未加星标

Intune and Lookout: the architecture of the integration

字体大小 | |
[系统(windows) 所属分类 系统(windows) | 发布者 店小二05 | 时间 2016 | 作者 红领巾 ] 0人收藏点击收藏

Intune and Lookout: the architecture of the integration
Mylast blogI dedicated to the availability of the integration of the Microsoft Intune and Lookout Mobile Threat Protection cloud services.

So have this time have a look at the architecture of the integration, before writing about how to set everything up, the administrative and the end-user experience.

Introduction

Currently Microsoft Intune is hosted on Microsoft Azure and Lookout Mobile Threat Protection is hosted on Amazon Web Services. Microsoft Intune is still a fairly closed platform that currently has no public API that the different vendors and partners can use to interact with Microsoft Intune. PowerShell support for instance is for Intune is part of the plans of the Intune product group . (vote on User Voice)

For the integration with Lookout Microsoft created an Intune API especially for Lookout.

The architecture of the Integration

When the Intune and Lookout MTP tenants are “connected” Lookout MTP is able to gather user and device ID information from Azure Active Directory via the Microsoft Intune connector. Also Lookout MTP is federated with Azure Active Directory so that Single Sign On to the Lookout service is provided.

If a threat is detected Lookout MTP is able to share the threat level with Intune and based on the compliance policy, the user is allowed conditional access will allow or not allow access to for instance Office 365.

Looking at the figure below we will see how the services work together.


Intune and Lookout: the architecture of the integration
The Device is enrolled in and managed by Microsoft Intune. Lookout for Work client is connected with Lookout service and reports device state. If threat is detected it will be reported to the Lookout service. Information about the state of the device is shared between Intune and Lookout. If a threat is detected by lookout this is shared with Intune and checked if the compliance policy is configured to block or allow the threat level. Intune shares the compliance state in Azure AD, based on the threat level. Devices managed with Intune are also registered in Azure AD. Lookout gets device state and information from Azure AD (via Intune connector). Also Lookout is federated with Azure AD. In case of a threat the device compliance state is changed in Intune (via connection 3) and shared in Azure AD (via connection 4). Office 365 gets device compliance state of Azure AD. If compliant, access to Office 365 is permitted, if not access will be blocked. The Intune versus Lookout connector

After setting up the connection between Azure AD and Lookout via OAuth, every X number of minutes new devices will be discovered based on the users that are a member of one or more Azure AD security groups.


Intune and Lookout: the architecture of the integration
Compliance state

The compliance level of the device is determined by the following controls;

State Device / Lookout Compliance state Lookout for Work not installed Not compliant Lookout for Work not activated via AAD Not compliant Threat detected (None,Low, Med, High)

This medium threat level can be None (secure), Low, Medium or High.

I my next blog we will have a look at how to setup the connection between Lookout and Microsoft Intune.

Stay tuned!

Want to see the integration in action?
Intune and Lookout: the architecture of the integration

At IT/Dev Connections (10/10 10/13)I will show the same during at our full day Microsoft Enterprise Mobility +Security workshop ; How You Can Digitally Transform Any Organization on Monday ! Be sure to join Kenny Buntinx, Tim De Keukelaere and me in Las Vegas, there are still tickets available !

Other blogs in this series: Integration Microsoft Intune and Lookout Mobile Threat Protection is there Intune and Lookout: the architecture of the integration. Intune and Lookout: how to integrate? (coming soon) Intune and Lookout: the admin experience. (coming up) Intune and Lookout: the end user experience. (coming up) Intune and Lookout: supporting iOS devices (coming up)

本文系统(windows)相关术语:三级网络技术 计算机三级网络技术 网络技术基础 计算机网络技术

主题: PowerShelliOSOffice
分页:12
转载请注明
本文标题:Intune and Lookout: the architecture of the integration
本站链接:http://www.codesec.net/view/479692.html
分享请点击:


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 系统(windows) | 评论(0) | 阅读(48)