Enterprise Mobility and Security Blog

EMS_Cloud_5

Active Directory Access Control List – Attacks and Defense

Recently there has been a lot of attention and a few different blog posts (references at the end of the post) regarding the use of Discretionary Access Control List (DACL) for privilege escalation in a Domain environment. This potential attack vector involves the creation of an escalation path based in AD object permissions (DACLs). For...

Continue reading

ems-hybrid-cloud_webinars_square

Webinar: Find out how Check Point’s threat intelligence enhances EMS’ device based conditional access

Join us for a webinar to find out how the combined power of Microsoft Intune and Check Point’s Sandblast mobile helps you secure mobile devices from advanced cyberthreats, and helps ensure that only compliant devices have access to company resources. Here’s what we’ll cover: SandBlast Mobile’s comprehensive mobile threat defense capabilities that help you stay...

Continue reading

ems_lifestyle2

Role Based Access Control: A Configuration Manager favorite, now in Intune

Role Based Access Control (RBAC) has been a favorite feature of the System Center Configuration Manager community since its introduction, and now it’s available in Intune. RBAC in Intune enables you to easily define who can perform various Intune tasks within your organization, and who those tasks apply to. RBAC gives you greater flexibility and...

Continue reading

ems_-lifestyle-6

Deploying Office 365 ProPlus with Microsoft Intune

We have been hard at work with Office 365 and Windows 10 teams to create Microsoft 365, a modern workplace solution that empowers everyone to be creative and work together, securely. We are excited to announce the latest innovation in this space – the ability to deploy Office 365 ProPlus applications to Windows 10 devices...

Continue reading

ems_industry-scenario-2

How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 6

The General Data Protection Regulation (GDPR) strengthens the right of individuals in the European Union (EU) to control their personal data and requires organizations to bolster their privacy and data protection measures. Enterprise Mobility + Security (EMS) technologies may help you meet these new requirements. In the whitepaper “Beginning Your GDPR Journey,” we introduced five...

Continue reading

How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 5

Protecting data at the device and app level with Microsoft Intune Over the past month, the Enterprise Mobility + Security (EMS) team has been blogging about Microsoft’s broad commitment to making sure our products and services comply with the GDPR and making sure that you – our customers – understand how our technologies can assist...

Continue reading

EMS_STB13_Chris_02

How Microsoft EMS can support you in your journey to EU GDPR compliance – part 4

How to gain visibility and control of data in cloud apps This post is authored by Rue Limones, Senior Program Manager, Cloud App Security Engineering Team. Checking in: Your Journey to GDPR Compliance In the whitepaper “Beginning Your GDPR Journey,” we introduce five key use case scenarios that are relevant to GDPR compliance where Microsoft...

Continue reading

The unbelievably diverse array of devices managed by our customers

Something I have come to really appreciate as we’ve built Intune and watched its usage scale to millions of devices is the unbelievably broad and diverse types of hardware our customers have to manage. To put this challenge in perspective, check out the chart below. In this chart, you can see the diversity of devices...

Continue reading

ems_industry-scenario-2

How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 3

Granting and restricting access to data with Azure Active Directory This blog post is the latest in our series about how EMS can support you in your journey to EU GDPR compliance. We last looked at how Azure Information Protection helps keep your data protected, whether it’s stored on-premises or in the cloud. Today, I’m...

Continue reading

ems_lifestyle-7

How do your enterprise mobility and security solutions stack up?

Many of our customers have existing mobility and security solutions that are either legacy investments or focused point solutions that respond to specific needs—very few organizations are able to start from scratch. The complexity of coordinating multiple point solutions, combined with the leaner budgets and shrinking bandwidth of IT, can make it challenging to evaluate...

Continue reading