Info

Microsoft Mechanics Podcast

Why, how & when to use current and upcoming Microsoft tech for IT implementers, developers and tech enthusiasts. Hosted by Microsoft Director Jeremy Chapman and his colleagues. An official Microsoft video series.
RSS Feed
2021
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
Jun 10, 2021

See how you can apply Zero Trust principles and policies to your endpoints and apps; the conduits for users to access your data, network, and resources. Jeremy Chapman walks through your options, controls, and recent updates to implement the Zero Trust security model.

Our Essentials episode gave a high-level overview of the principles of the Zero Trust security model, spanning identity, endpoints, applications, networks, infrastructure, and data. For Zero Trust, endpoints refer to the devices people use every day — both corporate or personally owned computers and mobile devices. The prevalence of remote work means devices can be connected from anywhere and the controls you apply should be correlated to the level of risk at those endpoints. For corporate managed endpoints that run within your firewall or your VPN, you will still want to use principles of Zero Trust: Verify explicitly, apply least privileged access, and assume breach.

We've thought about the endpoint attack vectors holistically and have solutions to help you protect your endpoints and the resources that they're accessing.

► QUICK LINKS:

00:00 - Introduction
01:16 - Register your endpoints
01:49 - Configure and enforce compliance
02:31 - Search policies with new settings catalog
03:15 - Group Policy analytics
04:00 - Microsoft Defender for Endpoint
04:36 - Microsoft Cloud App Security (MCAS)
06:36 - Reverse proxy
07:06 - Authentication context
08:44 - Anomaly detection policies
09:21 - Wrap up

► Link References:

For more on our series, keep checking back to https://aka.ms/ZeroTrustMechanics
Watch our Zero Trust Identity episode at https://aka.ms/IdentityMechanics
Learn more about the Zero Trust approach at https://aka.ms/zerotrust

► Unfamiliar with Microsoft Mechanics? We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft.

Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1
Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website

► Keep getting this insider knowledge, join us on social:

Follow us on Twitter: https://twitter.com/MSFTMechanics
Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
Follow us on Facebook: https://facebook.com/microsoftmechanics/ 

0 Comments
Adding comments is not available at this time.