Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back, Sudbury ins
00:02
to the M s 3 65 Security Administration course
00:06
I'm your starter, Jim Daniels.
00:08
And today we're going to start module to identity and access.
00:13
Lesson one, user and group security, part one. Introduction and overview of identity access management.
00:21
In this lesson, you will undoubtable you learn about the evolution of identities, technology.
00:27
How important
00:28
identity is foreign organizations, security and the process of establishing a dent in it. Governance.
00:36
Again, I like means like pop culture. Our dad jokes. So you will find some of this scattered throughout these lessons.
00:45
Steve Carell love him.
00:47
I changed all my passports. Incorrect. So whenever I forget,
00:51
it will tell me your password is incorrect.
00:55
Another one
00:56
you have. The employees always forget their password isn't working.
01:00
They don't know why.
01:03
They always say, Hey, I haven't been fired. I haven't received my notice yet.
01:07
You know that password humor,
01:10
evolution of I T threats and the Microsoft identity security.
01:15
We here we have three different roads. We have one that's the identity of first of myself, actually took the technology,
01:23
identity and trends of the time
01:26
and the actual information technology that it encompassed.
01:30
So first local identities.
01:34
They were within your network within your location. Mainframes, PCs.
01:41
Next
01:42
we move toward Enterprise. Single sign on and two finger
01:46
you may be you have data centers that are spread out across multiple sites.
01:49
You have mobile devices that connect through the Internet. Maybe they're going through a VPN
01:55
back into your network
01:57
for this one. They take the domains they build on it
02:00
with enterprise Active directory as a replacement of the old Windows anti domains.
02:07
We also have smart card authentication.
02:10
Today
02:12
is more of a hybrid and Federated Cloud Identity.
02:15
We have everything before multiple data centers, mobile devices. But now we have more cloud cloud services. We have more Internet of things.
02:25
We have, ah, scatter information. You know, we may have a camera dump over here. Everything is flexible. Demands flexibility with, as right of directory,
02:38
passport of this authentication and hardware credential isolation. We're gonna go over some of these in specific detail as of course goes on. But as of now,
02:49
you need to recognize that in the beginning,
02:51
identity a day and security is totally different than it is now. He has really evolved into how we see it today is everywhere.
03:00
Some of the challenges that faces you with identity management.
03:06
73% of all passwords do focus.
03:09
8% of employees using unapproved APS Shadow I t.
03:14
81% of breaches or calls by credential theft.
03:17
See where we're going with this. So let's say your employees use
03:23
They use Facebook.
03:24
They have a Facebook account.
03:28
Maybe it is or isn't related to their work.
03:30
Facebook gets compromised
03:32
because the employee doesn't want to remember more than one password or variation.
03:38
All of a sudden, whoever has their Facebook information,
03:40
they know where they work. They can figure that out, and they're trying to log into their work account.
03:46
Past four is the same burned around
03:50
passwords and identity. This is where
03:53
security is really yelling. There is a focus on identity. It's the new perimeter.
03:59
The stages of evolution has your physical
04:01
network, your castle and moat, if you will.
04:04
Nothing was poked outside. There were no holes. Then we went to more of a network. Or maybe you have a D M Z. That was open up the certain applications. You have multiple data centers, multiple sites now, its identity
04:16
himself, controlling the physical access.
04:19
You look at the person, the attributes they belong to and you give them permission. Based on that, you give them just enough for mission that they need to do their job.
04:30
Dad, Jerk, Are you ready?
04:32
Which cheese protects a medieval castle?
04:35
If you've been staring this Saad, you're I know the answer. I'm a safe anyway. Move, Zarella.
04:42
Hopefully, I got at least five chuckles
04:45
ai role and a sigh somewhere. That's always best with the dad drinks. Get a solid I roll.
04:51
All right. Next, let's take a look at the identity governance process.
04:56
This will be how Microsoft recommends you flow in your process to get identity governance up and go. Number one, use the plane for users and groups.
05:05
You have to have a plan. What? You're naming scheme.
05:08
What policies were you gonna have? How is your creation has determination you need to plan for
05:14
If you don't have a plan ahead of place,
05:16
you're going to be changing and chemical processes on the fly, which isn't optimal
05:24
number. To secure your privilege Identities
05:28
plan. How you gonna secure your global admin? Camels?
05:30
Eternal wish users will even have that access level
05:34
number three. Configure hybrid identity
05:38
for the hybrid environments you want. Determine which on premise, identity and director you want to sink
05:45
with as right of directory.
05:46
You want to determine
05:48
basically your authentication. Method
05:51
them before
05:53
configure. Secure user authentication. Plan to set multi factor authentication as a second level layer of security for your users.
06:02
Determine how you're going to configure second authentication method when I'm per user account basis
06:09
for five. Simplify access for users.
06:13
If you can get five conditions
06:15
to work in 100 different scenarios, that is, must bear,
06:18
then having 50 different scenarios with 50 different conditions.
06:23
Simple fire.
06:25
Don't make them jump through hoops that they don't have to.
06:29
There's always that line between security and usability.
06:34
That depends on what compliance considerations you have, What legal ramifications and your organization. Security posture.
06:43
Finding that balance
06:45
between all of that
06:46
and usability
06:48
is a really delicate process.
06:50
Number six
06:51
utilize groups for easier management
06:55
work smarter, not harder.
06:58
We're gonna go over different ways. You can use groups either manually assigned,
07:01
um or dynamically a sign
07:04
to make your day to day management easier.
07:09
So in recap, M s 3 65 takes a comprehensive approach to identity security.
07:14
Identity has involved and has of all really quickly as the new perimeter and cybersecurity
07:20
establishing an identity governance system provides organizations a solid foundation
07:27
to Dota farm
07:28
her for you found this wasn't useful
07:30
and hopefully I will see you back for the next lesson.
07:34
Thank you.

Up Next

MS-500: Microsoft 365 Security Administration

The Microsoft 365 Security Administration course is designed to prepare students to take and pass the MS-500 certification exam. The course covers the four domains of the exam, providing students with the knowledge and skills they need to earn their credential.

Instructed By

Instructor Profile Image
Jim Daniels
IT Architect
Instructor