SlideShare ist ein Scribd-Unternehmen logo
1 von 40
 
 
 
 
Desktop Infrastructure Development Tools Windows Mobile Devices Partners Office Communication Server Silicon  Vendors Device Manufacturers ISVs and IHVs Mobile Operators Solution Providers
Helping businesses thrive by enabling people with smart devices to perform their best when mobile
DEMO ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object]
 
Management Security Mobile VPN
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Smartcard Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile GW Back Firewall SSL Mutual User Auth SSL  Auth (PIN+Corp Root) SSL  Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD LHS NAP System Self Help Site Enrollment Service OMA Proxy CA Mobile VPN
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile Gateway Server Back Firewall SSL  Auth (PIN+Corp Root) SSL  Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service Device  Management Server CA Mobile VPN
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Create  Acct. Issue Cert Negotiate SSL Root Submit Cert Request Receive Cert Public DNS Discovery
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile Gateway Server Back Firewall SSL  Auth (PIN+Corp Root) SSL  Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service Device  Management Server CA Mobile VPN
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Double envelope security User Authentications: 1) Certificate 2) NTLM v2 3) Basic Kerberos delegation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile Gateway Server Back Firewall SSL  Auth (PIN+Corp Root) SSL  Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service Device  Management Server CA Mobile VPN
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DMZ WWAN Corpnet Internet
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security  Management Device  Management Mobile VPN SCCM SCMDM Std CAL Ent CAL System Center Configuration Manager System Center Mobile Device Manager Exchange Mobile Scenarios
© 2007 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

Weitere ähnliche Inhalte

Was ist angesagt?

Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)jasonlan
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and UpdateCisco Canada
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancyDevam Shah
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureEmirates Computers
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products OverviewDell
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecurityYoav Crombie
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewNick Owen
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenspjpallen
 
SphereShield for Webex Teams & Meetings - Compliance and Security
SphereShield for Webex Teams & Meetings - Compliance and SecuritySphereShield for Webex Teams & Meetings - Compliance and Security
SphereShield for Webex Teams & Meetings - Compliance and SecurityYoav Crombie
 
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...ForgeRock
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSOAjit Dadresa
 
SphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and SecuritySphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and SecurityYoav Crombie
 

Was ist angesagt? (20)

Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
Soa security2
Soa security2Soa security2
Soa security2
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Sem cis ise
Sem cis iseSem cis ise
Sem cis ise
 
Introducing ThinkPhone
Introducing ThinkPhoneIntroducing ThinkPhone
Introducing ThinkPhone
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
 
Single Sign On - The Basics
Single Sign On - The BasicsSingle Sign On - The Basics
Single Sign On - The Basics
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and Security
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
SphereShield for Webex Teams & Meetings - Compliance and Security
SphereShield for Webex Teams & Meetings - Compliance and SecuritySphereShield for Webex Teams & Meetings - Compliance and Security
SphereShield for Webex Teams & Meetings - Compliance and Security
 
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
 
SphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and SecuritySphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and Security
 

Andere mochten auch

Homeschooling enrollment skyrocketing as parents seek to protect children fro...
Homeschooling enrollment skyrocketing as parents seek to protect children fro...Homeschooling enrollment skyrocketing as parents seek to protect children fro...
Homeschooling enrollment skyrocketing as parents seek to protect children fro...World Truth
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authenticationPaulo Martins
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
Mobiilsed seadmed 2015
Mobiilsed seadmed 2015Mobiilsed seadmed 2015
Mobiilsed seadmed 2015Priit Tammets
 
Doing sports in Kuressaare
Doing sports in KuressaareDoing sports in Kuressaare
Doing sports in Kuressaaresociety_project
 
Pildimäng1
Pildimäng1Pildimäng1
Pildimäng1Jane
 
Sagadi Looduskooli Digilaager
Sagadi Looduskooli DigilaagerSagadi Looduskooli Digilaager
Sagadi Looduskooli DigilaagerPriit Tammets
 
Mõnda fotograafiast
Mõnda fotograafiastMõnda fotograafiast
Mõnda fotograafiastbirge
 
Fotograafia
FotograafiaFotograafia
FotograafiaTiia Tia
 
Eesti Lossid ja Klostrid
Eesti Lossid ja KlostridEesti Lossid ja Klostrid
Eesti Lossid ja Klostridkrugol
 
Koosvõimeline WordPress
Koosvõimeline WordPressKoosvõimeline WordPress
Koosvõimeline WordPressPeeter Marvet
 
Fotograafia
FotograafiaFotograafia
FotograafiaMaris
 
4 historitsism
4 historitsism4 historitsism
4 historitsismTiia Tia
 
Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012
Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012
Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012MerilisSlide
 
Fotograafia põhimõisted
Fotograafia põhimõistedFotograafia põhimõisted
Fotograafia põhimõistedPriit Tammets
 
Fotograafia ajalugu, 2. loeng
Fotograafia ajalugu, 2. loengFotograafia ajalugu, 2. loeng
Fotograafia ajalugu, 2. loengeerokangor
 
Fotograafia ja pilditöötlemise abc
Fotograafia ja pilditöötlemise abcFotograafia ja pilditöötlemise abc
Fotograafia ja pilditöötlemise abcMario Sillaste
 

Andere mochten auch (20)

Homeschooling enrollment skyrocketing as parents seek to protect children fro...
Homeschooling enrollment skyrocketing as parents seek to protect children fro...Homeschooling enrollment skyrocketing as parents seek to protect children fro...
Homeschooling enrollment skyrocketing as parents seek to protect children fro...
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
Mobiilsed seadmed 2015
Mobiilsed seadmed 2015Mobiilsed seadmed 2015
Mobiilsed seadmed 2015
 
Doing sports in Kuressaare
Doing sports in KuressaareDoing sports in Kuressaare
Doing sports in Kuressaare
 
Pildimäng1
Pildimäng1Pildimäng1
Pildimäng1
 
Sagadi Looduskooli Digilaager
Sagadi Looduskooli DigilaagerSagadi Looduskooli Digilaager
Sagadi Looduskooli Digilaager
 
Mõnda fotograafiast
Mõnda fotograafiastMõnda fotograafiast
Mõnda fotograafiast
 
Fotograafia
FotograafiaFotograafia
Fotograafia
 
Eesti Lossid ja Klostrid
Eesti Lossid ja KlostridEesti Lossid ja Klostrid
Eesti Lossid ja Klostrid
 
Koosvõimeline WordPress
Koosvõimeline WordPressKoosvõimeline WordPress
Koosvõimeline WordPress
 
Fotograafia
FotograafiaFotograafia
Fotograafia
 
Panoraamfotod
PanoraamfotodPanoraamfotod
Panoraamfotod
 
4 historitsism
4 historitsism4 historitsism
4 historitsism
 
Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012
Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012
Fotokogu - eripära & säilitamine. Merilis Roosalu . 9-4-2012
 
Smore - tutvustusjuhend
Smore - tutvustusjuhendSmore - tutvustusjuhend
Smore - tutvustusjuhend
 
Fotograafia põhimõisted
Fotograafia põhimõistedFotograafia põhimõisted
Fotograafia põhimõisted
 
Fotograafia ajalugu, 2. loeng
Fotograafia ajalugu, 2. loengFotograafia ajalugu, 2. loeng
Fotograafia ajalugu, 2. loeng
 
Fotograafia ja pilditöötlemise abc
Fotograafia ja pilditöötlemise abcFotograafia ja pilditöötlemise abc
Fotograafia ja pilditöötlemise abc
 
Riistvara praktikum
Riistvara praktikumRiistvara praktikum
Riistvara praktikum
 

Ähnlich wie Technet System Center Mobile Device Manager Presentation

Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - PresentationAGATSoftware
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Jorgen Thelin
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 

Ähnlich wie Technet System Center Mobile Device Manager Presentation (20)

Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 

Kürzlich hochgeladen

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 

Kürzlich hochgeladen (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Technet System Center Mobile Device Manager Presentation

  • 1.  
  • 2.  
  • 3.  
  • 4.  
  • 5. Desktop Infrastructure Development Tools Windows Mobile Devices Partners Office Communication Server Silicon Vendors Device Manufacturers ISVs and IHVs Mobile Operators Solution Providers
  • 6. Helping businesses thrive by enabling people with smart devices to perform their best when mobile
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.  
  • 14.
  • 15.  
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Smartcard Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile GW Back Firewall SSL Mutual User Auth SSL Auth (PIN+Corp Root) SSL Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD LHS NAP System Self Help Site Enrollment Service OMA Proxy CA Mobile VPN
  • 24.
  • 25. Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile Gateway Server Back Firewall SSL Auth (PIN+Corp Root) SSL Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service Device Management Server CA Mobile VPN
  • 26.
  • 27. Create Acct. Issue Cert Negotiate SSL Root Submit Cert Request Receive Cert Public DNS Discovery
  • 28.
  • 29.
  • 30. Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile Gateway Server Back Firewall SSL Auth (PIN+Corp Root) SSL Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service Device Management Server CA Mobile VPN
  • 31.
  • 32. Double envelope security User Authentications: 1) Certificate 2) NTLM v2 3) Basic Kerberos delegation
  • 33.
  • 34.
  • 35. Internet DMZ Corporate Intranet Front Firewall Initial OTA Device Enrollment Mobile Gateway Server Back Firewall SSL Auth (PIN+Corp Root) SSL Machine Mutual Auth E-mail and LOB Servers SSL User- mutual Auth or Similar Console Mobile Server Back-end R/O AD WSUS Catalog Self Help Site Enrollment Service Device Management Server CA Mobile VPN
  • 36.
  • 37. DMZ WWAN Corpnet Internet
  • 38.
  • 39. Security Management Device Management Mobile VPN SCCM SCMDM Std CAL Ent CAL System Center Configuration Manager System Center Mobile Device Manager Exchange Mobile Scenarios
  • 40. © 2007 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.