{"id":91142,"date":"2020-05-26T11:00:49","date_gmt":"2020-05-26T18:00:49","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91142"},"modified":"2023-09-26T08:55:02","modified_gmt":"2023-09-26T15:55:02","slug":"zero-trust-deployment-guide-for-devices","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/05\/26\/zero-trust-deployment-guide-for-devices\/","title":{"rendered":"Zero Trust Deployment Guide for devices"},"content":{"rendered":"
The modern enterprise has an incredible diversity of endpoints accessing their data. This creates a massive attack surface, and as a result, endpoints can easily become the weakest link in your Zero Trust security strategy.<\/p>\n
Whether a device is a personally<\/strong> owned BYOD device or a corporate-owned<\/strong> and fully managed device, we want to have visibility into the endpoints accessing our network, and ensure we\u2019re only allowing healthy and compliant devices to access corporate resources. Likewise, we are concerned about the health and trustworthiness of mobile and desktop apps that run on those endpoints. We want to ensure those apps are also healthy and compliant and that they prevent corporate data from leaking to consumer apps or services through malicious intent or accidental means.<\/p>\n Gaining visibility into the endpoints accessing your corporate resources is the first step in your Zero Trust device strategy. Typically, companies are proactive in protecting PCs from vulnerabilities and attacks, while mobile devices often go unmonitored and without protections. To help limit risk exposure, we need to monitor every endpoint to ensure it has a trusted identity, has security policies applied, and the risk level for things like malware or data exfiltration has been measured, remediated, or deemed acceptable. For example, if a personal device is jailbroken, we can block access to ensure that enterprise applications are not exposed to known vulnerabilities.<\/p>\n Restricting access from vulnerable and compromised devices<\/strong><\/p>\n Once we know the health and compliance status of an endpoint through Intune enrollment, we can use Azure AD Conditional Access to enforce more granular, risk-based access policies. For example, we can ensure that no vulnerable devices (like devices with malware) are allowed access until remediated, or ensure logins from unmanaged devices only receive limited access to corporate resources, and so on.<\/p>\n Enforcing security policies on mobile devices and apps<\/strong><\/p>\n We have two options for enforcing security policies on mobile devices: Intune Mobile Device Management (MDM) and Intune Mobile Application Management (MAM). In both cases, once data access is granted, we want to control what the user does with the data. For example, if a user accesses a document with a corporate identity, we want to prevent that document from being saved in an unprotected consumer storage location or from being shared with a consumer communication or chat app. With Intune MAM policies in place, they can only transfer or copy data within trusted apps such as Office 365 or Adobe Acrobat Reader, and only save it to trusted locations such as OneDrive or SharePoint.<\/p>\n Intune ensures that the device configuration aspects of the endpoint are centrally managed and controlled. Device management through Intune enables endpoint provisioning, configuration, automatic updates, device wipe, or other remote actions. Device management requires the endpoint to be enrolled with an organizational account and allows for greater control over things like disk encryption, camera usage, network connectivity, certificate deployment, and so on.<\/p>\n <\/a><\/p>\n Meanwhile, Intune MAM is concerned with management of the mobile and desktop apps that run on endpoints. Where user privacy is a higher priority, or the device is not owned by the company, app management makes it possible to apply security controls (such as Intune app protection policies) at the app level on non-enrolled devices. The organization can ensure that only apps that comply with their security controls, and running on approved devices, can be used to access emails or files or browse the web.<\/p>\n With Intune, MAM is possible for both managed and unmanaged devices. For example, a user\u2019s personal phone (which is not MDM-enrolled) may have apps that receive Intune app protection policies to contain and protect corporate data after it has been accessed. Those same app protection policies can be applied to apps on a corporate-owned and enrolled tablet. In that case, the app-level protections complement the device-level protections. If the device is also managed and enrolled with Intune MDM, you can choose not to require a separate app-level PIN if a device-level PIN is set, as part of the Intune MAM policy configuration.<\/p>\n <\/p>\n We hope the above helps you deploy and successfully incorporate devices into your Zero Trust strategy. Make sure to check out the other deployment guides in the series by following the Microsoft Security blog<\/a>. For more information on Microsoft Security Solutions visit our website<\/a>. Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" Guidance on how to make your endpoints one of the strongest.<\/p>\n","protected":false},"author":96,"featured_media":91146,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3670,3689],"products":[3702,3703],"threat-intelligence":[],"tags":[3819],"coauthors":[2327],"class_list":["post-91142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-device-management","topic-zero-trust","products-microsoft-entra","products-microsoft-entra-id","tag-windows"],"yoast_head":"\nGet visibility into device health and compliance<\/h3>\n
\n
\n
\n
\n
\n
\n
Conclusion<\/h3>\n