The 1. Microsoft Security Compliance Toolkit. On that page, click the Download button, then select Windows 1. Version 1. 70. 9 Security Baseline. The 1. 70. 9 baseline package includes GPOs that can be imported in Active Directory, scripts for applying the GPOs to local policy, custom ADMX files for Group Policy settings, and all the recommended settings in spreadsheet form. The spreadsheet also includes the corresponding settings for configuring through Windows Mobile Device Management MDM. Were also happy to announce the revamping of the Windows Security Baselines landing page. The differences between the 1. Microsoft Security Compliance Manager Baselines' title='Microsoft Security Compliance Manager Baselines' />Windows 1. Creators Update, Redstone 2, RS2 are Implementing Attack Surface Reduction rules within Windows Defender Exploit Guard. Exploit Guard is a new feature of v. You can read more about Exploit Guard here Reduce attack surfaces with Windows Defender Exploit Guard. Register for Exam 98367 and view official preparation materials to get handson experience with Windows Server 2008 fundamentals. Note that we have enabled block mode for all of these settings. We are continuing to watch the Block office applications from injecting into other process setting if it creates compatibility problems then we might change the baseline recommendation to audit mode for that setting. We are happy to announce that Microsoft Azure recently completed a new set of independent thirdparty ISO and Cloud Security Alliance CSA audits to. Please let us know what you observe. Enabling Exploit Guards Network Protection feature to prevent any application from accessing web sites identified as dangerous, including those hosting phishing scams and malware. This extends the type of protection offered by Smart. Screen to all programs, including third party browsers. Enabling a new setting that prevents users from making changes to the Exploit protection settings area in the Windows Defender Security Center. We also recommend enabling Windows Defender Application Guard. Our testing has proven it to be a powerful defense. We would have included it in this baseline, but its configuration settings are organization specific. The old Enhanced Mitigation Experience Toolkit EMET add on is not supported on Windows 1. Instead, we offer Windows Defender Exploit Guards Exploit Protection, which is now a built in, fully configurable feature of Windows 1. Exploit Protection brings the granular control you remember from EMET into a new, modern feature. Our download package includes a pre configured, customizable XML file to help you add exploit mitigations to many common applications. You can use it as is, or customize it for your own needs. Note that you configure the corresponding Group Policy setting by specifying the full local or server file path to the XML file. Because our baseline cannot specify a path that works for everyone, it is not included in the baseline packages GPOs you must add it yourself. Thank you to the Center for Internet Security CIS and to everyone else who gave us feedback. Experience unified endpoint management for PCs and Macs with Parallels Mac Management v6 and Microsoft SCCM. Learn more about Parallels Mac Management and Mac. Mobile device management at Microsoft. This documentation is archived and is not being maintained. Technical Case Study. February 2. 01. 6 Bring your own device is. More. employees are using personal devices for work, creating a unique set of. IT teams that must balance user convenience and data security. Core Services Engineering CSE, formerly CSE uses Enterprise Mobility Suite and other services to manage. Now, simplified and integrated IT. Situation. Solution. Benefits. Products Technologies. As the use of personal devices in the workplace expands, IT is challenged with managing a data environment where devices contain a mix of work related and personal data. In addition, it must grant the right level of access per device, user, and user activity, and handle the use of multiple accounts and identities on a device. Although employees will take some steps to remain secure and compliant, they also expect an experience that is easy, consistent, and satisfying. Therefore, what IT needs is a way to embrace consumerization without increasing risk, cost, or complexity. CSE approaches mobile device management as just one of a set of issues that are related to a mobile workforce. The first step is to make IT cloud based and enable a mobile workforce. To address these, it is using the Enterprise Mobility Suite including solutions in Microsoft Intune and other Microsoft Azure services. Low cost, scalable solution. Central location for users to access IT services. Simplified administration via a single console Compliance and increased security. Flexibility to meet user needs. Microsoft Intune. Microsoft Enterprise Mobility Suite. Active Directory Domain Services Microsoft Azure Active Directory. Microsoft System Center Configuration Manager 2. Microsoft System Center Configuration Manager 1. Situation. In a bring your own device BYOD. Moreover, users now typically have several. For example, they might bring a personal tablet to a. Microsoft Share. Point. Microsoft Power. Point presentation over Microsoft. Skype for Business. Theyre likely to check both work and personal email. On both types of device, theyre likely to have a mix of. But as the traditional boundaries. Data policies, such as encryption, password length, password. IT must be able to identify, with. Current trends suggest that workers change jobs and companies. IT needs a way to account for this. What should IT do if a device is lost or an. What is the best way to ensure that corporate. In short, the situation for IT is. Solution. CSE has been involved in mobile device management. MDM for several years and is evolving strategies and best practices to ensure. BYOD becomes the norm in. CSE approaches MDM a bit differently today than it. Even as recently as 2. Now, however, the focus is on access as defined by. In the future, the focus will be on. MDM system and Microsoft Azure Active Directory. The Microsoft Intune and Microsoft Azure teams are working. CSE can address a range of related issues. The first step is to make CSE cloud based and enable a. Identity and access management. For employees who use multiple devices for work, a key. SSO and a common. A common identity enables application access management, regardless. This ensures. that the user can have a consistent experience across devices and remain as. CSE is delivering identity and access management by. SSO experience, using federation to manage access to external. This helps CSE address the matter of managing. The following are some specific features CSE provides users with a common identity across on premises and cloud based services through Microsoft Windows Server Active Directory and by connecting to Azure Active Directory. CSE uses Active Directory Federation Services AD FS to connect with Azure for a consistent, cloud based identity. Through their accounts in Azure Active Directory, users have a common identity across Azure, Microsoft Office 3. Developers can build applications that use the common identity model, integrating applications either with Active Directory Domain Services for on premises applications or with Azure for cloud based applications. Azure Active Directory syncs with on premises Active Directory Domain. Services through Azure AD Connect. Azure Active Directory enables self service password changes and resets, and. It also supports multifactor. Multifactor authentication provides an additional. When a user attempts to log on or perform an action that is subject. Typically, this additional authentication factor is a numeric code, such as a. PIN, and may only be intended for a single. The user must respond usually within a limited period, such as 1. Credential caching enables enterprises to determine. This allows the enterprises to. For example, enterprises can specify how long credentials pass through. Mobile device management. Users prefer a consistent experience when they access and. LOB apps, no matter what device they use. Device enrollment should be. In addition, policies should help users feel secure. Device enrollment. Users can enroll a device relatively quickly in Intune. Notably, the process is opt in rather than opt out. This sets a friendlier tone. Users. recognize the value of being able to use personal devices for work, and. Similarly, when users no longer want to use a device for. Intune console the web portal for. For example, if a device has been lost or stolen, the. CSE do so. When a device is removed, corporate assets are automatically removed from it. Devices. can be completely wiped or just selectively wiped. See the Device. retirementwiping section later in this document. Intune provides a single administrative console that. One administrative advantage of this. Provisioning of the Company Portal. For users who connect to corporate resources on mobile. CSE now relies on its Company Portal to provide a kind of. Microsoft Windows. LOB apps that they need. Currently, users on i. OS or Android platforms. Company Portal from a separate site. For users on Windows or. Windows Phone platforms, the Intune service pushes the Company Portal out to. The Company Portal includes approximately 3. Provisioning also. Each month, there are approximately 3. One goal that CSE has for the Company Portal is to. For example, for users in field sales and marketing, the. Gear. Up app provides a quick reference to every product that Microsoft sells. For users who do. Policies across mobile devices. Whether they are related to encryption, passwords, security. MDM in an organization. In Intune, users see a dialog box that informs them. They can then select to allow apps and services from CSE, or. Although users do not always fully appreciate this fact. Their own personal data on the. For more information about. Policy and security configuration. Mobile application management. From an application standpoint, user and device provisioning. For example. after app deployment, the app owner can use tools such as Operations Manager in. Microsoft System Center to discover issues such as application dependencies. They can even triage and remediate in Microsoft Visual. Studio to fix any issues in the code. From an IT perspective, apps must be. MDM service. LOB apps should be signed and. Information protection. CSE has several goals for information protection. Techniques for achieving these. Additionally, Intune enables access to company resources. When certificate profiles are used to configure. Wi Fi or a. virtual private network VPN. When CSE deploys certificate profiles, it. PKI and configures them to request device specific.