Enhancing security and compliance with Microsoft Surface and Microsoft 365

Published 04-26-2021 04:24 PM 1,315 Views
Microsoft

As frontline workers increasingly interact with workplace applications using mobile devices, tablets, or other mobile form factors, organizations face higher risks of these devices being lost, stolen, or temporarily misplaced. Earlier this year, Microsoft announced new licensing options for organizations with frontline workers to address these potential risks and other security threats, while also helping improve compliance capabilities.

 

With these offers, organizations using Microsoft Surface devices can better protect their devices and data against attacks or accidents. With security capabilities built into the firmware, operating system, and Microsoft 365, Microsoft has taken a comprehensive chip-to-cloud approach to help organizations deliver more protection for employees using Surface devices with Microsoft 365.

 

Surface with Microsoft 365 provides unique protection at the front line. To provide a few illustrations of how devices may be vulnerable and how this new level of protection can support organizations and frontline workers, here are a few commonplace examples:

 

  • Scenario 1: The device is stolen while it is momentarily unattended
  • Scenario 2: A malicious actor gains access to a device for a short time
  • Scenario 3: An employee accidentally visits a malicious website or unknowingly joins an unsecure Wi-Fi signal

Surface-at-home.png

 

Scenario 1: The device is stolen while it is momentarily unattended

A building inspector is on a job site and sets her Surface Pro 7+ down for a second while she checks a plumbing connection. Someone steals the device, hoping to find sensitive information or perhaps intending to sell the device to a highly capable hacker. The following protections built into Surface and in the cloud with Microsoft 365 help prevent a stolen device from compromising sensitive data:

 

  • Data on the hard drive is encrypted. Surface devices ship with BitLocker drive encryption enabled by default, so the data on the hard drive cannot be accessed without credentials or the encryption key. Even if the hard drive is removed from the device and inserted into a new device, it cannot be decrypted.
  • USB booting is prevented because the organization used Microsoft Endpoint Manager to proactively turned off the ability to boot from USB through the firmware-level control that the Surface device offers.
  • There is zero access to data even if the SSD is removed. If a Surface’s removable SSD is tampered with, the device will shut off power, erasing any residual data in its memory. Since the device is cloud-managed, the organization can remote wipe all the machine’s contents .

Scenario 2: A malicious actor gains access to a device for a short time

A retail employee is helping a customer in the store when they both hear a loud crash. Another customer has knocked over a display accidentally. The employee puts down their Surface Pro X and rushes over to help. Seeing the device was not locked, someone takes the device.  Later, they try to access data stored on the device. With Microsoft’s cloud security, the retail establishment’s data is protected.

 

  • A Zero Trust approach means that even if a device is authenticated, the current user profile can only access data and content they have permissions for. The retail establishment assumes that a breach is always possible and maintains strict controls over data access. Conditional access capabilities in Microsoft 365 prevent data leakage from both internal and external actors.
  • Any unusual behavior on the device is automatically detected and remediated with Microsoft Defender for Endpoint, which analyzes signals from the device to recognize any abnormal behavior, like an uncommon executable running on the device. As part of the remediation path, the device is automatically quarantined from the network until the situation is resolved.

Scenario 3: An employee accidentally visits a malicious website or unknowingly joins an unsecure Wi-Fi signal

An employee joins a public Wi-Fi network, which creates the potential for a malicious actor to collect sensitive information. Or maybe the employee accidentally clicks a link that installs malicious code on a device. Surface with Microsoft 365 can keep data secure in a few ways:

 

  • Instead of worrying about encrypting data that could be shared on a public network, the organization takes a proactive approach to having a guaranteed secure connection, especially for employees in the field, by equipping frontline workers with LTE-enabled devices. The entire Surface 2-in-1 portfolio (Surface Go 2, Surface Pro 7+, Surface Pro X) has LTE available.
  • Any websites, cloud resources, or internal networks not explicitly defined as “trusted” are contained with Microsoft Defender Application Guard. These untrusted sites or files are opened in a virtualized container – essentially a separate PC within the existing PC – to isolate those potentially harmful sites or files from the rest of the device.   

In addition to the ways that Surface with Microsoft 365 can help keep frontline devices secure, with cloud management and Windows Autopilot, Surface devices can also be shipped directly to a worker’s location without IT ever touching the device, saving time and effort. As frontline workers increasingly use devices in public spaces, the need to protect sensitive information at the front line has never been more important.

 

To learn more about Surface for Business visit Surface.com/Business or connect with your local commercial reseller.

%3CLINGO-SUB%20id%3D%22lingo-sub-2283062%22%20slang%3D%22en-US%22%3EEnhancing%20security%20and%20compliance%20with%20Microsoft%20Surface%20and%20Microsoft%20365%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2283062%22%20slang%3D%22en-US%22%3E%3CP%3EAs%20frontline%20workers%20increasingly%20interact%20with%20workplace%20applications%20using%20mobile%20devices%2C%20tablets%2C%20or%20other%20mobile%20form%20factors%2C%20organizations%20face%20higher%20risks%20of%20these%20devices%20being%20lost%2C%20stolen%2C%20or%20temporarily%20misplaced.%20Earlier%20this%20year%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Flicensing%2Fnews%2Fnew_f5_security_and_compliance_offer_for_frontline_workers%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20announced%20new%20licensing%20options%3C%2FA%3E%20for%20organizations%20with%20frontline%20workers%20to%20address%20these%20potential%20risks%20and%20other%20security%20threats%2C%20while%20also%20helping%20improve%20compliance%20capabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20these%20offers%2C%20organizations%20using%20Microsoft%20Surface%20devices%20can%20better%20protect%20their%20devices%20and%20data%20against%20attacks%20or%20accidents.%20With%20security%20capabilities%20built%20into%20the%20firmware%2C%20operating%20system%2C%20and%20Microsoft%20365%2C%20Microsoft%20has%20taken%20a%20comprehensive%20chip-to-cloud%20approach%20to%20help%20organizations%20deliver%20more%20protection%20for%20employees%20using%20Surface%20devices%20with%20Microsoft%20365.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESurface%20with%20Microsoft%20365%20provides%20unique%20protection%20at%20the%20front%20line.%20To%20provide%20a%20few%20illustrations%20of%20how%20devices%20may%20be%20vulnerable%20and%20how%20this%20new%20level%20of%20protection%20can%20support%20organizations%20and%20frontline%20workers%2C%20here%20are%20a%20few%20commonplace%20examples%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EScenario%201%3A%20The%20device%20is%20stolen%20while%20it%20is%20momentarily%20unattended%3C%2FLI%3E%0A%3CLI%3EScenario%202%3A%20A%20malicious%20actor%20gains%20access%20to%20a%20device%20for%20a%20short%20time%3C%2FLI%3E%0A%3CLI%3EScenario%203%3A%20An%20employee%20accidentally%20visits%20a%20malicious%20website%20or%20unknowingly%20joins%20an%20unsecure%20Wi-Fi%20signal%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22scen1%22%20id%3D%22toc-hId-2006147839%22%20id%3D%22toc-hId-2005160114%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Surface-at-home.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F275609iB51DC0DAAE35C625%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Surface-at-home.png%22%20alt%3D%22Surface-at-home.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-198693376%22%20id%3D%22toc-hId-197705651%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--1608761087%22%20id%3D%22toc-hId--1609748812%22%3EScenario%201%3A%20The%20device%20is%20stolen%20while%20it%20is%20momentarily%20unattended%3C%2FH3%3E%0A%3CP%3EA%20building%20inspector%20is%20on%20a%20job%20site%20and%20sets%20her%20Surface%20Pro%207%2B%20down%20for%20a%20second%20while%20she%20checks%20a%20plumbing%20connection.%20Someone%20steals%20the%20device%2C%20hoping%20to%20find%20sensitive%20information%20or%20perhaps%20intending%20to%20sell%20the%20device%20to%20a%20highly%20capable%20hacker.%20The%20following%20protections%20built%20into%20Surface%20and%20in%20the%20cloud%20with%20Microsoft%20365%20help%20prevent%20a%20stolen%20device%20from%20compromising%20sensitive%20data%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EData%20on%20the%20hard%20drive%20is%20encrypted.%3C%2FEM%3E%3C%2FSTRONG%3E%20Surface%20devices%20ship%20with%20BitLocker%20drive%20encryption%20enabled%20by%20default%2C%20so%20the%20data%20on%20the%20hard%20drive%20cannot%20be%20accessed%20without%20credentials%20or%20the%20encryption%20key.%20Even%20if%20the%20hard%20drive%20is%20removed%20from%20the%20device%20and%20inserted%20into%20a%20new%20device%2C%20it%20cannot%20be%20decrypted.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EUSB%20booting%20is%20prevented%3C%2FEM%3E%20%3C%2FSTRONG%3Ebecause%20the%20organization%20used%20Microsoft%20Endpoint%20Manager%20to%20proactively%20turned%20off%20the%20ability%20to%20boot%20from%20USB%20through%20the%20firmware-level%20control%20that%20the%20Surface%20device%20offers.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EThere%20is%20zero%20access%20to%20data%3C%2FEM%3E%20%3C%2FSTRONG%3Eeven%20if%20the%20SSD%20is%20removed.%20If%20a%20Surface%E2%80%99s%20removable%20SSD%20is%20tampered%20with%2C%20the%20device%20will%20shut%20off%20power%2C%20erasing%20any%20residual%20data%20in%20its%20memory.%20Since%20the%20device%20is%20cloud-managed%2C%20the%20organization%20can%20remote%20wipe%20all%20the%20machine%E2%80%99s%20contents%20.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22scen2%22%20id%3D%22toc-hId-878751746%22%20id%3D%22toc-hId-877764021%22%3EScenario%202%3A%20A%20malicious%20actor%20gains%20access%20to%20a%20device%20for%20a%20short%20time%3C%2FH3%3E%0A%3CP%3EA%20retail%20employee%20is%20helping%20a%20customer%20in%20the%20store%20when%20they%20both%20hear%20a%20loud%20crash.%20Another%20customer%20has%20knocked%20over%20a%20display%20accidentally.%20The%20employee%20puts%20down%20their%20Surface%20Pro%20X%20and%20rushes%20over%20to%20help.%20Seeing%20the%20device%20was%20not%20locked%2C%20someone%20takes%20the%20device.%20%26nbsp%3BLater%2C%20they%20try%20to%20access%20data%20stored%20on%20the%20device.%20With%20Microsoft%E2%80%99s%20cloud%20security%2C%20the%20retail%20establishment%E2%80%99s%20data%20is%20protected.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EA%20Zero%20Trust%20approach%20means%20that%3C%2FEM%3E%20%3C%2FSTRONG%3Eeven%20if%20a%20device%20is%20authenticated%2C%20the%20current%20user%20profile%20can%20only%20access%20data%20and%20content%20they%20have%20permissions%20for.%20The%20retail%20establishment%20assumes%20that%20a%20breach%20is%20always%20possible%20and%20maintains%20strict%20controls%20over%20data%20access.%20Conditional%20access%20capabilities%20in%20Microsoft%20365%20prevent%20data%20leakage%20from%20both%20internal%20and%20external%20actors.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EAny%20unusual%20behavior%20on%20the%20device%20is%20automatically%20detected%20and%20remediated%3C%2FEM%3E%20%3C%2FSTRONG%3Ewith%20Microsoft%20Defender%20for%20Endpoint%2C%20which%20analyzes%20signals%20from%20the%20device%20to%20recognize%20any%20abnormal%20behavior%2C%20like%20an%20uncommon%20executable%20running%20on%20the%20device.%20As%20part%20of%20the%20remediation%20path%2C%20the%20device%20is%20automatically%20quarantined%20from%20the%20network%20until%20the%20situation%20is%20resolved.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22scen3%22%20id%3D%22toc-hId--928702717%22%20id%3D%22toc-hId--929690442%22%3EScenario%203%3A%20An%20employee%20accidentally%20visits%20a%20malicious%20website%20or%20unknowingly%20joins%20an%20unsecure%20Wi-Fi%20signal%3C%2FH3%3E%0A%3CP%3EAn%20employee%20joins%20a%20public%20Wi-Fi%20network%2C%20which%20creates%20the%20potential%20for%20a%20malicious%20actor%20to%20collect%20sensitive%20information.%20Or%20maybe%20the%20employee%20accidentally%20clicks%20a%20link%20that%20installs%20malicious%20code%20on%20a%20device.%20Surface%20with%20Microsoft%20365%20can%20keep%20data%20secure%20in%20a%20few%20ways%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EInstead%20of%20worrying%20about%20encrypting%20data%20that%20could%20be%20shared%20on%20a%20public%20network%2C%3C%2FEM%3E%3C%2FSTRONG%3E%20the%20organization%20takes%20a%20proactive%20approach%20to%20having%20a%20guaranteed%20secure%20connection%2C%20especially%20for%20employees%20in%20the%20field%2C%20by%20equipping%20frontline%20workers%20with%20LTE-enabled%20devices.%20The%20entire%20Surface%202-in-1%20portfolio%20(Surface%20Go%202%2C%20Surface%20Pro%207%2B%2C%20Surface%20Pro%20X)%20has%20LTE%20available.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EAny%20websites%2C%20cloud%20resources%2C%20or%20internal%20networks%20not%20explicitly%20defined%20as%20%E2%80%9Ctrusted%E2%80%9D%20are%20contained%20%3C%2FEM%3E%3C%2FSTRONG%3Ewith%20Microsoft%20Defender%20Application%20Guard.%20These%20untrusted%20sites%20or%20files%20are%20opened%20in%20a%20virtualized%20container%20%E2%80%93%20essentially%20a%20separate%20PC%20within%20the%20existing%20PC%20%E2%80%93%20to%20isolate%20those%20potentially%20harmful%20sites%20or%20files%20from%20the%20rest%20of%20the%20device.%20%3CSTRONG%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3E%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIn%20addition%20to%20the%20ways%20that%20Surface%20with%20Microsoft%20365%20can%20help%20keep%20frontline%20devices%20secure%2C%20with%20cloud%20management%20and%20Windows%20Autopilot%2C%20Surface%20devices%20can%20also%20be%20shipped%20directly%20to%20a%20worker%E2%80%99s%20location%20without%20IT%20ever%20touching%20the%20device%2C%20saving%20time%20and%20effort.%20As%20frontline%20workers%20increasingly%20use%20devices%20in%20public%20spaces%2C%20the%20need%20to%20protect%20sensitive%20information%20at%20the%20front%20line%20has%20never%20been%20more%20important.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%20about%26nbsp%3BSurface%20for%20Business%20visit%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsurface%2Fbusiness%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESurface.com%2FBusiness%3C%2FA%3E%20or%20connect%20with%20your%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsurface%2Fbusiness%2Fwhere-to-buy-microsoft-surface%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Elocal%20commercial%20reseller.%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2283062%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22SUR21_Laptop4_Contextual_IceBlue_10_RGB.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F275186i33CE63328D7ECAF7%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22SUR21_Laptop4_Contextual_IceBlue_10_RGB.png%22%20alt%3D%22SUR21_Laptop4_Contextual_IceBlue_10_RGB.png%22%20%2F%3E%3C%2FSPAN%3ESee%20how%20Surface%20devices%20help%20protect%20you%20from%20top%20security%20risks%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Co-Authors
Version history
Last update:
‎Apr 26 2021 04:28 PM
Updated by: