• Making IT Work
  • 0800 8047 256
  • information@eacs.com
Improving Application Security with Domain Join and Device Registration in Azure 18/10/2017Improving Application Security with Domain Join and Device Registration in Azure 18/10/2017Improving Application Security with Domain Join and Device Registration in Azure 18/10/2017Improving Application Security with Domain Join and Device Registration in Azure 18/10/2017
  • About Us
    • Our Story
    • Customer Charter
    • Customers
      • Case Studies
    • ISO Certifications
    • CSR Statement
    • Awards & Recognition
    • Policy Statements
  • Services
    • Services News
    • Managed Services
      • 24/7 Services
      • Device Services
      • Device as a Service
      • Infrastructure Services
      • Security Service
      • Print Service
      • Managed Support Services
      • Managed WAN
      • Case Studies
      • Datasheets
    • Modern Workplace
      • Digital Transformation
      • Strategy Consulting
      • Current State Assessment
      • Desktop Deployment
      • Hardware Products
      • Data Management Solutions
      • Software & Renewal
      • Procurement Portal
        • eacs Selector
      • Lifecycle Management
      • Benefits of Hardware & Software Services
      • Case Studies
      • Datasheets
    • Hybrid Cloud
      • Journey to the Cloud
      • Optimise Virtual Workspace
      • Cloud Migration
      • Cloud Solutions
      • Architecture & Planning
      • Project Management
      • Cloud Availability Suite
      • Case Studies
      • Datasheets
    • Cyber Security
      • Predict
      • Prevent
      • Detect
      • Respond
      • Cybersecurity Made Simple
      • Cyber Essentials
      • Datasheets
    • Apple Services
      • Case Studies
      • Datasheets
    • Apps & Data
      • The Power Platform
      • Data Intelligence
      • Case Studies
      • Datasheets
  • Partners
    • Hybrid Cloud
    • Modern Workplace
    • Security
    • Frameworks
      • Shared Business Services
  • Optimise IT
    • Agenda
    • Exhibitors
  • News & Resources
    • News
      • Featured News
      • eacs in the news
      • eacs Blogs
      • eacs Newsletters
    • Resources
    • Case Studies
    • Datasheets
  • Community
    • Charitable Activities
    • Environment
    • CSR Statement
  • Careers
    • Careers
      • Recruitment Process
    • People Stories
    • Policies
  • Contact
    • Marketing
✕
Image for Nutanix Blog. Image contains a man viewing lots of data.
EACS is a Nutanix Consulting Partner – Accredited to Deliver Professional Services to Nutanix Customers 16/10/2017
January 12, 2018
Image for Improve Productivity Blog. Image contains picture of people forming an arrow pointing up.
Improve The Productivity of Your IT Team by Embracing an Automation Strategy 05/12/2017
January 12, 2018
Published by Marketing on January 12, 2018
Categories
  • Resources
  • WhitePaper
Tags
Image for Improving Application Security Blog. Image contains picture of phone with all the types of applications you can access.

Improving Application Security with Domain Join and Device Registration in Azure

In a previous blog on Azure App Proxy we noted the ability to improve security in published applications using conditional access policies, which allow you to configure access based on group, location and specific application sensitivity.

Application sensitivity has become important for adding extra levels of protection to make sure access is not given to users who are potentially not who they say they are, or passing secure information onto an unmanaged device. One of these levels of protection is to verify that the machine connecting to the application is a domain joined machine within the organisation and therefore known to be in a good secure state with up-to-date Anti-Virus, security group policies and possibly BitLocker drive encryption.

To enable this feature the device must be known to Azure Active Directory. This can be configured for Windows 7-10 by enabling the device to accept automatic device registration settings. The environment must be running an up-to-date version of Azure AD Connect to keep the association between the computer account in your Active Directory and the object in Azure Active Directory.

Once this has been completed, the computer object will be present in Azure Active Directory allowing conditional access policies to accept the machine is a member of the organisation's Active Directory.

Subtle differences from Azure AD Join, the Domain Join with Device Registration combined together, allow clients to remain managed by on premises tools but still take advantage of reduced logins for cloud applications and security policy assignment.

Taking the first step to integrating services with Azure from your on-premises systems allows your organisation a more dynamic implementation of the journey to the cloud. For more information on these services, or how you can transition to using a hybrid cloud model for your business, please contact EACS.

Share
2
Marketing
Marketing

Related posts

Hindsight Cybersecurity
February 2, 2022

Hindsight Cybersecurity


Read more
cyber insurance
January 27, 2022

What’s Next for Cyber Insurance


Read more
October 6, 2021

Incident Response Guide


Read more

3 Comments

  1. Wilfredo says:
    September 6, 2018 at 10:12 pm

    Thanks, it’s quite informative

    Reply
  2. Deon says:
    September 7, 2018 at 12:46 am

    It works quite well for me

    Reply
  3. tinyurl.com says:
    November 21, 2019 at 4:07 am

    Hi, I do think this is a great site. I stumbledupon it ;
    ) I will come back yet again since i have
    book-marked it. Money and freedom is the greatest way to change, may you be rich and continue to guide other people.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eacs Blogs

  • Remanufactured Laptops
    Dispelling Myths About Remanufactured Laptops
    April 5, 2022 , Modern Workplace
  • Selector home
    Modernising your IT Procurement Process with eacs Selector
    March 24, 2022 , Modern Workplace
  • remote working
    Supporting a Remote Workforce with the Hybrid Cloud
    February 21, 2022 , Business Continuity
  • How can Schools Combat Ransomware Attacks?
    February 2, 2022 , Cyber Security
  • cybersecurity
    What’s Next for the IT Security Team?
    December 9, 2021 , Cyber Security
  • Zero Trust
    What is Zero Trust and Why is it Important?
    November 24, 2021 , Cyber Security
  • Outsourcing IT
    2021: The Year of Outsourcing
    November 8, 2021 , Managed Services
  • Beating the Productivity Challenge with Innovation
    October 26, 2021 , Managed Services
  • Image of time to rethink the password blog. Image is of someone typing typing password into laptop
    The easiest way to help prevent 80% of Data Breaches
    June 10, 2021 , Cyber Security
  • How can Phishing Attacks be Prevented?
    May 14, 2021 , Cyber Security
  • Supporting Productive Digital Workspaces
    April 23, 2021 , Business Continuity
  • Delivering Excellence Consistently – ISO20000-1 Certification
    March 22, 2021 , Compliance
  • How do you know that you’re secure?
    March 3, 2021 , Cyber Security
  • Digital Workplace Solutions Framework – Simple, Trusted with the Potential for Huge Cost Savings
    February 16, 2021 , Shared Business Services
  • eacsRevo – ‘Furlough’ your Assets
    January 18, 2021 , Business Continuity
  • 24/7 Support – A Necessity for the New Way of Working
    January 8, 2021 , Modern Workplace
  • Why do customers trust eacs?
    December 15, 2020 , Business Continuity
  • #Optimise2020 – The Biggest Show of the Year!
    November 20, 2020 , OptimiseIT
  • A taste of what you have to look forward to at #Optimise2020…
    November 3, 2020 , OptimiseIT
  • Taking Optimise Virtual – The Story so Far!
    October 8, 2020 , OptimiseIT
  • Supporting your Home Workers with the Power Platform
    October 1, 2020 , Modern Workplace
  • The clock is ticking, are you prepared…
    September 30, 2020 , Cyber Security
  • Why you NEED to attend Optimise 2020
    September 15, 2020 , OptimiseIT
  • Decision time for N365 is ‘nigh’?
    September 3, 2020 , Shared Business Services
  • Image for Data Protection Blog. Image of someone pressing interactive security padlock
    Cloud Security
    August 18, 2020 , Cyber Security

About

About Us

Corporate Social Responsibility

Customer Satisfaction

Services

Managed Services

Professional Services

Cloud Services

Apple Services

Cyber Security

Hardware and Software

Procurement Portal – eacs Selector

Get in Touch

Head Office:
7 Ramsay Court,
Hinchingbrooke Business Park,
Huntingdon, Cambridgeshire.
PE29 6FY

Tel: 0800 8047 256
Fax: 0845 – 3379 147
Email: Click Here

Policies

Cookies

Disclaimer

Policy Statements

Privacy

Supplier Code of Conduct

© 2020 EACS. All Rights Reserved