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBest%20regards%2C%3C%2FP%3E%0A%3CP%3EIrina%20Nechaeva%3C%2FP%3E%0A%3CP%3ESenior%20Director%2C%20Identity%20Product%20Marketing%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESource%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E1E%20American%20Remote%20Work%20Survey%2C%20July%2020%2C%202020%3C%2FLI%3E%0A%3CLI%3EEquip%20Firstline%20Workers%20with%20Better%20Tools%20to%20Drive%20Engagement%2C%20Forrester%20Opportunity%20Snapshot%3A%20A%20Customer%20Study%20Commissioned%20by%20Microsoft%2C%20December%202018%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3ELearn%20more%20about%20Microsoft%20identity%3A%3C%2FEM%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CEM%3EReturn%20to%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fbg-p%2FIdentity%22%20target%3D%22_blank%22%3E%3CEM%3EAzure%20Active%20Directory%20Identity%20blog%20home%3C%2FEM%3E%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EJoin%20the%20conversation%20on%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2Fazuread%2Fstatus%2F1278418103903363074%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ETwitter%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%20and%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ELinkedIn%3C%2FEM%3E%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EShare%20product%20suggestions%20on%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ffeedback.azure.com%2Fforums%2F169401-azure-active-directory%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3EAzure%20Feedback%20Forum%3C%2FEM%3E%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2520420%22%20slang%3D%22en-US%22%3E%3CP%3EJoin%20us%20at%20Microsoft%20Inspire%20and%20learn%20how%20to%20start%20your%20Zero%20Trust%20journey%20by%20securing%20your%20identity%20and%20endpoints.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture2.jpg%22%20style%3D%22width%3A%20277px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F295622i789457145946E889%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture2.jpg%22%20alt%3D%22Picture2.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2520420%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECustomer%20and%20Partner%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Jul 13 2021 04:06 PM
Updated by: