Thứ Sáu, 25 tháng 1, 2019

Waching daily Jan 25 2019

Hi my Magic people! Today I will introduce you to the Mobile Lightroom app

and show you how you can edit photos even if they are taking just with your

smartphone and get some stunning results without having the desktop version

personal item now watch your mobile is a free app

however there is a premium version with some extras which can which you can get

for about $10 a month subscription so let's open the app and let's import some

photos to keep things organized let's create an album first in which we'll put

our images now give it some name open the album and it's some photos from your

device

you can see here how you can filter your files to show only JPEG and PNG or only

rolls first I will import one photo in RAW format and then I will add some

JPEGs

when you import your photos to the album you will find them under the all photo

section here too now when you're done importing let's get to editing I will

choose this photo that maybe looks the worst here to show you how much you can

actually improve it isn't white trim first you can see on the bottom we have

a lot of editing tools and here is a helpful one-click tool that will set

some adjustments automatically which I will use just as a guide to edit my

photo further now let's go set the light of our photo I will bring the exposure

down a little bit turn the shadows up so as the contrast

and now let's play with colors I will give it some warm tones by bringing the

temperature up and turn the vibrance and saturation a bit down now I want to get

the moody look on the sky and make it pop so I believe this selective editing

here so the remaining parts of the photo staying untouched now let's put the

gradient mask here in the sky and now we can edit only this part of the picture

now put exposure down to make darker add some contrasts bring the highlights a

bit up and the shadows much more down

also bring up the whites and get the blacks down so the sky pops out even

more here you can also change the colors but I will leave it like that for now I

just want to say the higher clarity here

there are also posts for noise reduction and sharpness to the picture and some

other adjustments to play around if you want

now when the sky is done I will show you how you can remove some unwanted objects

from the photo with a healing tool you can also use this tool on portraits to

remove some blemishes and imperfections on the skin I will use the clone stamp

tool here to remove this object from the photo by cloning some other part of the

picture I just brush the object and you can see how the program automatically

clones the grass on this part of the photo now here is the crop tool so you

can cut unwanted parts of the picture out and there are also some different

Adobe profiles you can apply but I won't do this right now I want to adjust

curves on the photo here you can play around with the red green and blue

channels and I will try to achieve a bit of faded look here by adjusting the main

curb like this

now did you know that you can set the each colors hue saturation and luminance

I will play around with the settings a little bit to achieve a more on some

work on this bottom

okay now let's bring the clarity over the whole photo up to give it a more

strong look there are also tools for sharpening reducing noise on the image

but I will leave the settings as they are because I think it looks fine you

can also use these tools which can help you to correct the horizontal and

vertical eyes on the photos now the last one is my favorite those are electron

presets which can speed up this whole editing process very much you can save

all settings and adjustments you made with one photo and apply to many other

photos as well with just one click let me show you by applying some of my

presets on this image I like the natural tones version 3 but since I was going

for a more full look let's just version 1 on this you can see it's a bit too

dark so I will just correct the exposure here and set the hue of the greens to

more yellow ones

when you're done stating all the adjustments you can save them by

creating your own preset and apply later on other photos is now

and the last step I will do is just to save an image to my device now let me

show you before and after editing you can see how you can turn some basic

photo to a nice one which will pop and deserves publishing on Instagram

Facebook or any social media you are using thank you for watching this

tutorial hope you find it useful in some of my next videos I will talk more about

lighting presets and show you how you can import it and use it on your

electromobility bye

For more infomation >> How To Use Lightroom CC Mobile App | Tutorial - Duration: 7:56.

-------------------------------------------

Fuller Brush Co. Electrostatic AllSurface Sweeper - Duration: 13:34.

For more infomation >> Fuller Brush Co. Electrostatic AllSurface Sweeper - Duration: 13:34.

-------------------------------------------

How Microsoft is modernizing device management - Duration: 1:16:49.

(music)

>> Hello everyone, and welcome to today's webinar

on how Microsoft is modernizing device management.

My name is Mayunk Jain,

and I will be your host for today's session.

I'm a Senior Product Marketing Manager for Microsoft Intune,

and I've been with Microsoft for about a year now.

Before that, I've spent over 10 years

in the end user computing space

in various technical marketing roles.

With me here are Mike and Carmichael

who will be happy to introduce themselves.

Let's start with you Mike.

>> Hi, Mike DeGooyer,

I'm a Senior Program Manager here at Microsoft.

I've been here quite a while about 17 years actually,

and been in various roles from data center to client, etc.

But the last 10 years,

I've been focused on client management,

everything from the release of SCCM

to the release of Intune at Microsoft

and rolling that out across the company

to cross platform and lately focused on security in Intune.

>> Yeah, thanks for coming over and joining us--

>> Yeah.

>> The digital security risk and engineering Team.

>> It's been good. >> Nice.

>> I'm Carmichael Patton.

As I said I'm on a digital security risk

and engineering team.

I'm on a team called Emerging Security Products

where we focus on how we can fill our control gaps

in our security environment to sort of fit that

need where we have the gaps there.

I came to Microsoft about three years ago.

My focus was to actually look at how we manage

our non-Windows environments.

So how we manage Mac, iOS, Android.

and potentially even Linux in the future maybe.

>> Linux, we'll talk about that a little later.

(laughing)

>> Think so. >> Nice.

>> Thank you guys.

So before we get started with the presentation

I'd like to let you know that you can submit

your questions into the ON24 dashboard

at any time during the conversation.

We have peers ready online to help you answer them.

And then we also collect a few to discuss

during the session or in the Q&A session

after the presentation.

In case we run out of time and can't get

to all your questions.

We will stay behind in the studio.

I think all of us can stay behind

and then post them with the On-demand webinar.

>> Yeah, for sure.

>> So, and then in the end I think we can wrap up

with some key recommendations to get these guys started

with their deployments.

>> Definitely.

>> Awesome.

So let's kick it off then.

>> Sure.

Let me kind of walk everyone through kind of

where we're gonna head first.

We'll talk about a little bit about our environment,

kind of just a level set.

Because a lot of people when they think about Microsoft,

they don't really realize how,

you know, you mentioned Linux, iOS, Mac, Android.

We have a huge breadth of devices at Microsoft

so we kind of want to walk you through to level set that.

Then we kinda wanna walk through

some of the management structure in what we're doing.

As well as some of the architecture with EMS

and how we're kind of arranging what we're thinking today.

As well as where are we headed?

I think that's part of the really key conversation today.

Where are we headed with Microsoft as an enterprise?

And what are the challenges we're seeing?

'Cause I think we're a lot similar to a lot of you guys.

And then walk through how that dovetails into EMS.

'Cause really it comes about how are we gonna

use our products the most effectively, right?

How are we gonna look forward?

And then kind of talk about the modern management scenarios

that we're, you know, head deep today.

That we're driving.

So with that we'll kick it off.

Carmichael, if you wanna walk us through

kind of, our environment today.

>> Yeah sure.

And I think one of things you just said Mike

is really important because, you know,

while we are Microsoft,

we're actually just an enterprise like most other people.

Where we are using Microsoft products

and trying to figure out how to do that

in their most effective way.

Some of the key information we have up here.

We have about 135,000 employees.

And most of those folks have multiple devices.

You know, they're managing their iPhones

or their Android devices.

They have laptops, maybe they even have some other systems.

Maybe working from home or something like that, right.

So it's key to understand, sort of, the environment.

Looking at it, we have about 2.6 million

transactions per day on our sales platforms, of course.

The 380,000 devices hitting our network per month.

That's coming in through either on-prem

plugged into the wire ports,

or in our wireless environments as well.

So if you want to jump over to the next slide

let's talk a little bit about what we actually

have as far as devices.

>> Sure.

>> Because I think it's super important for us to sort of

understand, you know, we aren't just Windows, right?

I mean like I said I came in about three years ago.

Because we had a standard at the time that basically said,

thou shalt not have.

And I think there was some rumors going around about

maybe some executives that didn't like

some of those competing fruit products.

>> I was here for those.

(all laughing)

>> So you know, it's understanding that our environment

isn't just Windows and you can see here,

this is just our managed environment.

We have about 100,000 iOS devices.

I mean, just think about that.

We have 135,000 employees,

and we see these multiple devices.

So clearly the numbers don't add up

when you look at iOS and Android.

Because we also have vendors.

We have partners that we work with,

that are actually leveraging our management platforms

as well, to ensure that that data that we're really wanting

to protect is protected.

>> I was gonna say just that on the previous slide

we didn't mention the vendors,

but just to be clear, you know, we actually have

about 230,000 people connecting to our resources

at any given time.

>> Exactly.

>> So while we have the secure 130,

that we really want to focus on,

it's really about 230,000 people

that are actually connecting at any given time.

>> I think the one thing we'll also point out

is we still have Windows Mobile on the list

that we have to worry about, too.

>> We have to have a few of those. (laughing)

>> And I love the fact that we are

our own biggest customer almost, right?

It almost feels like, I was sharing with you guys earlier,

that being in marketing, the stuff you guys put out,

the IT Showcase Whitepapers, the webinars,

are our number one asset.

So people really love the fact that we can actually

eat our own or drink our own champagne.

I think that's the right word. (laughing)

>> Is that the new one? Drink our champagne.

>> And at that scale.

So it's amazing, fabulous job.

>> So, I think what we'll do then is let's move

into how we actually are looking at this from an initiative

towards moving towards modern management.

>> Sure I wanna,

let's kind of introduce, there are four kind of key things

that we're working on right now,

that we'll talk about.

First is remote users.

So what people don't realize is in a shift of mindset,

we made the assumption probably three years ago,

to just say look we assume that everyone

is gonna work remote.

We want you to work remote.

We encourage it.

We tell people to work from their home office.

But that changes the construct of

how you're going to manage them.

If you're sitting at home and you're working on your PC,

what does that look like?

Does it need to be Intune enrolled?

Can we apply policies to just secure that device?

Can we just provide a browser experience?

But first and foremost, we want people

to have that remote experience.

Because whether you want to as an enterprise or not,

people are gonna be connecting from their coffee shop,

from anywhere, McDonald's.

They're just gonna be working from anywhere.

>> Well you know, we're gonna get that

Brett Arsenault ask one of those moments,

where it's seven o'clock at night,

and your boss calls you and said, by the way

we need that slide deck.

(all laughing)

>> That happens here.

With that we kind of have created this Internet-first,

and you wanna just mention the Zero Trust Network?

>> Yeah I think, you know, again

sort of, as Mike said, you're gonna be working

from all these ubiquitous environments.

It could be at home, it could be a coffee shop,

it could be at grandma's house,

and you're getting that, sort of, last minute request

where you need to get access to something.

I think for us it's not just ensuring

that you have that capability to open up Office,

but for moving that paradigm to the, are you really

allowed to do that on that device that you have, right?

>> And how are we controlling

what's on that device? >> Exactly.

And so using that identity as the boundary,

in saying okay, you know Mike is logged in at this location.

Does he have access to that data?

And does he have access to that data from this device?

So creating that, sort of, maybe not necessarily

in the traditional sense of Zero Trust

from a networking isolation perspective,

which is a layer of it.

But just the identity and the device health

is the other piece of that as well.

>> And then we get into, how do we modernize apps?

So we're no different than anyone else.

If you look at our LOB platform,

4,000, I mean at one point we had 7,000 apps, it was crazy.

We still have thousands of apps more like 4,000,

depending on who you ask around here.

But one thing we've focused on

is moving all of that to the Cloud.

Now re-modernizing everything?

We're trying to.

But even for us it's a journey, right?

We have things that are enabled for on-prem.

And now even, from a modernization standpoint,

what we're doing is we've actually peel back the onion

a little and we're saying, look there's certain things

that need to stay on-prem,

and there's a few of those.

And then there's some things that actually need

to be on the internet and most of those are moved over.

But ideally we're trying to move everything

so that it's consistent with our management platform.

So we have the controls in place.

>> And I think it's important you mentioned the 7,000 number

and that's just line-of-business internal apps

that we use here at Microsoft, right?

>> Right.

>> Some sort of an enterprise perspective.

And that number, while it isn't 7,000 in the Cloud,

I mean a lot of that has been deprecated

because of just legacy apps,

that maybe we just have lingering around for a while.

But a good portion of that has actually moved up

to the Cloud today and is being run

from the Azure platforms.

And I think the last number that we actually have

is about 70 apps that are still sitting on-prem

in an environment whether because they're just so old

and legacy but they still have that data that we need.

Or if they just can't modernize it for whatever reason.

And so it's what's important especially

we go back to the sort of thinking of the Internet-first

which is okay fine those apps have to stay on-prem

but how do I still give that experience

when somebody is remote to be able to access that app, so.

>> You got to look at the cost of that right?

>> Exactly.

>> To me it's also a cost decision.

If you're going to modernize, how much development

is that gonna to cost you?

And then how, what's the value?

If you have a 550 person application is it really worth,

>> Right. >> you know, investing in.

and so a lot of ours have transitioned

I think Power Apps for example.

We've moved a ton of apps to the Power Apps platform

and that gets us out of kind of micromanagement

of the app itself 'cause we just put it in the container

and we're good to go.

>> Don't forget to do your time away which

you can do through Power Apps for your vacation.

>> You're right.

(all laughing)

And I think of a theme that comes up

especially in our conversations is Internet-first

doesn't mean internet only.

>> Correct. >> Right.

>> So a lot of people kind of assume oh my God

I have to modernizing means I have to abandon

everything I knew that's not true,

especially with Microsoft.

You stay I believe with what you have.

You just tried to think of the reality

that today everything is Internet-first.

Taking care of the fact that you also have a lot of stuff

that is not yet entered on the internet.

>> Yes we have to be beyond just those 70 applications

we have our high risk environments.

And so protecting those with what

I think publicly we call them the PAWs,

the Privilege Access Workstations.

We internally we call Secure Access Workstations.

So there's a workflow that even goes beyond

just these regular devices that says you have

to be on a fully managed device

that we control the images on.

So to your point right.

So not everything will be extended to the Clouds.

We still have to have that gateway where they can be remote

but we know that that is an absolute trusted device

that they're coming in from.

So good point.

>> That kind of gets into kind of the last bullet

that we'll talk a little bit more in depth here

about which is like kind of that co-managed scenario.

If you think about the SCCM plus Intune

there's a lot of enterprises,

they have infrastructure costs,

they have some cost that they're basically

gonna be in a co-management state because to be honest

some of their workflows don't make sense

to move to the Cloud.

And so it just like us we're in a co-management state

with SCCM and Intune.

We're gonna be there a couple of years, several years.

And so I think as people kind of go through this evolution

it's really they have to be really key on what resources

need access to what other services et cetera.

And not try to kind of go too crazy just take it slowly.

>> Yeah exactly.

'Cause I think even if you think about

some of the capabilities we have to do on these devices

from patching to policy management

some of that stuff we still have to do through

the legacy systems to try to bring that forward

into the modernized environment, right?

>> And I think it's more of a mindset.

You have the Cloud first or the Internet-first mindset.

So you you do everything with that in mind

that doesn't mean you have to just change the tools

as much as you have to adapt to the new way of servicing

which just perfect yes.

>> So one of things we wanted to talk about

is sort of what this looks like.

How the workflow goes, and we actually leveraged

the next slide from our partners over here.

To sort of define that, we called the identities

the new boundary which is using that user on that device

and identifying both of those to ensure that

they have the access to do it.

So I can be in that unprivileged network environment

and I could be, you know, at Starbucks

or at any local coffee shops

and I could be logging into my machine

to try to get to a Word document that I need to go edit

so make sure we have the latest version

of what we're working on for IT Showcase.

So I get that MFA check right.

So for us, the first foremost is identifying

who you are and validating that with that MFA.

And then we bring in that sort of condition of the device.

Is it healthy?

Can it access the data that it needs to access

so you know using the various conditions

through conditional access, location, device, user,

what the application is they're trying to access.

And then if they're allowed we'll let them through.

And I think one of the tiers also here

is sort of that on-prem environment, is there's

also that Azure App Proxy layer to right

where, you know, maybe the application itself

is being proxied then through that

to the on-prem environment.

So still doing that conditional access evaluation

on the device itself and then carrying that through

with the layer to ensure that they have access to the data.

And I think the key here though, also is that

it's a continuous check.

It's not just a one time you're coming in

and we've validated you at that one time

maybe the device becomes unhealthy while it's happening.

And so you're still connecting but we're doing

that continuous check to actually validate that

that device is still healthy to connect without having

to necessarily force that re-authentication to do that.

So kind of a nice little workflow

that our friends have created for us to do that on so.

>> So I love that you're focused on the identity.

'Cause I think that's something that a really clear message

people need to adopt right?

For years in IT and in this industry

it was protect the device, protect the device.

Oh the device has to be secure.

We're so beyond the device.

The devices are pretty much secure.

I mean most devices come encrypted

whether it's mobile, whether it's a PC

they come encrypted, they come set, you have your policies

and passwords and everything else.

So from a security standpoint,

it's about the user and in the second layer

it's gonna about the data.

So, don't worry about the device anymore.

If you're still worried about the device

you might want to rethink that strategy

'cause you really need to move beyond the device.

The device should be agnostic

as we've talked about in the beginning.

If you look at all the platforms that we have,

we have users of Microsoft on every platform.

They're on Android, they're on iOS,

they're on the Mac, they're on the PC,

they're on a surface device they're all over the place.

>> And I like the nuance of making sure

we understand exactly what we're trying to protect

which is that data element that they're trying

to access through whatever application

they're trying to access it, right?

So and then we'll talk a little bit in a bit

about how the sort of ecosystem, maybe MS, comes together.

But when you look at like AIP

or Azure Information Protection rules

or Windows Information Protection.

Is that device allowed to access that data?

And is that user allowed to access that data, right?

I mean that's sort of to your point, right?

Do I have the identity of both of those device and user

to ensure that they can access those elements?

From the device that they're on

Because, I mean we've all got a phone in our pocket

and we've all got laptops in front of us

and I think back in my office I've got other laptops

and back at home I've got my home PC,

but which of those devices

am I allowed to connect to and I connect to, so.

>> All of them.

(all laughing)

In one way or another. >> In one way or another.

>> And the user is really the weak link

in this because you could have the most secure device

and the most secure network.

But all it takes is a user with password 123

as their password.

And you've exposed the whole organization.

So you need to go beyond passwords,

you need to go beyond just that credential check

to really give security to your point.

>> Yeah I think there's another webinar coming up

for password less right. (laughing)

If there isn't we should schedule that.

>> Pluggign in everything they've got.

(all laughing)

>> And this is kind of,

Carmichael will talk a little bit about this.

This kind of talks about how we look at the ecosystem right?

We think of it as a three-legged stool

with information it set, but we can kind of walk through

each one of these pieces.

>> Yeah I think, just to your point,

let's focus on the stool for a second.

Because for us within Digital Security Risk

and Engineering DSRE, we really take that approach

of understanding what the risk of the environment is.

>> Right that's the platform layer.

>> Right, so that's the platform layer.

What is it we're trying to protect?

And we've been talking about the data

that's the information protection layer, in it I think

to be clear when we say that information protection

it's not just Microsoft information, right?

'Cause we have access to customer data

but some people have access to customer data.

So there's there's just not just ours

but it's other people's information

that we're trying to protect as well.

>> Also their personal information.

>> Exactly.

(all talking)

>> Users freak out if you try to mix that information.

I think if there's anything that we've learned

with rolling out conditional access for example here

is, people are super worried

about the separation of your personal data

versus your corporate data.

That's not clear.

So that information protection is absolutely.

>> Especially when you're touching

their personal device like a phone right.

I've taken it I took a picture of us before

we got on here right.

And let's say that was a picture of the family

I want to make sure that you guys aren't taking that.

Or we are not taking that picture, right?

So, then you know, so using that risk management foundation

and what are we trying to protect is the information

as Mike said we have those three legs of the stool.

And each of the three legs are super important, right?

So the device health which

we see on the rest of the slide here.

We'll talk about in more specific

especially as we go through the slides

but the identity management tier, right,

you mentioned it Mayunk.

Which is really understanding what we have to do

from an identity perspective,

including MFA on these devices.

to ensure that you are who you say you are

when you're authenticating through that thing.

And that you are continuing to be who you are

not just the one shot deal of applying that logic.

But then the really, I think for me,

the foundational piece of that, of the stool here,

is really the data and telemetry.

If we have to be able to understand

not the data that we're trying to protect

but we need to be able to see who's using what devices.

How often are they being used?

Is it being used in a healthy way?

And then just getting telemetry across the other systems

and we'll talk again about sort of the EMF suite

but if I have advanced ran analytics

looking at all those logging events.

If I have Azure Information Protection

ensuring that we are classifying those documents

in the right way but if somebody

downgrades a classification.

Why did they do it?

They were actually writing a recipe for something

and then, you know, sort of making sure.

>> People are never making so many classifications,

do they?

>> They have never.

I mean I think my recipe is highly confidential personally.

(all laughing)

So again if we look at the device health portion

of the slide, right?

Just look focusing on that one leg here

you know, again making sure that

we have up to date operating systems

on all of our devices.

You know, whether that's through

the Windows Update Service

to update our machines on the Windows devices.

But also ensuring we have those updates happening

on both iOS and Android.

And especially now as Android's moving in towards

more of a monthly security patching cycle.

How do we ensure that those security patches

are being applied?

So we make sure that that device is as secure as it can be.

And then as we sort of move around the circle right?

Malware protection and understanding what could be happening

on that device and ensuring we have at least some visibility

into the telemetry on that device

to understand if there's something there.

Encryption you know latest apps to make sure we have

those updates that kind of goes in line with the updated OS.

And then again that integrity and conditional access piece

that we'll be talking about throughout this presentation.

>> And how it all works together

in the sense of you're using all these signals

that you're getting from different places in one place.

>> Exactly.

>> Unlike, you know, what I like about that stool

was that it's all connected.

It's not an Ikea box

where the legs are all over the place,

and you got to figure it out like how do I make the stool.

>> By the way, we did test and a three legged stool works.

(all laughing)

>> So even the Ikea stool is great.

I have one myself, I'm new to the US, by the way,

I don't know if I shared that.

But at the same time you have to set it up right.

And if you can buy one a stool that just is connected

to each other, the legs are connected to the place you sit.

That's how they all work together,

and I think that's something really powerful

about a solution like that.

>> Exactly. >> Absolutely.

So let's dive a little deeper

and kind of talk about kind of the health aspect.

Carmichael you mentioned a little bit about

the secure admin workstations

and what we're doing there.

But really when it comes down

to what is Microsoft's posture today?

Like what do we tell people?

We're pretty much a your device should be managed shop.

You know, while there is MAM

and some other policies that we use to apply

in different scenarios.

Really we want your device to be enrolled.

Now with that it's a little bit complicated.

If I'm honest here,

there's a lot of personal devices in separating

that personal information.

And then like right now we're running into scenarios

where there's a lot of people

where they'll bring their personal PC

and just enroll their personal PC

just so it looks to us like a corporate asset when it's not.

And so I think every environment,

I think as users just become more accustomed

to enrolling their device.

I mean enrolling device is pretty easy, Settings,

Work Access, boom, you're in.

>> I think it's a, you know, you mentioned MAM,

and before we got started here Mayunk,

you were talking about the poll

that the Intune Team put out on Twitter.

>> Right.

>> Which is a super interesting conversation

'cause Mike you touched on a little bit,

which is for us full device management

is really our focus.

If we can't trust that device is what it is.

And the person that's using it is the person that they are.

That's sort of our foundation, right?

But then in order to protect externally the application.

So if I'm at my house and I pull up OWA on my device at home

that if I you know starting to read an email

but I want to open up the attachment

that you know it's comes back from a MAM policy

and says hey no I'm sorry you have to be managed.

And then it walks me through that management workflow

or at least ask me if I want to be managed

and at my home PC.

>> Of course you know.

>> So. (laughing)

I like a little separation personally you know.

But then the I've just reach down into my bag

and grab my my work laptop and go from there.

There's I mean I think that that idea of having this

again the foundation of the full device management

with some of the capabilities we need to bring in

and by the way that the polls still open

so if you do want it

go to the Twitter account. >> It's open yes.

>> I've been plugging stuff.

So the next thing to plug is our Twitter IDs.

So mine @mayunkj, MAYUNKJ and that's where the poll is

and then you have the MSIntune @msIntune

which also has that.

So it's interesting that even if you're not

blocking it at least you can allow it restricted access

where you're like saying okay.

I don't know you.

I don't know if you're exactly who you are.

But at the same time if there's something not

super critical if you're just checking email, go ahead.

But if you want to download the attachment

or do something with that maybe not.

>> And that's where I think you need

to really look at those policies,

like what are you really trying to protect?

>> Right.

>> And if you have the information protection policies

in place that really, really helps.

So we're going through a whole process here right now

to basically say look, how do we categorize that data?

And more importantly how do we take some of that

out of the hands of the user?

Because let's be honest users are never gonna,

they are never going to categorize

100% of the data correctly that's just not.

If you think that's gonna happen that's not a reality.

So you need to just put those in place

so that you can say look if I'm looking

at the data that's inside the SharePoint

then I can actually market as this is secure.

This is high impact.

This is HBI whatever you want to call

it in your environment.

And then you can actually manage that accordingly.

So to me that's super important.

>> You mentioned HBI just as an aside

we built you know we've been sort of working

with the Azure Information Protection Team

and of course we had to change the classification

to mirror what was there.

So Mike mentions the High Business Impact

but now it's highly classified, classified and down.

So by default all documents that we create

are tagged as general, right?

So if you're going to open up a document

and start working on it and then on that layer,

then you have to sort of make that idea

that thinking in your mind to say

you know, am I creating just a document that

I want to send to my family?

So maybe I make that personal.

Is this really business related

and how far into the business is it related?

So is it highly confidential?

And I know there's different tiers of what AIP means

in this environment.

When you're deploying it depending on what level of

licensing you have.

But you know of course we're on the E5 skew,

and being able to do some of the additional things

that we do there.

You know creating special words that say

you know this code word is something that

we need to protect.

So if I ever see that code word used in a document

then make sure that that's highly classified

and only FTE, only this particular group of individuals.

So getting into that granularity is something you have

to be cognizant of when you're planning

that strategy around the tagging so.

>> And as an end user I see that myself all the time.

I mean when I work, I work a lot on Roadmaps.

So as soon as I'm working on something

and you know it says obviously, planning for the Roadmap,

it automatically pops up this thing saying,

you might want to turn this into classified

or a confidential document.

So I see that working for me every day.

(laughing)

>> You don't want to share the full Roadmap

for intent with the world?

(all laughing)

>> When it's ready, right?

When it's ready. >> Not yet.

>> When it's ready yes. When it's ready.

>> That's a good idea.

>> Everybody want's to know the Roadmap don't they?

>> Yes, So the goal state Mike what's that?

>> Yeah let's talk about our goal state kind of

where we want to head.

The first is, we're taking a hard

look at our network boundary.

And so something kind of new for us,

not necessarily new for us at Microsoft

but some programs that we have here.

Is we're trying to take a step back.

You know we mentioned in the first

kind of couple of slides that we're Internet-first.

And so I've talked to a lot of different companies

where they're going down a similar thing

to say look if you're in a small office

you have five, six, 800, 1000 people.

Do you really need your CorpNet connectivity.

And our answer is no.

We actually don't want that.

So we've been peeling that that back that layer

for quite a long time.

And so we just look at from the network side

even if you look at our CorpNet,

Carmichael, you mentioned the

the high risk environment, right?

What we see if you look way in the future

our high risk environments are the ones that are gonna

be on the CorpNet.

And so we'll pull that back, everyone else

you should really be coming from the internet.

There's really as we move things

to Azure as all the Cloud services are there,

as all the apps are there.

You really do not need to be on the internet.

Or You don't need to be on on our corporate network.

>> You just mentioned now you just moved to the States

and I think one of from a geo location sort of perspective

we don't necessarily think about

until you realize you work for a global company

is the network bandwidth that are different places.

So maybe I don't need you to backhaul across.

You know if you're in some remote location

say in Africa, backhaul to Dublin

And then coming in to Redmond

to get your data.

Maybe I just need you on the internet

with a point where you're actually local

and you can get a better bandwidth

a better experience, right?

At the end of the today, I think we have to balance

that tier of security versus user experience to you right

to make sure that we have

we're not impacting them in a way that it makes them

not able to work but we're still ensuring that

we have that protection

that moves them forward into doing what we wanna

make sure that we do.

>> And this might a good place for you

to maybe explain a little bit more about

Zero Trust Networks.

You mentioned that earlier.

Is that a concept that applies here

about internal threat verses external threat.

You know and how we just treat everyone as an outsider.

Even if they are internal users.

>> It really comes down to you know I said

it's not just the sort of the legacy networking mindset

of what Zero Trust is where it's that network isolation

of your environment.

But it's ensuring, and for us I think the way

we more think about it is managed verses unmanaged.

And what's the tiers of management that give me

the right user experience with the right security controls

on top of that, right?

I think what I like about working with Mike

recently, not that I haven't liked working

with you for a while.

>> We've been working together for a long time.

>> He came from the User Experience Team

or the End User Experience Team.

And so now that he's in security

he's bringing that experience with him.

To say you know hey guys here's a security control

that we have that maybe we need to make sure

we understand what that full experience is.

So taking this list of controls that I say

I have to do on these devices and applying that

to that user experience but again thinking about Zero Trust

in the way of managed verses unmanaged.

That's not just you know devices it's user experience too.

>> And It doesn't matter where they're coming in from, right?

So unmanaged verses managed, I could be managed

or unmanaged on the CorpNet that doesn't matter

your policies will decide the level of access that

I have as an end user.

>> Right, 'cause you know maybe everything

I access as an information worker

or a sales pro if I'm out in the field everything

I'm doing is you know Dynamics 365.

It's all Cloud enabled.

I don't have to be on-prem there could be.

We talked about Secure Access Workstations

which is our admin level.

But maybe there's some financial data

or some like that that was within Corp.

So I had to give that experience again,

so where it's looking at that not

just the the network boundaries,

but the app boundaries as well.

So, right.

>> And one thing that enabled that kind of

walking through the slide here is we have

kind of built a robust reporting solution.

And so using Microsoft tools we've been able

to actually really develop

you know, what does it mean to look at the device?

To look at the health of the device?

To have that reporting in the back end.

'Cause really you want to rely on that back end

reporting solution to drive the behavior.

So everything from our service operations

to the health of the app, to the health of the device

all of that with those checks that are in place.

And then that comes to where we are today.

So you think about we're at today.

We have conditional access released.

>> We do on what platform?

>> On iOS and Android, soon to be more.

but it's been a journey.

So you know I mentioned one of the just to bring

you guys into kind of Microsoft.

One of the big challenges we had remember

is the personal versus corporate.

Right? >> Right.

>> And so remember in that first slide, 130,000 employees.

But the device count way higher.

So what does that mean?

We have a lot of people that that are vendors

that have their devices enrolled because

they want access to data.

So that kind of has helped modify and helped drive

our kind of conditional access model

in what we're building for people.

So in general, but if we don't know you,

if we don't know your device,

you're not getting access to resources.

That's really the point we're driving toward.

And then if you think of it from a next steps,

like where are we going from here?

Really, I think as I took over

the conditional access EPIC

for our team when I moved over a couple of months ago,

to our security team.

One thing is, I think,

I hear people talk a lot about conditional access

in what we're driving.

And so many people think about this

as a point in time experience.

And I think that mindset needs to shift.

I'm trying to shift that in our current organization

to say look, conditional access

is not the enrollment of a device.

It is the ongoing service.

You know, you mentioned OS updates in managing the device

and all the pieces the AV that have to be on that device.

If you're looking at conditional access as a service.

It means I'm looking at the new functionality

that they're putting in Android P, Q,

whatever they're on to next.

And I'm looking at the hardware that's coming out

with Samsung and other manufacturers.

And I'm saying look if there is a new security bar

for a platform be it Android,

be it iOS, be it Mac, be it Windows,

then I want to adopt that.

And when I adopt that that means my bar just got raised.

So I'm no longer gonna say

for example, older Android devices

that don't support certain hardware-backed encryption.

Guess what?

I ratchet up, you're out of the network.

That's a service, that's not a point in time.

That's a sorry you're on an old device.

You're gonna be moved off that device.

>> Well, I think that's important, right?

Because maybe we didn't have those controls

a few years ago in Intune

and we do have that capability now

to do minimum OS and even to be you know

manufacturer devices and stuff like that

to ensure that we are again locking down

to use that term the device types that

we're using in the environment.

So which is really important and a great feature

from a perspective of entrusting that device

to be able to access that data.

>> And also giving people or giving the end user a way

to remediate that condition.

A big chunk of conditional access,

is not just blocking stuff, but also saying,

giving a very friendly path to the end user

to say okay, this is the reasons that you've been blocked

and this is how you can remediate yourself.

And then to your point about not being point in time

as the conditions change,

that's when it will automatically evaluate.

Okay now you've remediated what

it was an update that you needed to do maybe.

You did that update, now you're back in without having

to call help desk, without having to visit

the tech link or anything like that.

>> Exactly.

>> And we've noticed our users are getting

a lot more familiar with that experience.

If you think about kind of the password list key experience.

I always relate this when I talk to people

I say, "Hey, do you use online banking?"

And they say "yeah."

I say, "Okay well, when you use online banking

"you have to have a key on the device."

Usually you have to view a picture or something

you have to put a pin.

You have to have a password.

You go through like three or four checks, right?

Well, our data is just as secure and just as important.

>> Maybe more. >> Maybe more.

So, people are getting familiar

with that experience right.

>> The marketing slides are really important.

>> Yes. >> Yes.

(all talking)

>> Let's shift a little here and just talk about

we're kind of wanna walk through

the management architecture.

This will be a little quicker conversation

but in terms of Configuration Manager plus Intune.

So if you think about that plus Cloud experience.

Where is that Cloud benefit?

We're in this mode today.

We're using Config Manager plus Intune

and we're gonna be there for several years

like any other service and infrastructure.

We have costs they are there

and it serves a secure purpose.

So even as we look long term

as we look at our HRE environment, for example.

We're gonna use System Center and use management

for those devices.

So we have Intune today, that's our primary.

Well from a PC perspective, one of the things

from a strategy perspective, we're moving toward

is Azure domain joined.

So we're going away from classic domain joined.

We've been on that road for actually a couple of years.

And what we have how many devices?

Even under management we have what 35,000 devices

in the Azure management stack already.

So we're well on our way to that.

So essentially we are going with

Configure Manager plus Intune.

And we also wanna be there to help our customers

'cause we see this model as the majority of enterprises

are gonna be in for a number of years.

>> And I think one of the good things is it's goes back

to sort of that experience too, right?

Because if I am Cloud enabling users out in the field

to do stuff, having to figure out how to get to an on-prem

Corp environment to AD join your device

to get access to data, doesn't always work.

Especially we talked about sort of that field scenario

we will in sort of move away from having them come

all the way across the globe to get to some

authentication mechanism.

So having that enabled

so I can do that out-of-box experience.

Not necessarily 'cause I've got my Christmas present

I got the new Surface Pro 6 or whatnot.

>> And every three years you will.

>> Right.

Even if I had to reset my workstation, right?

>> Right.

>> To your point on, sort of, the service calls.

If I hit reset on my Windows box

because I'm having some issues.

But then having that experience at that

Azure Active Directory Domain join level,

to apply the conditions that I need to apply to that device,

to make sure that it still has what we want from

a security perspective on it.

Where I don't have to be you know again we still have

those environments where we need to be on-prem

with you know whatever that data is

whether that's the or some other confined device

that says you still have to be there,

it still to be to be domain-joined,

still have to get the policies through Config Manager.

>> Yeah, when I see that architectures slide

that you just showed.

I mean when we talked to customers at the EBC

and when we're meeting customers all over the world.

It's not very different for them that reality

of that architecture slide is very similar

for our largest customers.

And also our smaller customers

just like it is for Microsoft.

So it's a reality that we're here

and they're designing, they're building the solutions

to address that reality of it will never be internet only,

it will never be on-prem only,

but it'll be a mix of the two.

>> Well I like that, exactly, we call it Internet-first

because that's the first point that we wanted

to come through, but there may be additional points

that you have to come in through after.

>> Absolutely.

>> And I think I stole your thunder on the next slide.

>> No that's all good,

I think we touched base on quite a bit of this

that security management, that self-service experience.

Really more users are just getting more familiar

with how to operate.

And that's one thing I wanted people at least

our audience to think about.

Traditionally a lot of people just from an enterprise

perspective have this of listen,

I have to hand-hold my customer.

I have to hand-hold, I have to white-glove treatment

with everything they do.

What we're finding is the reality like

Azure AD joined, we didn't advertise

for people internally to go do that.

It's not like we told the masses at Microsoft

yes we're going to do that,

yes we have a plan we're gonna do that

very soon here at Microsoft where everyone is by default.

So we're enabling those back-end processes

to make Azure AD our first process

but we haven't done that yet.

Meeting without doing that we have 35,000 people

that have said look this is the way I want to go.

>> Exactly.

>> Now granted people at Microsoft

are a little ambitious and they tend to do things

even without us wanting them to but it just proves that

users are starting to get into that self-service mode.

They see where it is they wanna go to the Cloud

and then they look at the controls.

Do I really need full CorpNet, on-prem,

Domain joins, the way iO is always ran.

And the answer we've done this with

a number of people internally.

We actually have a bit of a challenge, right?

We have a number of people in our org

and in our user experience

org and in our security org.

Where we've told them look go join your machine

to Intune, put it in Azure or put it in workplace join

and go test it out.

Like tell us what you can't do

'cause we want to find out

what you can't do verse,

we know what you can do, almost everything.

And the answer has been yeah 99% of their job

if they're an information worker, if they're a PM,

they can do their job 99%.

They do not need access to CorpNet.

Which is why we're taking it out of those small offices.

So that's where we're going.

>> So I think on the next slide, I think

what I want to make sure we also get to is is that

it's not just Intune.

And it's not just those conditional access policies

but that ecosystem that has to be behind that

in order to support what we're trying to get to, right?

We talked about telemetry so, we talked about

Advanced Threat Analytics, Azure Information Protection.

Being able to tag and classify those documents

to ensure we have the right capabilities.

Then using Cloud App Security to monitor that document

as it's going across the network.

Like, maybe I've tagged it appropriately,

but I'm trying to send it to somebody

who doesn't have access to it outside the company.

So getting that visibility,

that telemetry to see what was going on with that.

I mean, I think we have a write-up on IT Showcase,

about a time where it was not not necessarily,

like, a threat that they did it,

but it was an accident and it was caught

before it got too far out.

We'll have to see if we can dig that one up, actually.

That's a good point, 'cause I mean

there's times where maybe you've been working with a vendor,

and you keep working with them,

but then you all of a sudden change the vendor.

And so you send the old one an accident

and you're like, oh wait a minute,

I don't think you meant to send that document

to that person you just send it to,

'cause they're no longer in your

tent of responsibilities, so.

But again using that sole that whole ecosystem

as what is driving this and then I think

that's important to understand because it's not

just applying Intune policies.

It's not just conditional access.

It's not just you know Config Manager.

There's this whole ecosystem has to sit behind that

in order to support this.

>> And it brings us back to the stool

the three legged stool.

The fact that it is not just a concept

it is not simply you trying to explain it, simplifying it

but if you look at the the way the solution

is designed, it is designed to really work together.

And not just be there so it's not a suite

for the sake of being a bundle.

You're not saying okay if you buy the EMS

or you know you buy this license it's cheaper than buying

them standalone.

Which it is, but the fact that they actually work together.

>> Yeah, and then you really need it to work together.

I mean I think that's the key and I think

we've seen at least in the three years I've been here.

This enhancement of this environment

I think maybe this story is is just how improved

we've sort of gotten 'cause I think

just looking at where we were with

the thou shall not have a non-Windows Device,

to now we're at this, you know, fully managed iOS

and Android,

transitional access. >> 160,000 of them, boom.

>> Yeah, 160,000 devices that if you want

to access corporate data on that device,

you have to be managed.

I think that's to me that still sort of blows me away

when I think about the fact that that was the first

environment we were able to tackle

and I think we tackled it very well.

>> And as a relatively new end user

I can attest to the fact that it's pretty seamless for me.

Like the fact that I you know I just come in different

company and it all just works.

And now that I do this as I learn more about

our different technologies I notice

how they're all working together.

Like a simple example, if I may, the fact that our intranet

access is just so seamless, like, it took me months

to realize that, you know, what I never really

double-click anything to get into my VPN.

Like when I go to my benefits page

or my you know, what we call the Microsoft MSW,

it just worked.

And it took me months to even realize how seamless

that whole experience was.

>> Well like so Mike talked about having an understanding

of your applications, of what's available,

what's not available.

When we first started doing the Internet-first

roll outs we actually started blocking

and only driving people out to the internet

and a handful of offices of which I was in one.

And you start seeing experiences

like I can't get to my HR data.

I can't do my time away.

I can't actually look at how much vacation time I have

to take before the end of the year so I don't lose it.

And then figuring out what those experiences are

to your point Mike and understanding then,

how do I actually enable the user to actually

have that experience?

So using things like Power Apps to do all of

our HR systems through.

So I actually have that time a way reporting

and the visibility there.

>> Awesome, and do you mind taking a few questions now?

>> Yeah, please.

>> We seem to be getting them by the dozen.

>> Love to.

>> One of the interesting ones I see here

is about the benefits of co-management.

So what people want to know especially

if in your own experience pros and cons

of going towards Co-management.

>> So the the huge benefit is you don't have

to kind of redo what you've already done.

So one of the big challenges we had

so for example, when we first looked at it.

The very first thing we did is a policy true-up.

So if you look at Config Manager we had literally

800 policies across our environment.

And so we we kind of said look,

let's take all those policies,

we did the evaluation, we used the tools from Windows.

And then the next step we said, is which of those do

we want to be an MDM?

Like which ones do we really need?

I think a problem that people

and this comes back to your mind shift, right?

If you think that moving to the Cloud

and moving to MDM management

and moving that direction Internet-first.

If you think that's a lift and shift of all the policies

that you currently have, that's wrong.

>> Right.

>> That is the wrong way to look at it.

What you really need to say is look,

they're on the Internet, what access

do they need to resource to or what resources

do they need access to?

And then what controls do I have to put in place?

Because even internally Carmichael and I

fight this all the time with people.

They say "Well, it has to be like this

"because this is the way we did it on the domain."

We're like but they're not on the domain

and we don't want them on the domain.

>> When I think when you create the FAQ

for the user experience when they're

like why are you doing this to me?

You don't show 800 GPO's you show that standard

like this is the operating system standard

and these are the you know eight to 10 things

that we have to apply to that machine.

There's a lot of context behind that

and it could be Config Manager,

it could be GPO, it could be Intune policies, right?

But just showing them that set of these are the things

you know kind of back to that device health slide

is these are the things we are doing on your device

and require be done on your device,

you don't have to know what the back end of that is.

So having that experience sort of at that boundary

of what do we really then tell the users that

we have to do on their devices?

That's a good point.

>> And a second piece to that is,

this is what we're not doing on your device.

>> Well, that's the almost the more important piece.

(all laughing)

>> The user feedback we got was really clear

during our iOS and Android.

People are almost more important

or more interested in what we're not doing.

So we're not looking at your photos,

we're not looking at your web browsing.

We're not looking at your cache on the device.

We're not getting your password

to your Hotmail or Outlook account.

>> We're not doing a full device wipe when you leave.

>> We're not wiping your device stuff like that

so that's super important.

>> And that's part of the product now

so I know that we actually we re-did

all our product screens to make that

very transparent, very user friendly

so that it's not for the IT department

to have a custom solution

to reassure users, but it's in the products.

>> Absolutely.

>> Another interesting one

and I would like to know this myself is when

do you think you have solutions

to manage even the meeting rooms like Surface Hubs

and things like that?

Do you guys have plans to manage that as well?

>> So I think we do and so let's use Surface Hub

as an example we actually do have policies

that we can use through Intune to manage those

and I know Mike and I we worked on that for a while.

Kiosk machines too, right?

And we have iPads outside of some office,

some rooms that actually control information there.

So there's sort of that kiosk policy experience

that we can use through the same set of tooling

that we have to manage those devices.

I think there's still some of those

additional IOT things that

we're trying to work out.

I mean we have a standard we have a list of things

we want to be able to do on those devices

but you know getting kind of back to what my team does

is okay, how do we actually do that?

Working with your team, the product team.

Whether it's you know Intune or whether it's Azure IOT

or some other group to ensure that we can actually do

the effective controls we need to do on those devices.

So there is work in progress for sure.

But I think you know sort of again,

fundamentally understanding what is it that

the device needs to do?

Who's gonna be connecting to that device?

And what applications, things like that, run on it.

So I think having that minimized hub

experience with a set of policies that apply to that.

>> We're doing it today.

>> Right, and I know people like to know Roadmap

but that's something that is definitely exploring

how what role does IOT really play in the enterprise?

Because if you ask someone, what is IOT?

The answers would be all over the place.

So really nailing down what it means to the enterprise.

I mean you know is it just your Nest thermostat,

or is it something else?

We are really exploring that

and I think in the next few months

we will see much more targeted solutions around IOT

from the EMS Intune.

>> Well, and I think you're absolutely right.

Because I think that's one of the things

even internally we struggle some time is when I say

what is IOT?

If I go talk to our corporate real estate team IOT

is all the building management systems.

It's the thermometers in the rooms.

>> The HVACs, yep.

>> The HVAC systems.

It's the elevator controls.

It's you know, those various things versus

if I walk down and see a Harmon Kardon Cortana

device in somebody's office.

That's doing you know, hey what's my next meeting

or something like that, right?

So I think there's different experiences

depending on who you talk to and I know

when I will get my coffee pot in the morning

I wanna make sure it's set to the right temperature,

and I've got my cup of coffee

when I'm walking in the door, so.

>> Right.

>> But enabling that and you know getting kind of

to that trusted boundary again right, is okay,

but what of those devices do we trust to have access

to what areas of the systems, right?

So we don't have you know your coffee pot talking

to the building management system.

>> Highly confidential.

>> Exactly, how do you classify those, right?

>> And we have time for probably one last question

and I see people really sort of doubling down on

this question.

So I'm gonna ask you this one.

It's almost asking you again what are some of

the biggest challenges when you try to flip

on co-management or when you try

to do this SCCM plus Intune?

Is there something you can share without marketing it?

>> Yes, I think one of the things,

and maybe Mike, you can go into more details.

I think just at a high level

it was doing that mind shift of taking

SCCM first to Intune first, right?

But then using Config Manager to still manage the policies.

'Cause I think one of things we were originally

thinking of and again maybe this is our buddies

a little bit was is the challenge was

maybe how do we get the full device management

in the Cloud from that that layer.

But we realized that there was a lot of gaps in coverage

kind of back to what I was talking about

with the risk management, right?

So there's still these gaps how do I control those gaps.

We had a tool that already existed Config Manager

that was doing a lot of that for us.

So bringing that along to say

I'm still gonna do device management with Intune,

but I have to have that hybrid environment

to have those controls there.

And I think you know maybe even from

the user experience side you can touch that

a little bit but making sure that we have those.

>> Yeah one of the one of the gotchas perspective

that we we learned is and this is probably

a good tidbit for our listeners and people today.

If you look at the application policies

that you have in Config Manager.

I mean we've been running Config Manager

since its inception right?

So you think about kind of like GPO

everyone likes a GPO and they're like

yeah I have 5000 GPOs sitting group policies

running and it's just a mess.

Well, our Config Manager was a little bit that way

for us to be honest.

And so when we started to move to the the Plus Intune

and started to migrate over to the hybrid.

What we realized is we have a lot of clean up.

And so I think what people need to learn is

you need to kind of take a step back

and look at your application, your provisioning policies.

To me that's the real lesson.

>> Exactly.

>> That's the real meat and potatoes of

how am I gonna manage this?

Because if you don't take a step back,

take a hard look at what policies are conflicting

or going here.

For example, look I have an app

that's for people in Ireland,

but yet you're publishing it to 200,000 people,

to everyone, because the app owners

or the admin said, "Oh, I should just go to everyone."

Well, how many of those can you have in your environment?

>> A lot. >> A lot, too many.

(all laughing)

>> And while you're unplugging things

so we've got solutions like security baselines

coming in now with Intune that let really help you

to figure out okay this is what I really need

using the power of AI and machine learning.

Which was in fact another question

that I'm afraid we won't have the time

to cover today.

But again it points to the fact that

it all works together and it's really trying

to simplify the IT person's job.

And maybe that's what you could share with us

as some of the key recommendations

because we are almost at the top of the hour

so if you'd like to maybe go there

and leave something that people can now use

to go and do this themselves.

>> Yeah I mean I think for sure,

and I think we've got the slide up on the screen

where it's go back into that EMS view,

of use what you have licensed for,

and make sure that you understand what that is too, right?

'Cause I think when I go

to the Executive Briefing Center

and I talk to customers they don't necessarily

even know what they have

or what they're using, right?

Or what they have the ability to use.

So just understanding exactly what you have

and what you can use.

And then applying sort of that policy-level mindset

to your point Mike, understanding

what your existing policies are today.

And then how do you carry those forward

into this sort of new environment?

Where can you supplement with the more modern controls?

Where do you still have to have those legacy controls

that you still need to and require to be on those devices?

And then you know again I think

that covers the sort of group policy mindset too which is.

>> Yeah we've talked about that.

>> I've heard anywhere between 5,000,

8,000 group policies. (laughing)

That we've had to do from the day

we turned on group policy, and of course the guys

that were originally doing it aren't with us,

they've retired since.

So understanding we don't even necessarily know

what some of those group policies are.

>> And again, you're not alone.

>> Yeah exactly.

And then I think Mike, the planning those phases, right?

I mean the EPIC that you own.

>> Yeah I mean you have to take it in chunks, right?

If you look at conditional access

for example we focused on iOS and Android first.

And now we're focusing on Mac

and next we're gonna focus on Windows.

Windows is it a challenge internally here

because if you can imagine we run

every flavor of Windows there is.

You have people running server,

you have people running client.

You have people running N plus one in beta builds.

You have people running legacy builds.

Out there five, eight, 10 years for our customers.

So, you have to kind of build all that into something

that's consumable for your users.

>> Yeah and I think what you know sort of on that

legacy OS perspective we you're actually doing that

because we're actually supporting some of our customers

that are still running that too so we can't

just shut those things off through policies

and say you can't use that anymore.

But having that sort of understanding

exactly what they're being used for.

And then maybe creating that sort of an environment

that they can work in back to sort of the Zero Trust

and thing.

Where maybe they're not on the production environment

maybe they're in another supporting environment.

>> And then the other thing kind of

the last point here on educate and connect.

I think from a from a very high level

you really need to have a culture discussion

at your company.

You know here at Microsoft we are changing the culture

drastically from what it used to be.

It used to be a very entitled conversation

no I expect I'm an administrator.

I expect I can always do this, I have full access

to everything that's very different

than say going to the other end

which is say a just-in-time model.

Where I provision you only administrative access

when you need it and it's only for two minutes.

So it's a very different mind shift

and so I think people should look at that

as well in their environment

and say look from a top-down level,

what do we need to change from from the culture.

>> Well they even to that point right

just even within our iOS and Android

the rollout was right getting them

to understand that you don't have

to be on the corporate network.

The reason why you were using CorpWi-Fi

was because you were connecting

to the internet through that

and that gave you that you didn't have

to use your data on your phone mindset.

So, you know maybe you don't need to be on that network

with your mobile devices.

Maybe you can be on sort of that

internet facing Wi-Fi too, right.

So that the culture is a huge one for us

that we had to get past.

>> In fact that question came in

as you were talking about that.

About what advice from your experience

will you give to work with the old guard?

You know that person entered that in quotes.

How do you go about proving this

and introducing it as a pilot.

Because I'm sure it wasn't all you know

roses and champagne when you were trying to introduce this

through such a large organization.

So any tips you can share on that?

>> So I think it kind of going back

to when we were first talking about

the iOS and Android rolling out.

I think it's important to first understand

what the security policies are and work that

out within your own environment.

So within the SRE we made sure we understood

in partnership with our End User Support Organization

when Mike was over there at the time.

Understanding exactly what that meant to apply those

before we went forward with it

and that already builds your then resource kit

for your FAQs and things like that

to say here's what we are expecting to see

or what the types of questions you get.

I think then it's then reaching out to some people

you're happy with and honestly

when we started doing the testing

is we noticed that just even within

the Office suite of apps on those devices

there were some issues.

So rolling it to those engineering teams

to have them see the experience of working with us.

Now that's a benefit maybe our customers can't have

but when they deploy this they can feel

like we actually had to go through that,

so we've pushed that to our Office team

and partnered with them to ensure

that the experience was good right.

So I think within your own environment

if there's people that

you work with on a day to day

or if you have an application

that you have to make sure critically works

on those devices work with that team onboard them first.

Make sure that they understand the experience

that's about to happen in that application.

Because all the other piece of that is it then

allows them to build the muscle to help support

their customers.

When that application has issues

when they're trying to enroll too.

>> I like that so I mean have an FAQ handy

that can address the sort of mainstream questions

and then work with probably

the more critical team first.

So that you get the hard piece out rather than

maybe go for the low-hanging fruit of doing it

for the least.

>> Which is the opposite of how we typically.

(all laughing and talking.)

For years it oh go for the easy wins first

and then kind of build harder.

And then you end up with this long tail of five,

10, 20,000 people with an exception or something like that.

We took the opposite approach and said

let's go to the hard stuff first.

Let's fix that and then all the other stuff

is gonna fall in line.

>> Yeah and I think just one one last thought on that

is 'cause I know we're about

to run out of time here, is privacy.

Make sure you can work with your legal teams

and then figure out exactly what you need can

and can't do and understand on the devices, too.

>> Excellent points.

I mean a lot of this has been really educational for me

even though I do this for a living

and I've been working with you for so long

and I hope you guys had a great time

and you learned something completely new.

The on-demand version of this webinar

will be posted soon to microsoft.com/ITShowcase.

So that's IT showcase.

Where you can also find the related content

like case studies, blogs and upcoming webinars.

I already shared our Twitter handle with you

so if you'd like to interact with us

there's a MSIntune the Twitter handle.

And then if you want to just review some of the concepts

that they share today you should do that

on the on-demand webinar.

Send us questions if you have more questions

and then join us for future webinars

where we can answer more of your questions

and make sure to bring your colleagues with you as well.

So thank you so much.

Thank you Mike.

Thank you Carmichael good and have a great day everyone.

(music)

>> Hello again and welcome to the extended Q and A

session for the How Microsoft

is Modernizing Device Management Webinar.

We've received many great questions during our webinar

and wanted to make sure that we address

as many of them as possible.

So let's get started, with me here

are again Mike and Carmichael.

So I'm going to throw some questions at you

and then maybe you guys can help me answer them.

>> Excellent.

>> I'm so happy there's a lot of questions.

>> I know bring them on, that's good.

(all laughing)

>> So the first question I have here is

how is AI artificial intelligence

or machine learning implemented in the product?

Do you guys have any experience with that?

>> Probably the easiest example

is the user use of the Graph API.

So pretty much we've migrated

almost all our reporting solutions

from the Intune perspective over to Graph.

So, if you remember Graph came up

what about a year ago in February, I think so.

And once it did that we actually moved most

of our reporting solutions to a Graph API.

And so, now it's just ingrained into what we do.

So if we need any new data

we pull it into our data lake.

We use Graph API we pull it in

and then we evaluate on that data.

And we've even used some of the different analytics.

So depending on the license you're at,

so for the Office telemetry,

and the Windows telemetry, depending on what

settings you're using right?

We've actually been using that telemetry

for example, in our Office product.

We actually used it

and we said we have a ton of versions of Office

in our environment like ridiculous amounts of versions.

And so we said look let's look at the AI capabilities

and build out the story.

And we didn't just look at versioning

we're actually looking at the behavior

and we're actually using the the AI

to say what's the behavior on specific builds?

And then we can actually make a determination

what we should do on those builds using that AI

to make a determination for the best experience

for our internal users.

>> And I brought back up the the EMS slide

that we love to use from you guys.

Because I think to Mike's point

with the telemetry when you have it things

like Advanced Threat Analytics

and then applying sort of that telemetry ingestion.

So I can apply some machine learning

to that to make a determination.

I remember talking to a customer one time they were like

hey, we turn on a ATA,

and all sudden we had a whole bunch of alerts.

Because our users were globally traveling

it this you know the Superman scenario, right?

And it wasn't necessarily because their user

was actually doing that it's because resources

were globally dispersed.

So applying some of that learning

to your model to say okay

if my database is in Singapore

and my user's in, you know, India.

Ensuring that that doesn't seem

like a login event happens here,

but the login event on O365

is happening over here, it's the same event.

So I'm getting that correlation

of using that machine learning.

And I want to make sure we have that distinction

between AI and machine learning, right?

Because AI could do some additional things

but there's that layer of machine learning itself

that needs to be applied through

those telemetry gathering sources too, right?

Because there is a bit of a distinction

between what is AI and what is machine learning.

And then the one of the most important ones

sort of again, from the security perspective,

would be that Advanced Threat Analytics

or the Advanced Threat Protection.

Right, so that that malware in that EDR

sort of detection on most devices

when we go back to the health of the device.

Is ensuring that we have that machine learning,

that artificial intelligence,

that's looking at all the events that

are occurring from sort of,

that layer of security protection,

and making that determination on health of the device so.

I think there's definitely places

that plays not just within their own

ecosystems but in the ecosystems we support for them

to apply that logic so.

>> Yeah and what if somebody doesn't know that

all of this stuff is available

to all users or and all customers I mean.

So things like Graph API.

It really exposes everything that we do

the entire Intune product is available through

the Graph API.

So you as an IT administrator or as an IT organization

can build the same tools

or whatever you want using all of those graphic designers.

So it's nothing it's not a secret sauce

that we have here everything that we do

you can replicate up yourself.

And there are blogs and articles that talk about that.

So I think that was a pretty important question

so thank you for asking and thank you

for answering that one.

Switching gears a little bit towards

a more of a management question.

So this is asked by someone who says

currently there is not a way for Intune

to change machine association

without resetting the device.

Is there a plan to make this easier

when devices move around?

(all laughing)

>> Well, so there's also a flip side of that scenario too

which is the multi-user scenario, right?

So if I have a device that has multiple users

that have to log into it.

And I think there is experiences that

we're working on because even with our own environment,

we have to support that and Windows flow

for business with Azure Active Directory

are really trying to figure out what that works for, right?

I don't know if that's necessarily Intune

that's managing it.

Right, because that identity

piece is AAD and that's that's a great distinguishing

thing we have to do here.

Is there's multi layers and we don't necessarily talk

about the AAD layer of it.

But AAD really what's doing the conditional access right.

So identifying the user making sure that

they have access to that device

and access to the data.

So I think there are, like I said,

there are workflows that we are working out

to try to get sort of that multi-user device

tenancy on that so I don't know

if you have more information on that Mike or not.

>> No, I mean I think you covered most of that.

>> And I think that's a good kind of a Roadmap type

of for discussion it's not it's something

that we've heard a few times there

are definitely security reasons

why we do it that way.

But then there are management reasons

why we could make it a little bit better

and that's something definitely what..

>> There are things like device groups that are coming.

That have already been worked on and announced

in both Azure and in Intune

that's actually gonna enable

some of that separation.

So we are actually looking at that

in terms of how do we put device policies

on specific device groups based upon specific attributes?

So if a device changes well, the device group would change

ergo the policy would change.

And so we are starting to build out

those workflows internally

and that's a work in progress for us

over the next six to eight months.

>> I think some of the programs

like the Apple DEP program

and the Device Enrollment Program

and the Android For Work that's coming

as well as even our own autopilot scenarios

where we're embedding the sort of that

device identity into the system.

And then being able to manage the device, is sort of that

distinguishing factor, aside from just the user.

I think that's one of the things that

we sort of lose sight of is the, I'm done

with this device, now I want to hand to somebody else

kind of things.

When they log into it what does that experience

look like?

>> Right, right.

Yes and I believe we also have

this user-less device concept now.

So if you're really talking about just a device

that is used to be on a retail shop floor,

where there is nothing personal

about that experience.

You know, you're not checking email,

there's not calendars.

So then you do have a way to enroll it

as a device and there is no user associated

with that at all.

>> We've talked about the Hub experience.

>> Right, exactly.

>> And the Kiosk devices that we have today.

>> The Kiosk devices.

>> We have 500 of those across the globe today.

>> Wow. >> That we're managing.

>> Which we are actually managing?

>> Yeah.

>> Wow.

Okay.

>> When you come to a Microsoft Building, when you log in

those are all Intune managed.

>> I did not know that awesome.

>> When you want to request a shuttle between building.

>> All right.

>> That's Intune.

>> And that is amazing again, a very..

>> I think it's a good distinction though,

because I think we focus again and I'm happy

that Mike came over and join me on the security side.

So I think we maybe have taken a bit of a security

approach to this topic today.

But understanding device management

does definitely play a role in that

and then what is that sort of TCO

at the end of the day that when we apply that logic

to its perimeter of controls that we need to establish.

You know we talked about the scenarios of

being able to sort of dismantle infrastructure

and globally global offices

because we're making their experience better

by putting them on to the internet directly.

But giving the rights let level security controls.

So they don't have to backhaul through

you know another location to come back to the US

to get access to data.

So I think you know understanding that

some of the things we talked about in the closing

of our session was that those recommendations

of understanding what you have and what you have licensed

'cause that's another piece of that management puzzle

whether you get that TCO is.

If you have this list of things

and maybe you're not in the right

or maybe you're not in the highest level tier of EMS

and you know the fact is sort of the marketing.

But you have access to a lot of these things

just at the base level of EMS.

I'd talk to people about Azure Information Protection

a lot and the capabilities you get there.

Even if you just had the default out of the box

AIP experience which you get that baseline

of at the base of a EMS.

Just applying that logic and getting that

learning value out of that, right?

And you talked about just teaching people

or that culture change of getting people

to understand what it means to start tagging

your documents and what not, right?

So maybe you aren't able to auto-tag them,

but just teaching them and getting that culture shift

in mindset of what it means to be

at the different classification levels.

And I think that's a great way to start

and just sort of get the mindset shift

that culture change that you need

in your environment is to start at that baseline

of just experience.

And I think that's when we talk about device management

it's almost experience management.

We really have to talk about because

it's understanding how they're accessing the data

and we talked about that a lot.

Which is you know maybe they just need to come in

from OWA but we don't need to give them

a full experience through Office Web Apps.

We just need to give them the email

'cause that's really what they're there for

is to check their email 'cause somebody said

I sent you an email I need you to check it kind of thing.

>> Or look at their calendar.

>> Or calendar. >> More often.

>> That's what I was telling somebody other day

like the first thing I do before

I go to bed as I look at my calendar

to make sure what clothes I'm wearing for the next day.

So I don't show up with the wrong shirt

for this session.

(all laughing)

>> And again I've mentioned this earlier

but I'm, as an end-user, I always find it

to be one of the least intrusive IT experiences

at Microsoft.

So even though I know that a lot of things are controlled

and you're providing me that secure shell

to work in on a day-to-day basis I almost forget

that there is technology that I am dealing with.

Or I have to remember that this is what I am allowed to do

and this is what I'm not because

I know the system will take care of it.

If sharing something that

I'm not supposed to it will block me

I don't have to think about it as much.

>> I chuckle a little bit because when I started

about three years ago the enrollment experience

was much different for enrolling a device.

(all talking and laughing)

>> I'm thinking of our friend Clay Taylor

who's now on the product side

and the floor-to-ceiling maps they created of

the workflow for enrollment.

Just to describe what that process was

instead of you know having a PowerPoint on there

you literally would walk into the conference rooms

with these sheets of paper and unrolled

it would roll down on the floor it was pretty funny.

>> That's what gives him street cred today.

And now he starts every EBC with that story

so that's how he gets his street cred

so that wasn't a waste.

(all laughing)

Talking about stories in fact the next question

is about is from a person who says "I'm one of the people

"who likes to read and study before I do."

So they're saying the Microsoft environment is so huge

I would like to see the big picture

and how the different services fit together

so I have a two-fold question.

The person has a two-fold question.

"Where can I go to get that detail overview

"to understand how things interact.

"And then where to get the detailed knowledge

"on a service and how to implement it."

>> So this is a great question

'cause you know we've sort of been reevaluating

Zero Trust networking and what we're doing with it

in the last few months.

So like this person that asked this question,

I was doing a bunch of research

to see what that really meant

through the product, marketing stuff.

So we have an internal resource that we can go

to look at a lot of the Roadmaps

and just the way you guys describe things

on the product side.

And there's a cybersecurity reference architecture.

I would suggest looking at that

I think one of the things that I like about that

is that it gives the entire ecosystem

from a security perspective and again

it's my area of focus.

So it actually shows you not just the device

and the user but the application tiers,

the Azure, you're back end, your data center.

It shows that whole architecture

of what you really need to be thinking about

when you're applying this.

'Cause it's again it's not just Intune and a device

it's this whole architecture you have to apply around it.

One of the things I also found was the

I think you guys shared this publicly, is there's

a sort of Zero Trust with conditional access,

PDF that sort of shows that

at more of a contextual layer

for a customer to understand.

What the conditional access workflow

is for that Zero Trust?

And you know I would be remiss without

mentioning our IT Showcase friends and the work that

we do there and a lot of documentation out there.

>> And I believe we can show the links

to that you have that a couple of slides down

I don't know if you want to put that up.

>> And it'll, sorry but I know even

so Carmichael Patton on LinkedIn

I've got a few documents that we published through

the IT Showcase there.

There's a document called Cloud Connected Client.

Which is the summary name of that 'cause

it's actually a longer name.

That talks a lot about sort of the future state

of what we've been envisioning from the Zero Trust

that my team put together about a year ago

and we have some other documentation out there

on this topic specifically.

As well and it's on the resource side

and I think we just pulled up here for you to look at so.

>> And I think from a management point of view

we've also been very transparent in sharing some

of the challenges that we went through.

So I remember Brad Anderson, who's our CVP,

he did a series of blogs that spoke about,

how did we internally go from being

a very on-prem managed even product

and service, to being a globally-scalable Cloud seller?

>> And that's a good point because I think actually

Brad and Brett Arsenault, the CISO,

just did a in-zone YouTube.

>> Oh there's a platform, must watch.

>> That, yeah, I think Brett even mentioned that

we're the second-largest Mac shop in the world.

So back to sort of our device ecosystem.

>> And it's and it's true I mean I was personally surprised

to know but when you explain

why we are such a big Mac shop,

it's not at all surprising.

>> Yeah it's actually good points

so I don't know if we really talked about that

because when we go into that user experience

and being able to manage those devices.

We support applications being built on those device

until the culture change.

What I've been impressed with just in the three years

I've been here and of course I came in after Satya

was already the CEO.

But we have gone from this point of everything as Windows,

everything is developed on Windows.

Everything has to be Windows to you know what

if you're building an Office experience on a Mac.

You should be on a Mac and understand

what that experience looks like.

>> Absolutely.

>> If you're building it for iOS, for Android

you need to understand what that experience is.

And I think that culture itself of the be

sort of getting the engineering teams to ramp up

and understand that you doing these things

you should be experiencing that.

But then we have to be able to enable the back end

of that to ensure that we have the right controls

on those devices from a security perspective.

But I think just that culture change

that we touched on earlier is a huge piece

that we need to be mindful of.

>> Excellent and with an excellent question

I think that really you know hit at the heart

of this conversation.

I think it's time to wrap up.

Thank you Mike and Carmichael again.

Thank you to our audience for these amazing questions

you know, keep them coming,

and I believe now we can wrap up.

I hope to see you again on the next webinar.

Thank you everyone, bye bye. >> Thank you.

(music)

For more infomation >> How Microsoft is modernizing device management - Duration: 1:16:49.

-------------------------------------------

Would You Like A C3 Wormhole? Part 6 - Duration: 7:00.

Warp Drive Active

The turkey of death

OK

Warp Drive Active

Warp Drive Active

Docking Request accepted

So let's see we know we're gonna need

On our next run we know we're going to need

Hammerheads

P.I. stuff for Prim

Rolling Mega, we got that.

Something for PVP, we got that

A Drake?

Do we need a Drake do we want a Drake? Maybe.

Maybe not right now.

Bomber?

Relic/data skill books.

There may be a use in having those

data relic skill books

we can get those

they can potentially pay themselves off the first time they are used

We should probably get more

a couple more data relic

so that the alpha clones can

hack

Large neuts, got those.

Navy boosters

for the battleships

Gallente battleship path

for 1 or 2 alts, did that.

I guess that's it.

What else do I need?

I'm going to need a

mineral ship soon

I'm pretty pumped.

For more infomation >> Would You Like A C3 Wormhole? Part 6 - Duration: 7:00.

-------------------------------------------

Resident Evil 2 is not the remake you think it is - Duration: 4:09.

The Resident Evil 2 HD remake seems a lot like the original - from the typewriter save

points to Leon's dreamy boy-band hairstyle.

But there are three big design changes.

And they make it a different game.

The fixed camera angles are gone!

Like most early horror games, Resident Evil 2 framed its shots with cinematic flair.

When the player reached a certain point, the perspective changed, showing them something

new.

And usually horrible.

Fixed angles cut down on the processing needed to render backgrounds, which is why RE2 looks

so damn good.

Look at all those polygons!

The fixed cameras defined the style of horror for these games, because a scene could be

perfectly staged.

With a sudden zombie!

Essentially these were just jumpscares, but they could happen any time the camera POV

changed, which was often.

You couldn't just look around a corner to see what's coming.

So you always had to be ready for an attack.

Tension came from needing to master your fear to keep exploring, and that was a near-constant

pressure.

The original game also used tank controls, which based the directional movement on the

character's POV, rather than the player's.

In modern 3rd-person games, the player sees over the character's shoulder, so forward

is always forward.

With tank controls, forward is whatever direction the character is facing.

So using the joystick doesn't move the camera – it only moves the character.

The combination of the fixed angles and tank controls meant maneuvering wasn't just difficult

– it was an essential gameplay skill.

The so-called remake doesn't rely on camera angles or janky controls to stage scares.

The player has control of the camera and can usually see what's coming.

The trade off is – there's no default auto-aim.

The original games featured auto-aim in the normal difficulty because, well, it basically

had to.

Just moving was hard enough; aiming would have been a gameplay nightmare.

So combat became this cat-and-mouse game of figuring out when to stand your ground, and

when to break and run.

In the new Resident Evil 2, normal mode is all manual shooting by default.

There's still an auto-aim option, but if you turn it on … what are you left with?

While the original focused on exploration and fight-or-flight strategy, this version

is about aiming well without panicking and wasting ammo.

Basically, it's a shooter.

As a result, the tension isn't quite as persistent as it was in the original – it's

more bold spikes of adrenaline and panic.

That, more than anything, makes it feel like its own entry in the Resident Evil franchise.

If the new Resident Evil 2 were a movie, I'd say sure, same general characters, setting,

plot – it's a remake.

But games are more complicated than that.

Is every Zelda game a remake of the first one just because it's the same characters

in the same setting playing the same plot?

No, and that's in large part because the feel of the gameplay is unique.

Resident Evil 2 plays like a fundamentally different game.

And … It looks and feels great.

But instead of being a remake, it's more like a reboot.

It's "fixing" the original game for modern audiences, correcting those frustrating

tank controls, outdated graphics, and stilted cutscenes.

sorry.... but.... it looks like your party....

has been canceled

Resident Evil 2 reflects the franchise's overall evolution from pure survival-horror

to more action-adventure… while still delivering plenty of scares along the way.

Leon: arrrgh!!

Không có nhận xét nào:

Đăng nhận xét