


{"id":3891,"date":"2021-07-20T10:56:00","date_gmt":"2021-07-20T08:56:00","guid":{"rendered":"https:\/\/www.editions-eni.fr\/blog\/?p=3891"},"modified":"2023-11-16T09:18:56","modified_gmt":"2023-11-16T08:18:56","slug":"strategie-zero-trust-securiser-environnement-microsoft","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/","title":{"rendered":"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/logo_securiser-environnement-microsoft.png&#8221; alt=&#8221;logo s\u00e9curiser son environnement Microsoft&#8221; title_text=&#8221;logo_securiser-environnement-microsoft&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p>Depuis la pand\u00e9mie du coronavirus, <strong>le nombre d\u2019attaques informatiques a explos\u00e9<\/strong>. En effet, le t\u00e9l\u00e9travail s\u2019est g\u00e9n\u00e9ralis\u00e9, et le nombre de <strong>cyberattaques par ran\u00e7ongiciels<\/strong> trait\u00e9 par l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (ANSSI) a \u00e9t\u00e9 <a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2021\/02\/anssi-dossier_presse-strategie_nationale_cyber.pdf\" target=\"_blank\" rel=\"noopener\">multipli\u00e9 par 4 entre 2019 et 2020, passant de 54 \u00e0 192<\/a>.<\/p>\n<p>La <strong>s\u00e9curit\u00e9 informatique repr\u00e9sente donc un enjeu majeur pour les entreprises<\/strong> afin de se <strong>prot\u00e9ger des cyberattaques<\/strong>, que ce soit en <strong>local et dans le cloud avec Azure et Microsoft 365<\/strong>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Quels sont les enjeux de la s\u00e9curisation de son environnement Microsoft ?<\/h3>\n<p>[\/et_pb_text][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p><strong>Seyfallah TAGREROUT<\/strong> : Les enjeux relatifs \u00e0 la <strong>s\u00e9curisation des environnement Microsoft<\/strong> sont la <strong>s\u00e9curit\u00e9 des environnements on-prime<\/strong>, mais aussi des <a href=\"https:\/\/www.editions-eni.fr\/livre\/microsoft-azure-gerez-votre-systeme-d-information-dans-le-cloud-3e-edition-9782409029073\"><strong>environnements cloud<\/strong><\/a>, avec la mise en place d\u2019<strong>outils de s\u00e9curit\u00e9<\/strong> et de <strong>strat\u00e9gies de s\u00e9curit\u00e9<\/strong> optimaux. Par exemple, lors de la pand\u00e9mie du COVID-19, lorsque l\u2019OMS a demand\u00e9 que nous passions tous en t\u00e9l\u00e9travail, les attaquants se sont ru\u00e9s sur les sites de phishing afin de reproduire des attaques cibl\u00e9es COVID-19. C\u2019est-\u00e0-dire qu\u2019ils utilisaient des requ\u00eates fr\u00e9quentes comme \u00ab Comment me faire vacciner contre le COVID-19 ? \u00bb ou encore \u00ab Comment me prot\u00e9ger contre la COVID-19 ? \u00bb. Les internautes cliquaient alors sur des liens malveillants infectant ensuite leurs syst\u00e8mes d\u2019information.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3 style=\"text-align: left;\">Pourriez-vous nous parler des outils cloud de s\u00e9curit\u00e9 Microsoft ? Quels sont-ils ?<\/h3>\n<p>[\/et_pb_text][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p><strong>S.T.<\/strong> : Concernant les <strong>outils cloud de s\u00e9curit\u00e9<\/strong>, en tout cas chez Microsoft, vous avez des outils qui vont venir <strong>s\u00e9curiser tout le syst\u00e8me d\u2019information<\/strong> et vous permettre d\u2019<strong>avoir une vue d\u2019ensemble des identit\u00e9s, des donn\u00e9es, des emails et des applications<\/strong>. <br \/>Ces outils, vous allez pouvoir les retrouver dans deux grandes familles, \u00e0 savoir <strong>Azure Defender<\/strong>, qui va lui offrir la s\u00e9curit\u00e9 du c\u00f4t\u00e9 Azure et workloard Azure, et vous allez avoir l\u2019autre partie, qui est <strong>Microsoft 365 Defender<\/strong>, orient\u00e9 productivit\u00e9, et vous aurez donc la s\u00e9curit\u00e9 c\u00f4t\u00e9 identit\u00e9s, applications, data et on-premise \u00e9galement.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Comment fonctionnent-ils ?<\/h3>\n<p>[\/et_pb_text][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p><strong>S.T.<\/strong> : Ces outils fonctionnent de mani\u00e8re corr\u00e9l\u00e9e, c\u2019est-\u00e0-dire que <strong>ces outils sont connect\u00e9s entre eux<\/strong>. C\u2019est ce qui permet d\u2019<strong>avoir une vision globale sur une attaque ou sur un incident informatique<\/strong>. Gr\u00e2ce \u00e0 ces outils, vous allez pouvoir <strong>reconstruire l\u2019historique<\/strong> et les param\u00e8tres n\u00e9cessaires de cette <strong>br\u00e8che de s\u00e9curit\u00e9<\/strong>, de cet <strong>incident<\/strong>, et pouvoir finalement les r\u00e9soudre. Les outils sont totalement int\u00e9gr\u00e9s les uns aux autres afin d\u2019avoir une vision globale au quotidien pour l\u2019\u00e9quipe en charge de la s\u00e9curit\u00e9.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Qu\u2019est-ce qu\u2019une strat\u00e9gie Zero Trust ?<\/h3>\n<p>[\/et_pb_text][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p>S.T. : Une <a href=\"https:\/\/www.editions-eni.fr\/livre\/securisez-votre-environnement-microsoft-365-azure-et-on-premises-mise-en-oeuvre-d-une-strategie-zero-trust-9782409029905\"><strong>strat\u00e9gie Zero Trust<\/strong><\/a> est tout simplement <strong>une strat\u00e9gie de s\u00e9curit\u00e9 que vous allez mettre en place dans un syst\u00e8me d\u2019information, vous permettant de s\u00e9curiser les donn\u00e9es, les identit\u00e9s, et les applications ainsi que l\u2019infrastructure on-prime<\/strong>. <br \/>La strat\u00e9gie Zero Trust a un principe simple qui est \u00ab <strong>Never trust, always verify.<\/strong> \u00bb. C\u2019est-\u00e0-dire que chaque <strong>demande d\u2019acc\u00e8s au syst\u00e8me d\u2019information<\/strong> est d\u2019abord consid\u00e9r\u00e9e comme une violation. Vous allez donc d\u2019abord faire une liste de checking afin de v\u00e9rifier plusieurs \u00e9l\u00e9ments : l\u2019\u00e9tat de sant\u00e9 de <strong>l\u2019utilisateur<\/strong>, de son identit\u00e9, de sa machine etc. avant de pouvoir lui <strong>donner acc\u00e8s \u00e0 l\u2019environnement<\/strong>. <br \/>C\u2019est vraiment une strat\u00e9gie au sens large qui va toucher <strong>tout votre syst\u00e8me d\u2019information<\/strong>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Quelles sont les \u00e9tapes cl\u00e9s de la mise en place de la s\u00e9curit\u00e9 d&#8217;Azure Active Directory&nbsp;?<\/h3>\n<p>[\/et_pb_text][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]S.T. : En ce qui concerne <a href=\"https:\/\/www.editions-eni.fr\/livre\/azure-active-directory-gestion-des-identites-hybrides-concepts-et-mise-en-oeuvre-9782409016127\"><strong>Azure Active Directory<\/strong><\/a>, il faut savoir que <strong>l\u2019identit\u00e9 est le point central de toute strat\u00e9gie de s\u00e9curit\u00e9 et notamment la partie Zero Trust<\/strong>. Vous allez vous servir de Azure Active Directory pour pouvoir construire cette strat\u00e9gie Zero Trust.<\/p>\n<p>Vous allez pouvoir mettre en place cette <strong>strat\u00e9gie de s\u00e9curit\u00e9 en 4 \u00e9tapes<\/strong> :<\/p>\n<ol>\n<li>Le <strong>renforcement de l\u2019identit\u00e9<\/strong> : vous allez la rendre plus forte, par exemple en renfor\u00e7ant le mot de passe ou en mettant en place l\u2019Azure MFA<\/li>\n<li>La <strong>r\u00e9duction de la surface d\u2019attaque<\/strong> : vous allez vous servir du conditional access au niveau d\u2019Azure Active Directory pour pouvoir r\u00e9duire le champ d\u2019attaque des attaquants en mettant en place plusieurs strat\u00e9gies de s\u00e9curit\u00e9.<\/li>\n<li>Le <strong>d\u00e9ploiement d\u2019outils tels qu\u2019Azure Identity Protection<\/strong> qui va vous aider \u00e0 s\u00e9curiser les identit\u00e9s de mani\u00e8re automatique gr\u00e2ce au machine learning.<\/li>\n<li><strong>L\u2019audit du log et l\u2019analyse<\/strong> : vous allez pouvoir \u00e9tudier ce qu\u2019il se passe sur Azure Active Directory et \u00eatre proactifs en cas d\u2019attaque.<\/li>\n<\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>En conclusion<\/h3>\n<p>[\/et_pb_text][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p>Avec les <strong>nouveaux enjeux li\u00e9s au t\u00e9l\u00e9travail<\/strong>, la s\u00e9curit\u00e9 des environnements Microsoft est devenue primordiale pour <strong>prot\u00e9ger<\/strong> et p\u00e9renniser la sant\u00e9 des entreprises. Gr\u00e2ce aux outils cloud de s\u00e9curit\u00e9 Microsoft et \u00e0 la mise en place d\u2019une strat\u00e9gie Zero Trust, <strong>les DSI peuvent ainsi renforcer la protection de leurs syst\u00e8mes et r\u00e9agir rapidement et efficacement en cas de cyberattaque<\/strong> gr\u00e2ce \u00e0 une vision globale.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Vous souhaitez aller plus loin ?<\/h3>\n<p>[\/et_pb_text][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]Alors d\u00e9couvrez la pr\u00e9sentation du livre \u00e9crit par Seyfallah Tagrerout sur la s\u00e9curisation de votre environnement Microsoft gr\u00e2ce \u00e0 une strat\u00e9gie Zero Trust ![\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_video src=&#8221;https:\/\/www.youtube.com\/watch?v=cLVXZGPvWgA&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_video][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_testimonial author=&#8221;Seyfallah TAGREROUT&#8221; job_title=&#8221;Notre expert Microsoft Azure&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/TAGREROUT-Seyfallah-portrait.jpg&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221;]Team Lead Cloud Architect chez AiM Services, Seyfallah Tagrerout est reconnu Microsoft MVP (Most Valuable Professional) dans la cat\u00e9gorie Microsoft Azure depuis 7 ans. Il b\u00e9n\u00e9ficie d\u2019une r\u00e9elle expertise sur toutes les briques cloud de Microsoft (Office 365 ou Microsoft Azure). Membre des communaut\u00e9s aMS, CMD et CADIM, il anime r\u00e9guli\u00e8rement des sessions sur ces sujets en France ou au niveau mondial. Son blog et les vid\u00e9os qu&#8217;il publie sur le web sont \u00e9galement reconnus par la communaut\u00e9 Microsoft. Reconnu en France et en Suisse dans le domaine de l\u2019identit\u00e9, de la gestion des acc\u00e8s et de la s\u00e9curit\u00e9 des environnements cloud Microsoft 365 et Azure, il a men\u00e9 plusieurs projets d\u2019envergure internationale autour de strat\u00e9gies de s\u00e9curit\u00e9 Zero Trust. Il est auteur aux Editions ENI depuis plusieurs ann\u00e9es.[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h2>Pour aller <span style=\"color: #3bb6d5;\">plus loin<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.9.0&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/livre\/securisez-votre-environnement-microsoft-365-azure-et-on-premises-mise-en-oeuvre-d-une-strategie-zero-trust-9782409029905_XL.jpg&#8221; alt=&#8221;Scratch et Raspberry Pi Projets maker pour s&#8217;initier \u00e0 l&#8217;\u00e9lectronique et \u00e0 la robotique&#8221; title_text=&#8221;scratch-et-raspberry-pi-projets-maker-pour-s-initier-a-l-electronique-et-a-la-robotique-2e-edition-9782409027901_M&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/securisez-votre-environnement-microsoft-365-azure-et-on-premises-mise-en-oeuvre-d-une-strategie-zero-trust-9782409029905&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]Livre de Seyfallah TAGREROUT[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p><strong>S\u00e9curisez votre environnement Microsoft (365, Azure et On-premises)<\/strong><br \/>Mise en oeuvre d&#8217;une strat\u00e9gie Zero trust<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/microsoft-advanced-threat-analytics-ata-securisez-votre-systeme-d-information-vtata_M.jpg&#8221; alt=&#8221;Flutter D\u00e9veloppez vos applications mobiles multiplateformes avec Dart&#8221; title_text=&#8221;flutter-developpez-vos-applications-mobiles-multiplateformes-avec-dart-9782409025273_M (1)&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/video\/microsoft-advanced-threat-analytics-ata-securisez-votre-systeme-d-information-vtata&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Vid\u00e9o<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<strong>Microsoft Advanced Threat Analytics (ATA)<\/strong><br \/>\nS\u00e9curisez votre syst\u00e8me d&#8217;information[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/presentiel-system.jpg&#8221; alt=&#8221;formation en live&#8221; title_text=&#8221;formation en live&#8221; url=&#8221;https:\/\/www.eni-service.fr\/index.php\/fomation\/windows-10-deployer-proteger-et-gerer-les-environnements-de-travail-modernes\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Formation<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<strong>Windows 10<\/strong><br \/>\nD\u00e9ployer, prot\u00e9ger et g\u00e9rer les environnements de travail modernes[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h2>Ces articles peuvent aussi <span style=\"color: #3bb6d5;\">vous int\u00e9resser<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.9.0&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;60%&#8221; width_last_edited=&#8221;off|tablet&#8221; custom_margin_tablet=&#8221;|10px||10px|false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; custom_css_main_element_last_edited=&#8221;off|tablet&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_slider use_bg_overlay=&#8221;on&#8221; bg_overlay_color=&#8221;rgba(26,10,56,0.6)&#8221; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Overpass||||||||&#8221; header_font_size=&#8221;18px&#8221; width_last_edited=&#8221;off|tablet&#8221; height=&#8221;320px&#8221; height_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;0px||40px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; custom_padding=&#8221;180px|0px|0px|0px|false|false&#8221; custom_padding_tablet=&#8221;150px||||false|false&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wb3N0Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU2MCJ9fQ==@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset3&#8243; custom_margin__hover_enabled=&#8221;on|hover&#8221; custom_margin__hover=&#8221;-10px||30px||false|false&#8221; custom_padding__hover_enabled=&#8221;on|desktop&#8221; custom_padding__hover=&#8221;||0px||false|false&#8221; height__hover_enabled=&#8221;on|desktop&#8221; height__hover=&#8221;330px&#8221;][et_pb_slide button_link=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wb3N0Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMwODkifX0=@&#8221; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;button_link&#8221; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg&#8221; background_enable_image=&#8221;on&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding__hover_enabled=&#8221;off|desktop&#8221; custom_padding__hover=&#8221;280px||||false|false&#8221; sticky_transition=&#8221;on&#8221;]<\/p>\n<h4>Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables<\/h4>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_slider use_bg_overlay=&#8221;on&#8221; bg_overlay_color=&#8221;rgba(26,10,56,0.6)&#8221; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Overpass||||||||&#8221; header_font_size=&#8221;18px&#8221; width_last_edited=&#8221;off|tablet&#8221; height=&#8221;320px&#8221; height_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;0px||40px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; custom_padding=&#8221;180px|0px|0px|0px|false|false&#8221; custom_padding_tablet=&#8221;150px||||false|false&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wb3N0Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijg0MyJ9fQ==@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset3&#8243; custom_margin__hover_enabled=&#8221;on|hover&#8221; custom_margin__hover=&#8221;-10px||30px||false|false&#8221; custom_padding__hover_enabled=&#8221;on|desktop&#8221; custom_padding__hover=&#8221;||0px||false|false&#8221; height__hover_enabled=&#8221;on|desktop&#8221; height__hover=&#8221;330px&#8221;][et_pb_slide button_link=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wb3N0Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5NzEifX0=@&#8221; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;button_link&#8221; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_ansible.jpg&#8221; background_enable_image=&#8221;on&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding__hover_enabled=&#8221;off|desktop&#8221; custom_padding__hover=&#8221;280px||||false|false&#8221; sticky_transition=&#8221;on&#8221;]<\/p>\n<h4>Configuration centralis\u00e9e de vos serveurs et applications avec Ansible : 5 pr\u00e9requis<\/h4>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depuis la pand\u00e9mie du coronavirus, le nombre d\u2019attaques informatiques a explos\u00e9. En effet, le t\u00e9l\u00e9travail s\u2019est g\u00e9n\u00e9ralis\u00e9, et le nombre de cyberattaques par ran\u00e7ongiciels trait\u00e9 par l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (ANSSI) a \u00e9t\u00e9 multipli\u00e9 par 4 entre 2019 et 2020, passant de 54 \u00e0 192. La s\u00e9curit\u00e9 informatique repr\u00e9sente donc un [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3892,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[18,5,3],"tags":[],"genre":[],"class_list":["post-3891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-d-experts","category-securite-informatique","category-systemes-et-reseaux"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft - Eni Blog<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment s\u00e9curiser votre environnement Microsoft gr\u00e2ce \u00e0 la mise en \u0153uvre d\u2019une strat\u00e9gie Zero Trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft - Eni Blog\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment s\u00e9curiser votre environnement Microsoft gr\u00e2ce \u00e0 la mise en \u0153uvre d\u2019une strat\u00e9gie Zero Trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T08:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-16T08:18:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erwan Caillarec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erwan Caillarec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/\",\"name\":\"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft - Eni Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg\",\"datePublished\":\"2021-07-20T08:56:00+00:00\",\"dateModified\":\"2023-11-16T08:18:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/0dc710628e4fb046b1006320d8bf5927\"},\"description\":\"D\u00e9couvrez comment s\u00e9curiser votre environnement Microsoft gr\u00e2ce \u00e0 la mise en \u0153uvre d\u2019une strat\u00e9gie Zero Trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg\",\"width\":1920,\"height\":680,\"caption\":\"bandeau securiser son environnement microsoft\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/0dc710628e4fb046b1006320d8bf5927\",\"name\":\"Erwan Caillarec\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/ecaillarec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft - Eni Blog","description":"D\u00e9couvrez comment s\u00e9curiser votre environnement Microsoft gr\u00e2ce \u00e0 la mise en \u0153uvre d\u2019une strat\u00e9gie Zero Trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/","og_locale":"fr_FR","og_type":"article","og_title":"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft - Eni Blog","og_description":"D\u00e9couvrez comment s\u00e9curiser votre environnement Microsoft gr\u00e2ce \u00e0 la mise en \u0153uvre d\u2019une strat\u00e9gie Zero Trust.","og_url":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/","og_site_name":"Eni Blog","article_published_time":"2021-07-20T08:56:00+00:00","article_modified_time":"2023-11-16T08:18:56+00:00","og_image":[{"width":1920,"height":680,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg","type":"image\/jpeg"}],"author":"Erwan Caillarec","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Erwan Caillarec","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/","url":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/","name":"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft - Eni Blog","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg","datePublished":"2021-07-20T08:56:00+00:00","dateModified":"2023-11-16T08:18:56+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/0dc710628e4fb046b1006320d8bf5927"},"description":"D\u00e9couvrez comment s\u00e9curiser votre environnement Microsoft gr\u00e2ce \u00e0 la mise en \u0153uvre d\u2019une strat\u00e9gie Zero Trust.","breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/bandeau_securiser-environnement-microsoft.jpg","width":1920,"height":680,"caption":"bandeau securiser son environnement microsoft"},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/strategie-zero-trust-securiser-environnement-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Strat\u00e9gie Zero Trust : s\u00e9curiser son environnement Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/0dc710628e4fb046b1006320d8bf5927","name":"Erwan Caillarec","url":"https:\/\/www.editions-eni.fr\/blog\/author\/ecaillarec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/3891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=3891"}],"version-history":[{"count":7,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/3891\/revisions"}],"predecessor-version":[{"id":5503,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/3891\/revisions\/5503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/3892"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=3891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=3891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=3891"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=3891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}