Skip to Main Content

Addressing Endpoint Challenges of a (Suddenly) Remote Workforce with Azure

Join TrustedSec Practice Lead Paul Sems and Security Consultant Phil Rowland as they impart their knowledge and experiences converting existing Group Policy to Desired State Configurations in the cloud.

By Paul Sems and Phil Rowland
May 20, 2020
Cloud Baseline Configuration Review Endpoint Hygiene Automation

We did it! We got everyone up and running remotely!

Nice job! For some, that was a more difficult task than for others. There was a lot to do in a short period of time, and most executives didn’t realize that it included more than just using Zoom. There’s remote sharing of documents, endpoint updates, setting up and/or adding more VPN licenses, opening up access to previously restricted vectors, and probably most challenging—answering questions for all of your end users that suddenly blew up the help desk!

But are we adequately securing those endpoints?

Hey, you did what you had to do. There wasn’t time for all of those new-fangled security subscription products with unending fees, and it’s not likely that there are going to be budget increases with everything that’s happening. Still, there are some core challenges that need to be resolved in ensuring that all machines are updated and in the desired state of intended configuration.

Automating endpoint hygiene is now a must.

Traditional tactics using Group Policy just aren’t going to cut it. You don’t have the time to manage it, and with the increased complexity, it’s also increasingly error prone. Shoring up this area of your security program is going to require that you convert existing Group Policy to cloud-based configuration management to maintain control over the endpoints.

How can we move to cloud-based configuration management?

During this practical webinar, we’ll demystify Azure State Configurations and modern DevOps principles, allowing you to begin your journey toward simpler automation. In addition, we’ll show you how to:

  • Replace and set a registry key
  • Configuration services
  • Disable NetBIOS
  • Set execution policy

Maintaining control of your endpoints has never been more important!

Join TrustedSec Practice Lead Paul Sems and Security Consultant Phil Rowland as they impart their knowledge and experiences converting existing Group Policy to Desired State Configurations in the cloud.