utilize an enterprise’s current active directory ® structure to deploy and manage windows mobile...

27
System Center Mobile Device Manager

Upload: edgar-farmer

Post on 23-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

System Center Mobile Device Manager

Page 2: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Microsoft System Center Mobile Device Manager 2008

Management

Security

Mobile VPN

Page 3: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Active Directory® and Group Policy Utilize an enterprise’s current Active Directory® structure to deploy and manage Windows Mobile devices with:

Over 125 policies, including specific security policies for device management, encryption, and remote device wipeCustom policies that can be created using Active Directory Management Templates

Page 4: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Full OTA Provisioning

To enroll their devices, users simply need to:

Access the company’s portal for self-service enrollmentEnter their e-mail addressEnter a one-time PIN code for enrollment

Page 5: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Software distribution capabilities

Target users in specific Active Directory groupsConfigure mobile applications such that users cannot uninstall themEliminate the need to distribute CAB files via Flash drivesAccess powerful reporting systems for reviewing software distribution across a mobile device workforce

Page 6: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Rich inventory and reporting

Manage and view all Windows Mobile devices via a single, convenient interface. With this, IT Pros can now:

View a broad range of device characteristics like device settings, certificates installed, software installed etc.Reduce the learning curve since it is based on the familiar Microsoft Management Console (MMC)

Page 7: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Hardware driver lock-down capabilityAdministrators can remotely access Windows Mobile devices using Mobile Device Manager to:

Disable specific hardware functionality, such as the camera or Bluetooth connectivityRemotely wipe security-compromised devices

Author
Is it OK to distort logos?
Page 8: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Mobile VPN

Single point of access to the corporate networkAlways-on, security-enhanced wireless communicationBehind-the-firewall access to business applications

Page 9: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

MDM Deployment Topology

Smartcard

Internet

DMZ

Corporate Intranet

FrontFirewall

InitialOTA DeviceEnrollment

MobileGW

BackFirewall SSL Mutual

User Auth

SSL Auth(PIN+Corp Root)

SSL MachineMutual Auth

E-mailand LOBServers

SSL User-mutual Auth

or Similar

Console

MobileServer

Back-end

R/O

AD

LHSNAP System

Self HelpSite

EnrollmentService

OMAProxy

CA

Mobile VPN

Page 10: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Server ArchitectureMDM introduces three new server

roles:Enrollment Server

Proxies request to enroll device

Mobile VPN ServerTypically located in the network perimeterEntry point to corporate networkForwards network and device management communications between a corporate network and their devices

Device Management ServerBased on OMA DM standards

Architecture PrinciplesSecurity firstLarge scale distributed solutionTransparent compatibilityExtensibility & future proofing

Page 11: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

The Enrollment Server

Internet

DMZ

Corporate Intranet

FrontFirewall

InitialOTA DeviceEnrollment

MobileGatewayServer

BackFirewall

SSL Auth(PIN+Corp Root)

SSL MachineMutual Auth

E-mailand LOBServers

SSL User-mutual Auth

or Similar

Console

MobileServer

Back-end

R/O

AD

WSUS Catalog

Self HelpSite

EnrollmentService

Device Managem

entServer

CA

Mobile VPN

Page 12: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Enrollment Server• Location:

• Intranet based (domain joined server/service)• Purpose:

• Manage the process flow of enrollment• Create domain objects• Create certificates• Supply provisioning instructions

• Other:• Best practice: protected by a Proxy (e.g. ISA)• Can co-exist on DM Server in integrated

implementation

Page 13: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

The Enrollment Process

Active Director

y

Certification

Authority

Create Acct.

Issue Cert

Negotiate SSL RootSubmit Cert

RequestReceive Cert

Public DNS

Discovery

Page 14: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Security Features

Private key and Enrollment Password never transmitted over the airAll traffic between client and server uses SSLSSL negotiation does not require public root cert (e.g. VeriSign etc.)

Page 15: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Secure Network Access

Mobile VPN for both client and serverStandards based

IPSec Tunnel ModeMobIKEIKEv2

Enables access to corporate resources

LOBInternet proxy servers

Page 16: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

The Mobile VPN

Internet

DMZ

Corporate Intranet

FrontFirewall

InitialOTA DeviceEnrollment

MobileGatewayServer

BackFirewall

SSL Auth(PIN+Corp Root)

SSL MachineMutual Auth

E-mailand LOBServers

SSL User-mutual Auth

or Similar

Console

MobileServer

Back-end

R/O

AD

WSUS Catalog

Self HelpSite

EnrollmentService

Device Managem

entServer

CA

Mobile VPN

Page 17: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Mobile VPN Server• Location:

• Corporate DMZ (non-domain joined)• Purpose:

Authenticates incoming connections for authorized devicesAssigns a stable internal IP address for the deviceEnables fast resume/reconnect features for devices and applicationsNegotiates keys to encrypt traffic over the internet

• Other:• IPSEC termination point• Managed remotely

Page 18: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

FW

18

VPN Scenario: LOB Application

FW

LOB1

Proxy (ISA)

LOB2

Double envelope security

User Authentications:1) Certificate2) NTLM v23) Basic

Kerberos delegation

Page 19: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Mobile VPNPerformance

Technical featuresIPSec Tunnel Mode

Aggregate all traffic through a single tunnel with a single NAT/Firewall Keep-Alive

IKEv2IETF Standard that includes address assignment (unlike IKEv1)

MobIKE (Mobile IKE)IETF standard for transparent auto recovery of IPSec tunnels w/o re-negotiations of Sas

ImplicationsExtremely efficient, agile and self-healing connectivity solution

SecurityDouble envelope security

VPN technology allows nested secure connectionsOuter layer – IPSec, IKEv2 tunnel from device to GWInner layer – E-2-E Client-Server mechanisms (SSL, IPSec transport, etc)

Defense in depth DMZ pre-auth

Based on device identity and health (not user)

End-to-End auth to corporate servers“Four factor” (2x2) authentication Back-end firewall filtering

DMZ GW is not a vulnerability point

Page 20: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Device Managment

Security managementEnrollmentAD domain joinWipe

Policy enforcementService enablement/disablementApplication deny/allowSoftware distributionInventory and reporting

Page 21: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Device Management Server

Internet

DMZ

Corporate Intranet

FrontFirewall

InitialOTA DeviceEnrollment

MobileGatewayServer

BackFirewall

SSL Auth(PIN+Corp Root)

SSL MachineMutual Auth

E-mailand LOBServers

SSL User-mutual Auth

or Similar

Console

MobileServer

Back-end

R/O

AD

WSUS Catalog

Self HelpSite

EnrollmentService

Device Managem

entServer

CA

Mobile VPN

Page 22: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Device Management Server• Location:

• Intranet based (domain joined server/service)• Purpose:

Primary administration and management service for all managed devicesFunctional hub for device Group Policy application, device software packages, and device data wipesCommunicates with existing infrastructure servers, such as domain controllers, CAProxies information and commands between core Windows Servers (AD/CA) and devices

• Other:• OMA-DM compliant

Page 23: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

23

DM Server

Bringing it all together

FWFW

Mobile VPN

DMZ

WWAN

Corpnet

Internet

NAT

Policy Information

Enrollment Server

Page 24: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

IT Infrastructure Details

Required:Windows Server 2003 SP2 64 bitSQL Server 2005Active DirectoryMicrosoft CAGroup Policy

Not Required:Exchange Server (any version)Systems Management ServerSystems CenterISA Server*

Page 25: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Which Solution Fits My Needs?

Security Management

Device Management

MobileVPN

SCCMSCMD

M

Std CAL

Ent CAL

System Center

Configuration Manager

System Center Mobile Device

Manager

ExchangeMobile Scenarios

Page 26: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

Secure Mobile Messaging Only

Mobile messaging with high security due to regulatory compliance requirements or internal security policiesKey Messages

Security management withoutExchange Enterprise CALIntegration with AD/GPInventory and reporting

Customer ScenariosWho needs Mobile Device Manager?

LOB OnlyRich LOB applications for task workers using ruggedized handhelds with no requirement for mobile messaging

Key MessagesMobile VPNOver-the-air (OTA) app distributionRich inventory and reportingApp allow/deny

LOB + MessagingRich or lightweight LOB applications. Could also include high security requirements for mobile messagingKey Messages

Mobile VPNAdvanced device management featuresSecurity management

Mobile Messaging OnlyMobile messaging and PIM withlowest TCO and baseline securityand manageabilityKey Message

Exchange Standard CAL makes broad deploymentstraightforward and affordableExchange Enterprise CAL adds server-side anti-virus and anti-spam + new management in Exchange Server 2007 SP1

P

Page 27: Utilize an enterprise’s current Active Directory ® structure to deploy and manage Windows Mobile devices with: Over 125 policies, including specific

© 2007 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.