Enterprise Mobility Hero Demo Guide
Enterprise Mobility Hero Demo Guide
Mobility
Hero Demo Guide
2
Demo Guide En
Table of Contents
EMS Demo Requirements and Scenarios.................................................................................................................................................................. 5
Demo Pre-Requisites................................................................................................................................................................................................... 5
Scenario 1: Manage Mobile Productivity.............................................................................................................................................................. 5
Scenario 2: Deploy and Manage All of Your Applications Using Enterprise Mobility..........................................................................5
Scenario 3: Comprehensive Protection of Your Corporate Data with EMS............................................................................................. 6
Demo 1: Manage Mobile Productivity........................................................................................................................................................................ 7
Pre-Demo Checklist...................................................................................................................................................................................................... 7
Demo Sequence............................................................................................................................................................................................................ 7
Opening....................................................................................................................................................................................................................... 7
Managing Office Mobile Apps without Device Enrollment...................................................................................................................... 8
Conditional Access and Device Enrollment.................................................................................................................................................... 8
Mobile Application Management.................................................................................................................................................................... 10
Demo Reset Instructions.......................................................................................................................................................................................... 12
Demo 2: Deploy and Manage All of Your Apps with EMS................................................................................................................................ 13
Pre-Demo Checklist................................................................................................................................................................................................... 13
Demo Sequence.......................................................................................................................................................................................................... 13
Add SaaS Apps: Salesforce................................................................................................................................................................................. 13
Add an App and Configure SSO: Twitter...................................................................................................................................................... 14
Use MyApps to Access Applications............................................................................................................................................................... 15
Self-Service on MyApps Portal......................................................................................................................................................................... 16
Access to Windows-based Apps...................................................................................................................................................................... 16
Close........................................................................................................................................................................................................................... 17
Demo Reset.................................................................................................................................................................................................................. 17
Demo 3: Comprehensive Protection of Corporate Data with EMS................................................................................................................ 18
Pre-Demo Checklist................................................................................................................................................................................................... 18
Demo Sequence.......................................................................................................................................................................................................... 18
Use MyApps to Access Applications............................................................................................................................................................... 18
Review Azure Security Reports......................................................................................................................................................................... 19
Microsoft Advanced Threat Analytics............................................................................................................................................................. 21
Introducing Microsoft Cloud App Security (CAS)...................................................................................................................................... 23
Demo Reset.................................................................................................................................................................................................................. 28
Appendix 1: Configure your Demo Tenant............................................................................................................................................................ 28
Add Your Authentication Phone and Email (for MFA verification) to Hero User................................................................................28
3
Demo Guide En
Grant EMS License to Global Admin user.......................................................................................................................................................... 28
Configuring Tenant for iOS Devices.................................................................................................................................................................... 29
Create an Apple ID for Your Demo Tenant (if necessary)....................................................................................................................... 29
Configure Intune Admin Settings for iOS Device Management.......................................................................................................... 29
Apply Contoso Branding to Intune Company Portal..................................................................................................................................... 31
Create an App Policy for MAM without Enrollment...................................................................................................................................... 32
Add SaaS Applications to AAD.............................................................................................................................................................................. 32
Configure Salesforce SSO Integration................................................................................................................................................................. 33
Configure Twitter Integration................................................................................................................................................................................. 40
Appendix 2: Installing/Configuring Azure RemoteApp (ARA)......................................................................................................................... 42
Installing Azure RemoteApp................................................................................................................................................................................... 42
Configuring Azure RemoteApp............................................................................................................................................................................. 43
Appendix 3: Configure Your Demo Devices........................................................................................................................................................... 44
Mobile Device Requirements................................................................................................................................................................................. 44
Device Setup Steps.................................................................................................................................................................................................... 44
Set Up Device #1 (iOS or Android).................................................................................................................................................................. 44
Set Up Device #2 (iOS or Android).................................................................................................................................................................. 45
4
Demo Guide En
Demo Pre-Requisites
Follow the steps documented in the EMS Demos – Getting Started Guide to create your free, personal, 90-day
Office 365 demo tenant with EMS add-on.
Preform one-time manual setup steps against your demo environment as detailed in Appendix 1.
If you’d like to include the Desktop Virtualization scenario to your demos, perform installation/configuration of
Azure RemoteApp (ARA) as detailed in Appendix 2.
Prepare your demo devices as detailed in Appendix 3.
Prior to each demo, perform the pre-demo checklist steps listed at the beginning of each demo scenario.
After each demo, perform post-demo reset steps to ensure you’re able perform the demo again in the future.
Scenario 2: Deploy and Manage All of Your Applications Using Enterprise Mobility
Demonstrate the flexibility to deploy and manage apps that employees need to be productive. Using this scenario, you
can show how Enterprise Mobility supports SaaS apps, native apps and Windows apps on a variety of devices. You can
deep dive into Azure Active Directory, Intune and Azure RemoteApp app management to show how Enterprise Mobility
solutions offer security and management for your apps.
5
Demo Guide En
Features
One common identity across on-prem and cloud
Single sign-on to cloud and on-premises apps with multi-factor authentication
Cloud App Discovery
Cross-platform Company Portal
Mobile Application Management
Enable users to access Windows apps and data from any device and any location
Services
Active Directory Premium
Microsoft Intune
Azure Rights Management
6
Demo Guide En
Pre-Demo Checklist
Follow these steps prior to each demo presentation to ensure a smooth and speedy demo experience:
1. Prepare your mobile devices (iOS or Android) as outlined in Appendix 2. If you only have one device available,
consider presenting the following demos via a custom PowerPoint slideshow:
o Managing Office Mobile Apps without Device Enrollment
o Device Enrollment for Conditional Access
2. Launch the native Notes app on your device and jot down the login credentials of your demo persona (so you can
quickly access it during the demo and minimize typos).
o Demo persona’s corporate account : garthf@<tenant>.onmicrosoft.com and password: pass@word1
o Demo persona’s personal email account: <your demo Live ID user account info>
o Copy the demo persona’s corporate account email and keep it in device’s clipboard.
3. MFA authentication requires a valid phone number. Ensure your demo persona’s Azure AD account has your
mobile phone number set up as verification number.
4. <If presenting demo remotely via Skype> Launch a iOS screen sharing utility (such as AirServer or Reflector 2)
on your Windows PC and mirror your device onto the PC’s screen.
5. Launch a new browser session on a browser that supports Silverlight (IE or Firefox) and navigate to the demo
tenant’s Intune management portal, at https://manage.microsoft.com. Login with your demo tenant’s Global
Admin user (admin@<tenant>.onmicrosoft.com and pass@word1), then minimize the browser.
Demo Sequence
Speaker Script Click Steps
Opening
I think you would agree with me that one of the main
things your employees want on their mobile devices is
access to their corporate email and documents. And
they expect to do it in fast and easy way without the
need of going through multiple complex steps or
calling the help desk. IT on the other hand wants to
keep the corporate data secure wherever it is.
Let me show how you can solve both of these
7
Demo Guide En
Managing Office Mobile Apps without Device Perform these steps on mobile device #1 (iOS or Android)
Enrollment 1. On your mobile device, launch Word app.
A new capability of Microsoft Intune allows Mobile 2. Ensure you’re logged in to the Word app as your demo
Application Management (MAM) without requiring the persona (e.g. GarthF@<tenant>.onmicrosoft.com).
device to be enrolled for IT management. In short 3. Go to Open > SharePoint > Documents > Northwind
“Intune MAM without enrollment”. This is Proposal.
particularly useful for BYO scenarios where end users
don’t want to or can’t enroll their devices for IT 4. In the Word menu, tap File > Duplicate.
management. This capability is also useful in cases
where a device is already enrolled in another MDM
solution.
An increasing number of Office mobile apps support
MAM without enrollment for both iOS and Android
platforms.
This new capability is an addition to the existing Intune
MAM capabilities that require enrollment into Intune
mobile device management (MDM).
Here, I’m accessing a Word document from SharePoint.
This document is considered corporate data. As such,
I’m disallowed from saving it outside of corporate
locations.
I’m also not allowed to copy/paste the contents of this
document to non-corporate locations.
Although this device is not enrolled with my
organizations, the application policies set by my
5. Choose <device> (iPad or Android, as applicable).
organization block me from taking my data outside of
my organization – thereby protecting my corporate 6. Note the prompt that disallows saving to non-
data. corporate locations due to policy set by Administrator.
Conditional Access and Device Enrollment Perform these steps on mobile device #1 (iOS or Android)
When employees add their corporate Office 365 1. On your device, launch Outlook app.
account in the Outlook app, they expect to get access 2. Tap Get Started, then dismiss app
to all of their email, but with EMS you can enable initialization/welcome messages, if necessary.
conditional access which ensures that employees
7. Add an Account > Office 365 account as follows:
access corporate email only from managed and
compliant devices. a. Email: garthf@<tenant>.onmicrosoft.com (paste
it in)
The first thing I see as I type in my corporate email
alias is my company’s logo: a branding I’m familiar b. Password: pass@word1
with. With the power of Azure AD, this form already then tap Sign in.
recognized me as a user of my corporation; and the
8. Note the Conditional Access policy message that
customized branding ensures me I’m signing in to a
blocks access to email:
trusted location so I can type in my password without
8
Demo Guide En
concern.
9. Tap Enroll.
10. Tap OPEN to launch Microsoft Intune Company Portal
app.
Next they need to install the Intune company app
which has already been done to save time. 11. Tap Sign in, then sign in to Intune Company Portal as:
garthf@<tenant>.onmicrosoft.com (paste it in)
pass@word1 (type it in).
12. On Company Access Setup page, type Begin.
Employees then need to login with their corporate 13. On Device Enrollment page, tap Enroll. You will be
Azure AD identity (same credentials one employees directed to the built-in iOS Settings app.
would use to access email), and go through the
14. On Install Profile page, tap Install.
standard iOS enrollment process that includes
applying a management profile and certificates for 15. Enter device passcode (promoted only if device
secure communication between the device and currently has a passcode).
Microsoft Intune. 16. Tap Install.
17. On Warning page, tap Install.
18. On Remote Management dialog, tap Trust.
19. On Profile Installed page, tap Done. You’ll be re-
There are few things are happening behind scenes directed back to the Intune Company Portal app.
here. First, Intune gets device information without 20. On Company Access Setup page, tap Continue.
collecting personal data since this is a personal device.
21. Tap Done to complete Company Access Setup.
Next, Intune also registers this device with Azure AD,
so now both Intune and Azure AD know that this 22. You should now see the Intune Company Portal
device belongs to this employee which useful for few home page, similar to the screen shot below.
other scenarios when the employees wants to access
corporate resource from this device. Intune also starts
to deploy and enforce device settings like password
requirements, resource access profiles such as WiFi and
VPN, certificates, and applications.
9
Demo Guide En
10
Demo Guide En
going to switch to another iPad for same user that 4. On a text paragraph, tap and hold, then Copy.
already has these apps installed.
11
Demo Guide En
12
Demo Guide En
Demo Sequence
Speaker Script Click Steps
13
Demo Guide En
Publish an application to be available from outside 3. Review the applications that are available in the application
your network – enables you to make your internal gallery.
web-based applications available externally
4. Click Custom, and review the benefits.
We’ll start by adding an application from the gallery - 5. Click FEATURED APPLICATIONS, type Salesforce in the
There are over 2400 SaaS applications listed, such as search box and click Search.
Twitter, Dropbox, or Workday – these applications are 6. Click Salesforce, and in the DISPLAY NAME text field type
pre-integrated and can be easily configured for single Salesforce-Demo, and then click Complete.
sign on.
7. Review the items on the Quick Start page.
If the SaaS application is not on the list, it can be added
Configure single-sign on
as a custom application
Configure account provisioning
Assign accounts
I’ll add Salesforce
When the application is added, the quick start page is
displayed, showing our next steps
There are just 3 steps and you can have this SaaS app
available
The first step is to Configure single sign-on
Windows Azure AD Single Sign-on – this option
enables users to authenticate to Salesforce with their
account in Azure AD using federation
Configure App URL – the sign on URL is the custom
URL for your domain on Salesforce
Finally configure single sign-on on Salesforce, by
downloading the certificate you will need to upload at
Salesforce when you configure that side of the
federation, and verifying proper configuration and
clicking complete
The second step is to Configure user provisioning. Add
your Salesforce admin credentials to enable automatic
user provisioning. This enables user provisioning and
deprovisioning based on changes made in Azure Active
Directory. (optional)
The third step is to assign users and or groups you
want to access SaaS app.
When these steps are completed the SaaS application
will be available in MyApps.
Add an App and Configure SSO: Twitter Note: Ensure you have a demo Twitter account (and login info
available) prior to performing this section.
Many organizations rely upon software as a service
(SaaS) applications such as Office 365, Box, and 1. Bring up the browser session with Microsoft Azure
14
Demo Guide En
Salesforce for end user productivity but IT has typically Management Portal (Global Admin user).
had to create and update user accounts for each SaaS
2. In the ACTIVE DIRECTORY workspace, click Contoso
app, Users had to remember their credentials for each,
<TenantName>.
which gets messy fast.
3. Click the APPLICATIONS tab.
Azure AD enables integration to many of today’s
4. Click ADD.
popular SaaS applications (e.g., Box, Twitter, and so on).
It provides identity and access management, and 5. Click Add an application from the gallery.
delivers an access panel for users, in which they can 6. In the Search box, type twitter and press Enter.
discover what application access they have and single 7. Click Twitter.
sign-on to access their applications. 8. In the DISPLAY NAME box, type Twitter-Demo.
I’ll demonstrate this two ways, starting with password 9. Click OK.
single sign-on to the Twitter app. 10. Click Configure single sign-on.
Use MyApps to Access Applications Important: Use GarthF’s browser session (in IE or Edge) for this
portion of the demo.
In your Enterprise, you may have Mac users such as
graphic designers. You’ll want to ensure all platforms 1. Bring up the browser session with the My Apps Portal
can be equally productive. (logged in as GarthF).
15
Demo Guide En
Self-Service on MyApps Portal Important: Use GarthF’s browser session (in IE or Edge) for this
portion of the demo.
I also have the ability to perform self-service on my
account that really empowers me to get my work done. 1. Bring up the browser session with the My Apps Portal
I can add myself to groups, to add applications. I can (logged in as GarthF).
reset, and change my own password. Self-service is a 21. Click profile.
very effective cost cutting method by reducing help 22. Click Register for Password Reset.
desk calls.
23. Review the options for alternate verification options:
Access to Windows-based Apps Note: Perform these steps on your Windows PC.
Next question is how do I enable access to Windows- 1. Launch the Azure RemoteApp program on your demo
based applications across all the devices in my device.
enterprise? 21. If necessary, log in with your demo persona credentials.
The next solution I’ll show you is Azure RemoteApp
that enable organizations to provide windows-based
applications for employees to work across devices,
from anywhere. As you saw in Brad’s keynote, he 22. Review the list of available applications.
16
Demo Guide En
accessed Dynamics using an iPad. This windows-based 23. Review the available applications under Work
application could be accessed from many different Resources.
mobile devices.
Let me show you the client experience using Microsoft 24. Launch Excel.
Remote Desktop app here on my iPad.
Close
As you’ve seen today, Azure Active Directory and Azure
RemoteApp enables users to be productive anywhere
on a variety of devices. Everything I’ve shown you is
available today and delivered by Azure.
Thank you.
Demo Reset
1. Go back to the Azure Management Portal browser session and delete any SSO Applications you added during the
demo (i.e. Twitter-demo, Salesforce-demo). Do NOT delete the apps that you had configured previously, before
the demo.
17
Demo Guide En
2. Go back to the MyApps portal (as GarthF) and leave group for sso-Contoso Bug Bashers.
3. Ensure the Excel file you opened in the Azure RemoteApp session is closed. Do NOT save changes to the files.
Demo Sequence
Speaker Script Click Steps
Use MyApps to Access Applications Important: Use GarthF’s browser session (in IE or Edge) for
this portion of the demo.
In your Enterprise, you may have Mac users such as
graphic designers. You’ll want to ensure all platforms 1. Bring up the browser session with the My Apps Portal
can be equally productive. (logged in as GarthF).
18
Demo Guide En
I’ll log in to MyApps using my corporate credentials, Online. Note the login-free SSO experience in new
and I can see all the applications available to me. brower tab.
Applications can be easily launched (office 365, 28. Go back to the Access Panel Apps browser tab.
Corporate Twitter). Using single sign-on I am 29. Click Salesforce.
redirected directly to the page.
30. Authorize the login on your phone (multi-factor
Notice there are SaaS apps, custom apps, and on- authentication) by accepting the call on your mobile
premises apps, displayed. phone and responding to the authentication request.
31. Note the login-free SSO experience to Salesforce in a
new browser tab.
I also have the ability to perform self-service on my
account that really empowers me to get my work
done. I can add myself to groups, to add applications. 32. Go back to the Access Panel Apps browser tab.
I can reset, and change my own password. Self- 33. Click groups.
service is a very effective cost cutting method by
34. Change My groups drop-drown to All.
reducing help desk calls.
35. Scroll down the page, then click on ssg-Contoso Bug
By joining the Contoso Bug Bashers security group, I Bashers.
was automatically granted access to the BrowserStack
36. Click Join group.
application.
37. In the pop-up window, click Request. (You will be auto-
approved.)
38. Click applications to go back to the applications page.
39. Refresh the page. Note the inclusion of a new application
on the page: BrowserStack.
Review Azure Security Reports Note: Use Global Administrator’s browser session for this
portion of the demo.
You can use Azure AD Premium’s access and usage
reports to learn the integrity and security of your 1. Bring up the browser session with Microsoft Azure
organization’s directory. With this information, you Management Portal (Global Admin user).
can better determine where possible security risks 5. In the ACTIVE DIRECTORY workspace, click Contoso
might exist so that you can adequately plan to <TenantName>.
mitigate those risks. There are four categories I will 6. Click the REPORTS tab.
show you today: anomalous activity, activity logs,
integrated applications, and premium reports.
40. Click Sign ins from unknown sources.
You can use Azure AD Premium’s access and usage
reports to learn the integrity and security of your
organization’s directory. With this information, you 41. Click Sign ins after multiple failures.
can better determine where possible security risks 42. Click CONFIGURE.
might exist so that you can adequately plan to 43. In the NUMBER OF CONSECUTIVE FAILED SIGN INS
mitigate those risks. There are four categories I will CONSIDERED ANOMALOUS box, type 5.
show you today: anomalous activity, activity logs, 44. Click SAVE.
integrated applications, and premium reports.
Anomalous activity reports
This report indicates users who have successfully 45. Click Sign ins from multiple geographies.
signed in to your directory while assigned a client IP 46. Click Users.
19
Demo Guide En
address that has been recognized by Microsoft as an 47. Click Aarif Sherzai to highlight, then point to the buttons
anonymous proxy IP address. People often use these at the bottom of the page:
proxies if they want to hide their computer’s IP
address, and they might be used for malicious intent
—sometimes hackers use these proxies. Results from
this report will show the number of times a user
successfully signed in to your directory from that 48. Click MANAGE MULTI-FACTOR AUTH.
address and the proxy’s IP address. 49. Place checkmark next to Aarif Sherzai’s display name.
Sign ins after multiple failures report indicates 50. Under quick steps, click Enable.
users who have successfully signed in after multiple 51. Review About enabling multi-factor auth, then click
consecutive failed sign-in attempts. Possible causes Cancel.
include users had forgotten their passwords, or users
are victims of successful password-guessing brute
force attacks. Results from this report will show you
the number of consecutive failed sign-in attempts
made prior to the successful sign-in and a timestamp
associated with the first successful sign-in.
Sign ins from multiple geographies report includes
successful sign-in activities from a user where two
sign ins appeared to originate from different regions
and the time between the sign ins makes it
impossible for the user to have travelled between
those regions. Possible causes include users sharing
their passwords, users using remote desktop
connections to launch a web browser for sign in, or a
hacker signing in to a user’s account from a different
country. Results from this report will show you the
successful sign-in events, together with the time
between the sign ins, the regions where the sign ins 52. Go back to the Active Directory browser tab, if necessary,
appeared to originate from, and the estimated travel then click Audit report.
time between those regions.
Device management
56. Click Password reset registration activity.
Directory synchronization
Domain management 57. Click Self-service groups activity.
Group management
Partner administration 58. Click Application usage.
20
Demo Guide En
Microsoft Advanced Threat Analytics Note: The ATA demo suggested here will be performed using
a static web site with limited functionality. For fully functional
Microsoft Advanced Threat Analytics or ATA, is an on- ATA demo, please connect to https://atademo in the
premises product, that helps IT protect their Microsoft CorpNet or use the ATA Center demo virtual
enterprise from advanced targeted attacks by machine.
automatically analyzing, learning and identifying
normal and abnormal entity behavior. Entity can be a 1. Browse to the static ATA demo site, located at
user, a device or simply a resource in the network. https://atademoui.azurewebsites.net/.
22
Demo Guide En
compromises. Eventually we see the attacker 15. Click Back (browser navigation) to return to Timeline.
attempting to elevate their privilege to a domain
administrator account, possibly their ultimate goal.
In this instance the attack was detected by ATA with
16. Scroll up to Suspicion of Identity Theft based on
the help of data provided by a third party SIEM
Abnormal Behavior.
solution which was configured to forward Windows
security events to ATA – in this case a SIEM solution.
The third-party software was already collecting these 17. Scroll up to Identity Theft Using Pass-the-Ticket
events, so no additional configuration was required Attack.
there beyond the event forwarding itself.
All of ATA’s detection algorithms are self-learning,
allowing it to detect suspicious activities from the first 18. Scroll up to Remote Execution Attempt Detected.
minute it’s deployed, without the need to configure
or tweak rules, baselines, or thresholds; you simply
plug it in and off it goes.
Also you can configure ATA to send an event to your
SIEM system for each suspicious activity with a link to
the specific event on the attack timeline.
In summary, ATA uses machine learning in its
deterministic and detection engine to establish an
understanding of the normal patterns of behavior for
both users and entities, and it’s that unique capability
that allows us to provide timely and accurate alerts
across a huge variety of attack vectors.
Introducing Microsoft Cloud App Security Note: To get a better understanding of CAS you will be using
(CAS) a static website (canned environment) with full functionality.
This is a shared environment accessible to others who are
As an IT professional to Executive Officer of any also interested in CAS. So please use this site to only VIEW
business, ask yourselves these questions when and EXPLORE ONLY. DO NOT MAKE ANY EDITS TO THIS
referencing Cloud Applications: Do you know how DOCUMENT.
many cloud apps your users may be using? Do you
know if customers Personally Identifiable Information
(PII) are located on these apps? Do you know if these
apps are secure or not?
Now to introduce you to Microsoft’s CAS. This newly
added feature does not just apply to Microsoft
specific cloud applications but also public and line of
business applications as well. The vision behind CAS
is to empower businesses of all sizes with:
Visibility: the ability to Discover & Investigate
Protection: the ability to Control & Respond
We'll look at how you can gain deeper visibility,
stronger controls and enhanced security for your
23
Demo Guide En
The service provides a wide set of capabilities 1. On the Top Navigation Bar, click Discover.
for securing cloud applications, allowing companies 60. Click Discovery Dashboard.
to discover, investigate, control and protect their data
in the cloud.
Discovery Dashboard
Moving on to the discovery dashboard.
The Discovery Dashboard provides a detailed
overview of all cloud applications being used in the
organization. It identifies all users and IP addresses
accessing the application. It also conducts a risk
assessment and automated risk score for each app.
Since the data is collected via logs, through
firewalls and proxies, there is no need to deploy
additional agents. These tasks can also be automated.
As you can see the company has 500+ apps
and 12 are specifically risky. If you scroll down, you
can also see top services used and top risky services.
You can also see if the apps being used are
sanctioned or unsanctioned.
Discovered Apps
To drill down, let’s click on discovered apps:
Here you see all of the discovered apps in the
organization. You can see all sanctioned (approved
by my organization) and unsanctioned apps. You can 61. On the Cloud Discovery Navigation Bar, click 512
easily filter based on the name, activity time frame or Discovered App.
the risk score associated with the application. You can
62. Scroll down until you see the Categories section in the
also filter by a category: for instance collaboration
Left Navigation Bar.
apps.
63. Under Categories, click Collaboration to filter only
You can also drill down on a specific app. For this, Collaboration apps.
let’s click on Office 365. With a simple drill down here
is the risk assessment and risk score for Office 365.
CAS not only discovers more than 13,000 cloud 64. Scroll up to the top of the page.
applications in use but it also provides an automated 65. Under the Score column, click Office 365’s score, 10.
risk score by evaluating each discovered service Note: Do not click on the Office 365 label itself (this will take
against more than 60 parameters. you to a different page, described later).
Here you can see all of the different parameters used 66. Scroll down to parameter labeled HTTP Security
for the risk evaluation. You can dive into more details
24
Demo Guide En
for a specific parameter to get a breakdown on the Headers and hover over it.
score. You can also interact with this risk assessment
67. Scroll up to the top of the page.
by reporting new data or requesting score update.
68. Under the Score column, click on Office 365’s score, 10,
App Overview Charts to minimize the app details.
Discovering which apps are in use across your
organization is just the first step in making sure your
sensitive corporate data is protected. CAS also
provides powerful reporting and analytics capabilities
for you to gain the complete context of your cloud 69. Under the Name column, click Office 365.
usage: such as the breakdown of usage, app activity
or we can delve into specific users or IPs.
File Log
Once you sanction an app, you can gain granular
visibility into that app. You also have the ability to see
all activities across all apps and can easily apply filters
to this log.
You know that employees can make a simple mistake 70. On the Top Navigation Bar, click Investigate.
and make a file link viewable by the public. This type
71. Click Files.
of mistake can turn into a costly security incident.
Thanks to CAS you can now see and govern all files in
the cloud, with a very powerful and easy to use query
engine. It also provides all the information that you
need to perform a detailed investigation by showing
you who the owner(s) and collaborator(s)are of the
file. It can also show you the folder hierarchy, inspects
the content and provides easy mitigation options.
For example, you can sort by access level and find all
public files. Here you see all files and folders viewable
to the public.
File-Level Investigation
Let’s review 2 different scenarios regarding file-level
violations, to an existing policy that is currently in
72. On the Filtering Bar, click on the Access Level drop
place. Within these scenarios, the following topics
down menu.
about policies will be covered 1) allow you to
authorize legitimate files and 2) how to take action 73. Select Public (not Public Internet).
against suspicious/costly file violations.
For this, you will go to the Control menu at the top
navigation bar and click on policies: 74. On the Top Navigation Bar, click Control.
Within CAS, There is a very wide set of policies 75. Click Policies.
available to configure. You can either use out of the
box policies or build and customize your own.
Let’s filter the policies to find the file level policies.
25
Demo Guide En
26
Demo Guide En
Visibility and controls are not enough if not coupled 92. To the left of the more information icon, locate the
with a powerful detection engine that can provide check mark but do not click it.
insights and alerts.
The alerts center gathers alert of a wide variety of
categories, including threat detection, privileged
accounts and compliance violations.
Let’s see how CAS helps you detect anomalies and
prevent threats.
To do this you will go to the “Alerts” menu. The alerts
center gathers all the red flags identified by CAS
including anomaly and threat detection compliance
violations and privileged accounts.
Let’s look into the general anomaly detection alert:
CAS advanced machine learning heuristics learns how 93. On the Top Navigation Bar, click Alerts.
each user interacts with each SaaS app and through
behavioral analysis, assesses the risk in each
transaction.
Here you can see a user who is an administrator
94. Scroll down to the first General Anomaly Detection
performing suspicious activities such as logging in
alert.
from a new anonymous location and two countries
simultaneously within an hour with several failed 95. Click General Anomaly Detection.
login attempts. you can take look at the details of
the activity and take action to mitigate any threats Note: If you click on any alert in the Activity Log, you can
right away. view a detailed report of that specific alert.
This concludes this demonstration. As you have seen,
Microsoft CAS is a comprehensive solution for
gaining deeper visibility, stronger controls and
enhanced security for your cloud apps. I would like to
emphasize - We not only support Microsoft cloud
27
Demo Guide En
Demo Reset
1. Go back to the MyApps portal (as GarthF) and leave group for sso-Contoso Bug Bashers.
Add Your Authentication Phone and Email (for MFA verification) to Hero User
Note: You may already have performed these steps for Azure AD demo configuration.
1. Open a new browser session in InPrivate mode (<CTRL>+Shift+P).
1. Log in to your demo tenant’s Azure admin portal https://manage.windowsazure.com/ as Global Admin,
admin@<TENANT>.onmicrosoft.com (corporate account) and password: pass@word1
2. In the list of ALL ITEMS, locate and click on your tenant’s directory name, labeled as Contoso <TENANT>.
3. Click USERS to view list of all directory users.
4. Locate and click on Garth Fort (garthf@<tenant>.onmicrosoft.com) in the directory.
5. In the WORK INFO page, scroll down to Authentication Contact Info, then fill in the following info:
a. Authentication Phone: (provide your actual, real world mobile phone number)
b. Authentication Email: (provide your actual, real world email address)
6. Click Save.
28
Demo Guide En
11. Repeat steps 10-11 for any other users/custom demo personas that you may have added that require an EMS
license.
29
Demo Guide En
15. In the same browser session, navigate to the Intune management console site, at https://manage.microsoft.com. If
you closed the previous browser session and are prompted for login, provide your demo tenant’s global admin’s
credentials.
16. In the left navigation pane, click ADMIN (icon at the bottom).
17. Under Administration links, click Mobile Device Management.
18. In the Mobile Device Management page, under iOS section, click Enable the iOS and Mac OS X platform.
19. In the Upload an APNs Certificate page, click button Download the APNs Certificate Request (step 1).
20. In the Save As pop-up window, provide a file name by typing it (e.g. “MyDemoCSRFile”). Take a note of the local
folder location you’re about to save the file to, then click Save.
21. Back on the Intune Admin page, click the link Apple Push Certificates portal (step 2). You will be taken to Apple
Push Certificates Portal web site.
Note: If you closed the previous browser session and are prompted for login, provide the Apple ID credentials you
set up earlier in step #2. Note: the password is not pass@word1 here!
22. Click Create a Certificate.
23. Accept Terms of Use by checking appropriate box and clicking Accept.
24. In the Create a New Push Certificate page, click Browse… under Vendor-Signed Certificate Signing Request.
25. Point to the .CSR file you saved to your local computer earlier (in step 6 above) and click Open.
26. Click Upload.
o If you see a prompt to download a .json file, ignore it.
o If you are not re-directed to a new page after 30 seconds, click Cancel, which will take you to Apple Push
Certificates Portal page.
27. Click Download to download the mobile Device Management certificate. Save the file to a local folder on your PC
with .pem file extension.
28. Return to the Intune Administration > Upload an APNs Certificate page.
30
Demo Guide En
29. Click Upload the APNs Certificate button.
30. Point to the APNs certificate you downloaded earlier (.pem file), type in the demo admin’s Apple ID, and click
Upload.
31. In the Apple ID field, type in the Apple ID email address used to register the certificate, then click Upload.
32. You will see a confirmation page stating iOS is ready for enrollment.
Your demo tenant is now ready to accept iOS devices for enrollment!
Next, you’ll need to ensure another Intune conditional access policy does not conflict with this policy (i.e. ensure
another policy that requires device enrollment for access to a corporate resource like SharePoint does not require
device enrollment:
9. Using Internet Explorer or FireFox browser, log in to the Intune management portal
(https://manage.microsoft.com) as a Global Administrator user of your demo tenant.
10. Go to POLICY > Conditional Access > SharePoint Online Policy
11. Ensure the Enable conditional access policy checkbox is UNCHECKED. If not, modify form values as follows:
a. Select Device platforms: All platforms
b. Select Targeted Groups: All users
c. UNCHECK Enable conditional access policy
d. Click Save.
32
Demo Guide En
c. Evernote (optional)
d. Concur (optional)
e. LinkedIn (optional)
38. Configure BrowserStack application:
a. Click BrowserStack from the list of applications.
b. In the Quick Access page ( ), click Assign accounts.
c. In the SHOW Groups STARTING WITH text box, type “ssg” then click search (checkmark icon ).
d. Highlight ssg-Contoso Bug Bashers, then click ASSIGN.
e. Click checkmark icon to Complete.
39. [Optional] Repeat step 8 for the following apps: Evernote, LinkedIn, Concur and ASSIGN to All Employees group.
33
Demo Guide En
1. In a new browser tab, navigate to https://developer.salesforce.com/signup.
2. Fill up the form as follows:
a. First Name: Contoso
b. Last Name: Admin
c. Dropdown option: Developer
d. Email: admin@<tenant>.onmicrosoft.com
e. Company: Contoso
f. Country/Postal Code: (as appropriate)
g. Username: admin@<tenant>.onmicrosoft.com
3. Check Master Subscription Agreement checkbox, then click Sign me up.
4. When promoted to check email to confirm account:
h. Launch a new, InPrivate browser session.
i. Sign in to https://outlook.office365.com as admin@<tenant>.onmicrosoft.com and pass@word1.
j. Locate the email from Salesforce and click on the link provided. You’ll be taken to Salesforce web site.
5. Provide a new password: pass@word1
6. Pick a security question and answer it.
7. Click Save. You’ll be taken to the Salesforce Home page. Keep this page open.
34
Demo Guide En
Important: Keep this page/dialog window open as you’ll need to copy values into Salesforce later.
14. Switch to the browser session with Salesforce.
15. In the left navigation, under Administer, expand Security Controls, then click Single Sign-On Settings.
20. On the left navigation pane in Salesforce, expand Domain Management, then click My Domain.
21. Under My Domain, type your tenant name (e.g. MOD46935) in the Subdomain text box, as shown:
22. Click Check Availability to verify, check Terms and Conditions, then click Register Domain.
36
Demo Guide En
23. Wait 10 minutes while your custom domain name is being published. Refresh until you see the graphic status on
the page move to Step 3 Domain Ready for Testing.
30. Go back to Security Controls > Single Sign-On Settings > AzureSSO, then click Edit.
31. Under Service Provider Initiated Request Binging, select HTTP Redirect, then Save.
32. Switch to the browser tab/session with Azure AD SSO configuration page.
33. Check the box for Confirm that you have configured single sign-on, then click next ().
37
Demo Guide En
47. Check the Start automatic provisioning now option, then click Complete icon .
38
Demo Guide En
39
Demo Guide En
40
Demo Guide En
21. In the Assign Groups dialog, check I want to enter Twitter credentials to be shared among all group members.
22. Type in the Twitter user name and password you set up earlier.
23. Check I want to enable automatic password rollover, then click next ().
24. In the Configure Password Rollover page, leave the default value (4 weeks) then click Complete.
41
Demo Guide En
43
Demo Guide En
Once finished adding users, click SAVE.
44
Demo Guide En
9. If you see a prompt saying “Your administrator doesn’t allow saving to personal locations.” then your MAM
Without Enrollment policies are working!
10. Tap OK, then Cancel to dismiss Save As attempt.
11. Tap back arrow () to close the Word document, then close Word app on your device.
45
Demo Guide En
Note: Depending on your internet speed, it may take 10-30 minutes for these apps to finish installing to your
device! We recommend you start by installing Outlook first as it requires further setup.
Setup Outlook/Emails/Dropbox:
27. When Outlook app has finished installing, tap on its icon to launch it.
28. If prompted to set up a numeric pin, tap an easy to remember 4-digit number, e.g. 1111.
29. In Add an Account page, tap Office 365.
30. In the Office 365 login page, paste Garth Fort’s corporate email address (garthf@<tenant>.onmicrosoft.com).
31. Type in GarthF’s password (pass@word1) then tap Sign in.
32. Dismiss the Outlook app tips.
33. Tap Settings at the bottom of the screen, then + Add Account.
34. Tap Outlook.com.
35. In the Outlook.com Sign in page, type your demo Live ID user email address (e.g. [email protected])
and select/copy the email address in clipboard memory (for use later).
36. Type the Live ID password then tap Sign in.
37. Let this app access your info? Tap Yes.
38. Tap Settings at the bottom of the screen, then + Add Account.
39. Tap Files > Dropbox.
40. In the Dropbox sign in page, paste your demo Live ID email address (e.g. [email protected]), type
password, then tap Sign in.
41. At the prompt “Let this app access your account info” tap Yes.
Setup/Configure Word
42. In Garth’s corporate inbox, scroll down and tap on an email from Alex Darrow (subject Northwind Proposal).
43. Tap Open in Word for the included email attachment. The Word app will launch.
44. Since this is the first time you’re launching Word app on this device, you’ll see several welcome messages and tips.
Dismiss all such messages.
45. When prompted to sign in to Office 365, provide GarthF’s credentials, and continue.
46. When the attachment document finally opens, tap the File menu icon in Word app, then Duplicate.
46
Demo Guide En
52. Close the Northwind Traders Proposal document by tapping the exit icon, .
c. If promoted, provide your Apple ID credentials for authentication to the App Store.
54. Launch the app on your device (the app will be labeled as RD Client.)
55. Within the Microsoft Remote Desktop app, tap the + button (top-right corner), then Add Azure RemoteApp, and
Continue.
56. In the Sign In page, provide your demo persona’s corporate login credentials: garthf@<tenant>.onmicrosoft.com,
then continue.
57. You will see the Microsoft Remote Desktop apps page, similar to below:
47
Demo Guide En
58. Tap Excel icon to launch. You may be prompted with a login screen again. Provide your demo persona’s email
address and password.
59. In the RemoteApp session of Excel, you’ll be prompted to Activate Office. Once again, provide your demo
persona’s email address, work account, and password.
60. In the First things first pop-up, choose Use recommended settings, then click Accept.
61. If you see no files listed under Open, Recent Workbooks, follow these steps:
a. Click Open Other Workbooks, One Drive – Contoso <Tenant>, then Browse.
b. Open the file Contoso Purchasing Data - 2014.xlsx from Garth Fort’s OneDrive for Business.
62. Close the Excel application window.
48