Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    Microsoft Uses Active Directory to Tighten MDM Security

    Written by

    Pedro Hernandez
    Published May 5, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      After extending its embrace to rival mobile platforms, Microsoft is now looking to tighten security in its ecosystem of mobile device management (MDM) solutions.

      During this week’s Ignite conference in Chicago, Microsoft’s inaugural event for IT professionals, the company’s mobile device management announcements were “very focused on cyber-security in particular,” Andrew Conway, senior director of Enterprise Mobility at Microsoft, told eWEEK. Increasingly, the lynchpin in the company’s efforts to secure sensitive and private data is Active Directory (AD), Microsoft’s user identity and access and platform.

      In the past, “security was very much about the [network] perimeter,” but the explosive growth of mobile device usage in the workplace is forcing security administrators to turn their attention to users, argued Conway. “We have really been focused on these security capabilities, keyed around that identity control plane,” he said.

      Those capabilities include Azure AD Cloud App Discovery, which enables administrators to sniff out rogue mobile apps and other suspicious software that can leak data. Conway said businesses “pretty systematically underestimate the number of SaaS [software-as-a-service] applications in their environment,” a blind spot that can torpedo their data security and compliance initiatives.

      The new cloud app discovery feature does more than take an inventory of apps on managed devices. “It looks at inbound and outbound traffic,” unmasking employees who may be placing company data at risk. Azure AD Cloud App Discovery is now generally available.

      Microsoft’s new on-premises Advanced Threat Analytics offering, currently in beta, also hooks into Active Directory to thwart security breaches. Based on technology from the Aorato acquisition in November, Advanced Threat Analytics applies a blend of user behavioral analytics, machine learning and a catalog of known threats to alert administrators of attacks, suspicious user behavior and potential data breaches in real time.

      Microsoft Advanced Threat Analytics makes detecting attacks as easy as catching up with friends on Facebook, according to Conway. Instead of poring over logs that contain “a lot of noise,” the product’s “attack timeline looks like a social networking feed,” he said.

      Deploying Advanced Threat Analytics is a set-and-forget affair. “Set it up in your environment—do port mirroring over AD—and it establishes a point of view on what is normal behavior,” Conway said. “It doesn’t require you to set any specific baseline yourself.”
      Later this quarter, Microsoft will switch on new conditional access and mobile application management capabilities for the Outlook app in Intune, the company’s cloud-based MDM platform. This will allow organizations to restrict access to the app if devices don’t adhere to their device enrollment and compliance policies. Further, administrators can disallow functions like copy, paste and save, which can be used for the unauthorized transfer data to personal apps.

      Other mobile security-related announcements included the public preview of Azure Rights Management Document Tracking. In essence, organizations can configure permissions that travel with a shared file, said Conway. If necessary, users can remotely revoke access with a single click.

      Finally, in preparation for the flood of Windows 10 devices that will ship later this year, Microsoft released the System Center Configuration Manager technical preview for the deployment and management of devices using the company’s upcoming operating system. System Center 2012 won’t be left out of the loop, assured Conway. With the imminent release of new service packs, “all of our existing customers are covered,” he said.

      Pedro Hernandez
      Pedro Hernandez
      Pedro Hernandez is a writer for eWEEK and the IT Business Edge Network, the network for technology professionals. Previously, he served as a managing editor for the Internet.com network of IT-related websites and as the Green IT curator for GigaOM Pro.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×