-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Updating Success Criteria and other updates
- Loading branch information
Showing
11 changed files
with
129 additions
and
21 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
--- | ||
sidebar_position: 4 | ||
title: Success Criteria | ||
--- | ||
|
||
# Success Criteria for Entra Suite POC | ||
|
||
> Checklist for Evaluating POC Success for Entra Suite | ||
**Demonstrate the capabilities of Entra Suite's feature set:** | ||
|
||
* Entra identity governance | ||
* Entra Private Access | ||
* Entra Internet Access | ||
* Entra Identity protection | ||
* Entra Verified ID | ||
|
||
## Established criteria for success to guide future deployment decisions based on the following scenarios: | ||
|
||
### Enhanced workforce and guest lifecycle | ||
|
||
* Securely onboard employees using Entra Verified ID | ||
* Use Entra ID Governance to create and grant access to applications using access packages | ||
* Provide access to resources to external users (guests) using Access Packages with Entra Verified ID | ||
* Setup Entra Identity Protection to monitor and protect accounts from risky sign-ins and user behavior | ||
* Create CA policy to enforce access controls based on risk level, location and device | ||
|
||
### Modernize remote access | ||
|
||
* Deploy and configure Global Secure access client | ||
* Setup Private access connector to extend access to any private recourse securely | ||
* Publish an application using Entra Private Access (commonly a new or existing File share) | ||
* Create necessary profiles and CA policies as desired | ||
* Test users to connect to this private app without requiring a VPN solution | ||
|
||
### Govern internet access based on business needs | ||
|
||
* Deploy and configure Global Secure access client | ||
* Create security profile and web content filtering including a baseline policy and proper samples | ||
* Create a security profile that enabled users to access hacking web category | ||
* Use Entra ID Governance to create access packages with groups resources that allows our scenario departments to access multiple security profiles with limited time | ||
* Create proper conditional access policies to control and scope to groups of enforcement | ||
* Confirm that traffic is appropriately granted with traffic logs with test users | ||
|
||
## Next Steps | ||
|
||
* Compile a comprehensive report on POC results. | ||
* Recommendations for full-scale implementation based on POC findings | ||
* Outline a timeline and resource plan for deployment. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
--- | ||
sidebar_position: 7 | ||
sidebar_position: 8 | ||
title: Service Partners resources | ||
--- | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
--- | ||
sidebar_position: 9 | ||
sidebar_position: 10 | ||
title: Licensing and Documentation | ||
--- | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
--- | ||
sidebar_position: 5 | ||
sidebar_position: 6 | ||
title: Modernize remote access | ||
--- | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
--- | ||
sidebar_position: 6 | ||
sidebar_position: 7 | ||
title: Govern internet access based on business needs | ||
--- | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,6 +1,6 @@ | ||
--- | ||
sidebar_position: 3 | ||
title: POC Overview | ||
title: Proof of Concept Overview | ||
--- | ||
# Entra Suite POC Overview | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
--- | ||
sidebar_position: 4 | ||
title: Success Criteria | ||
--- | ||
|
||
# Success Criteria for Entra Suite POC | ||
|
||
> Checklist for Evaluating POC Success for Entra Suite | ||
**Demonstrate the capabilities of Entra Suite's feature set:** | ||
|
||
* Entra identity governance | ||
* Entra Private Access | ||
* Entra Internet Access | ||
* Entra Identity protection | ||
* Entra Verified ID | ||
|
||
## Established criteria for success to guide future deployment decisions based on the following scenarios: | ||
|
||
### Enhanced workforce and guest lifecycle | ||
|
||
* Securely onboard employees using Entra Verified ID | ||
* Use Entra ID Governance to create and grant access to applications using access packages | ||
* Provide access to resources to external users (guests) using Access Packages with Entra Verified ID | ||
* Setup Entra Identity Protection to monitor and protect accounts from risky sign-ins and user behavior | ||
* Create CA policy to enforce access controls based on risk level, location and device | ||
|
||
### Modernize remote access | ||
|
||
* Deploy and configure Global Secure access client | ||
* Setup Private access connector to extend access to any private recourse securely | ||
* Publish an application using Entra Private Access (commonly a new or existing File share) | ||
* Create necessary profiles and CA policies as desired | ||
* Test users to connect to this private app without requiring a VPN solution | ||
|
||
### Govern internet access based on business needs | ||
|
||
* Deploy and configure Global Secure access client | ||
* Create security profile and web content filtering including a baseline policy and proper samples | ||
* Create a security profile that enabled users to access hacking web category | ||
* Use Entra ID Governance to create access packages with groups resources that allows our scenario departments to access multiple security profiles with limited time | ||
* Create proper conditional access policies to control and scope to groups of enforcement | ||
* Confirm that traffic is appropriately granted with traffic logs with test users | ||
|
||
## Next Steps | ||
|
||
* Compile a comprehensive report on POC results. | ||
* Recommendations for full-scale implementation based on POC findings | ||
* Outline a timeline and resource plan for deployment. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,25 +1,25 @@ | ||
--- | ||
sidebar_position: 7 | ||
title: Product Training Hubs | ||
sidebar_position: 9 | ||
title: Entra Suite products training hubs | ||
--- | ||
# π« Product Training Hubs | ||
|
||
Explore the products included in the Entra Suite with our Training Hubs and POC-in-a-Box resources | ||
|
||
## Unlock the Power of Identity Governance ![igalogo](../images/IGALogo3.png) | ||
## Unlock the power of Microsoft Entra identity governance | ||
|
||
> Empower Your Identity Management Journey with Microsoft Entra ID | ||
- [Microsoft Entra identity governance Training Hub](https://aka.ms/entraidgovernancetraining) | ||
|
||
## Unlock the power of identity-centric secure network access ![sselogo](../images/InternetAccesslogo2.png) | ||
## Unlock the power of identity-centric secure network access | ||
|
||
> Master Microsoft's Security Service Edge (SSE) solution by becoming an expert in Microsoft Entra Internet Access and Microsoft Entra Private Access. | ||
- [Global Secure Access Training Hub](https://aka.ms/GlobalSecureAccessTraining) | ||
- **[Global Secure Access Training Hub](https://aka.ms/GlobalSecureAccessTraining)** | ||
|
||
## Microsoft Entra Identity Protection POC in a box deck ![idprotectionlogo](../images/Idprotectionlogo2.png) | ||
## Microsoft Entra identity protection POC deck | ||
|
||
> Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions | ||
- [Microsoft Entra Identity Protection POC Deck](../Assets/Entra_Suite_Microsoft_Identity_Protection_POC_in_a_Box.pptx) | ||
- **[Microsoft Entra Identity Protection POC Deck](../Assets/Entra_Suite_Microsoft_Identity_Protection_POC_in_a_Box.pptx)** |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters