DEVICE PROTECTION DATA PROTECTION Protect data when device

  • Slides: 50
Download presentation

DEVICE PROTECTION DATA PROTECTION Protect data when device is lost or stolen Accidental data

DEVICE PROTECTION DATA PROTECTION Protect data when device is lost or stolen Accidental data leakage SHARING PROTECTION Protect data is shared

Lost Laptops– ADDING TERROR TO PLAYBOOK Over 12, 000 laptops lost in airports every

Lost Laptops– ADDING TERROR TO PLAYBOOK Over 12, 000 laptops lost in airports every week “It’s staggering to learn that up to 600, 000 laptops are lost in U. S. airports annually, many containing sensitive information that companies must account for. ” Larry Ponemon Source: ”New Study Reveals Up To 12, 000 Laptop Computers Lost Weekly and up to 600, 000 lost annually in U. S. Airports”, Ponemon. org, June 20, 2008

Full volume Encryption • OS volumes • Fixed data drives (like a separate hard

Full volume Encryption • OS volumes • Fixed data drives (like a separate hard drive or partition) • Removable drives Recovery • Recovery Keys • DRA Used Disk Space Pre-provisioning • Encrypts used disk space • Pre-provisioning – speeds up encryption by turning on in Win. PE • TPM must be enabled and owned

TPM 1. 2 – Main spec in use. Random lockout thresholds and attempts. TPM

TPM 1. 2 – Main spec in use. Random lockout thresholds and attempts. TPM 2. 0 – On by default. Consistent lock out.

§ Integrates Bit. Locker Enactment into existing deployment tools § Grace period for enactment

§ Integrates Bit. Locker Enactment into existing deployment tools § Grace period for enactment § Prompts for PIN or Password § Escrows recovery information and TPM Owner. Auth § Encryption Compliance Reporting status reporting per volume on each computer § View overall compliance for your organization § View reports standalone in System Center Configuration Manager § Helpdesk Recovery recovery § Self service recovery § Retrieve TPM Owner. Auth to unlock TPM

MBAM CLIENT FLOW: INSTALL MBAM CLIENT APPLY MBAM POLICY ENACTS BITLOCKER REPORTS COMPLIANCE

MBAM CLIENT FLOW: INSTALL MBAM CLIENT APPLY MBAM POLICY ENACTS BITLOCKER REPORTS COMPLIANCE

Deployment Management Industry Compat Introduced scripts to support imaging Built cmdlets to import Bit.

Deployment Management Industry Compat Introduced scripts to support imaging Built cmdlets to import Bit. Locker and TPM data from AD Added automatic TPM unlock when Bit. Locker is recovered Consolidated and simplified server logging Added Windows 10 support Added Encrypted HDD Supported International Domain Names Supported Win 7 FIPS Recovery Password Included prompting for PIN after imaging Improved TPM Owner. Auth Escrow Customization Added ability to direct customers to SSP from Bit. Locker recovery screen Allowed SSP branding capability during setup Increased supported client languages to 23 Updated reports schema to allow customization using Report Builder

Process • • Volume Support Escrow/Reporting Error Handling Written in Power. Shell; compatible with

Process • • Volume Support Escrow/Reporting Error Handling Written in Power. Shell; compatible with Power. Shell v 2 Easy to use with MDT, SCCM, or standalone

Invoke-Mbam. Client. Deployment. ps 1 – The main script that your deployment system will

Invoke-Mbam. Client. Deployment. ps 1 – The main script that your deployment system will call to configure MBAM and enable Bit. Locker. Parameter Description -Recovery. Service. Endpoint Required MBAM recovery service endpoint -Status. Reporting. Servcie. Endpoint Optional MBAM status reporting service endpoint -Encryption. Method Optional Encryption method (default: AES 128) -Encrypt. And. Escrow. Data. Volume Switch Specify to encrypt data volume(s) and escrow data volume recovery key(s) -Wait. For. Encryption. To. Complete Switch Specify to wait for the encryption to complete -Ignore. Escrow. Owner. Auth. Failure Switch Specify to ignore TPM Owner. Auth escrow failure -Ignore. Escrow. Recovery. Key. Failure Switch Specify to ignore volume recovery key escrow failure -Ignore. Report. Status. Failure Switch Specify to ignore status reporting failure

Invoke-Mbam-Client. Deployment. ps 1 –Recovery. Service. Endpoint https: //mbam. contoso. com/MBAMRecovery. And. Hardware. Service/Core.

Invoke-Mbam-Client. Deployment. ps 1 –Recovery. Service. Endpoint https: //mbam. contoso. com/MBAMRecovery. And. Hardware. Service/Core. Service. svc -Status. Reporting. Service. Endpoint https: //mbam. contoso. com/MBAMCompliance. Status. Service/Status. Reporting Service. svc -Encrypt. And. Escrow. Data. Volume -Encryption. Method AES 256 Wait. For. Encryption. To. Complete

As Easy As 1… 2… 3!

As Easy As 1… 2… 3!

§ § § MBAM agent works its magic

§ § § MBAM agent works its magic

§ § rights

§ § rights

Read-ADRecovery. Information -Server contoso. com -Credential $cred -Recurse | Add-Computer. User -From. Computer. Managed.

Read-ADRecovery. Information -Server contoso. com -Credential $cred -Recurse | Add-Computer. User -From. Computer. Managed. By| Write. MBAMRecovery. Information -Recovery. Service. End. Point https: //mbamiis. contoso. com/MBAMRecovery. And. Hardware. Service/Core. Service. svc

Read-ADTpm. Information -Server contoso. com -Credential $cred Recurse | Add-Computer. User -From. Computer. User.

Read-ADTpm. Information -Server contoso. com -Credential $cred Recurse | Add-Computer. User -From. Computer. User. Mapping (Import-Csv Computer. To. User. Mapping. csv) | Write-MBAMTpm. Information Recovery. Service. End. Point https: //mbamiis. contoso. com/MBAMRecovery. And. Hardware. Service/Core. Service. svc

Advanced Helpdesk Enters Recovery Key ID Helpdesk User domain and user name Enters Recovery

Advanced Helpdesk Enters Recovery Key ID Helpdesk User domain and user name Enters Recovery Key ID Self Service Logs into domain joined PC Windows Integrated Auth Provides Recovery Key ID

User hits Bit. Locker Recovery Screen Recovers key from SSP or helpdesk portal Key

User hits Bit. Locker Recovery Screen Recovers key from SSP or helpdesk portal Key is marked as disclosed MBAM service wakes up and detects key was disclosed Checks if TPM is locked out Automatically unlocks if MBAM has TPM Owner. Auth Audited in client event log and MBAM audit reports

§ § MBAM 2. 5 SP 1 makes it even easier to deploy and

§ § MBAM 2. 5 SP 1 makes it even easier to deploy and manage Bit. Locker on your devices

BRK 3340 App-V 5. 0 SP 3: Advanced Connection Groups Thurs 17: 00 BRK

BRK 3340 App-V 5. 0 SP 3: Advanced Connection Groups Thurs 17: 00 BRK 3317 Creating a Seamless User Experience with Microsoft UE-V and Windows 10 Fri 12: 30 BRK 3304 Managing Windows 10 Using Group Policy with In the Box, Microsoft and 3 rd Party Tools Wed 9: 00 BRK 3144 Microsoft Office 365 Pro. Plus: Have It Your Way! Fri 12: 30 BRK 3868 Fundamentals of Microsoft Azure Remote. App Management and Tues 13: 30 Administration

http: //myignite. microsoft. com

http: //myignite. microsoft. com