{"id":1614,"date":"2022-03-08T06:59:00","date_gmt":"2022-03-08T06:59:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/getting-started-with-zero-trust\/"},"modified":"2023-05-16T00:54:16","modified_gmt":"2023-05-16T00:54:16","slug":"getting-started-with-zero-trust","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/","title":{"rendered":"Getting started with Zero Trust"},"content":{"rendered":"<p>Legacy security based on a network perimeter, or a castle and moat approach, is no longer fit for purpose. Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences in this second article in the Zero Trust series.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/umbrellarconnect.com\/partners\/mobile-mentor\/\" target=\"_blank\" rel=\"noopener\">More about Mobile Mentor<\/a><\/p>\n<p>Companies are hiring and onboarding new employees remotely, often working on personal devices and using cloud applications, so the traditional network perimeter is long gone.<\/p>\n<p>We used to feel we could trust our VPN and our passwords. Now that trust has been broken and our VPNs and passwords are often the weakest link. We have entered an era of zero trust.<\/p>\n<p>Zero Trust means &#8220;guilty until proven innocent.&#8221; Every request to access company information is assumed to be a security breach. Each request gets explicitly verified and only the requested resource is provided. Revisit <a href=\"\/blog\/the-underlying-principles-of-zero-trust\/\" target=\"_blank\" rel=\"noopener\">our first article in the Zero Trust series<\/a> to get a refresher on the three principles.<\/p>\n<p>If the request is indeed a breach, and the attacker gets a foothold in your environment, zero trust limits the blast radius by preventing lateral movement using least privileged access and just-in-time access.<\/p>\n<p>&nbsp;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-12793 alignnone\" src=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/zero-trust.jpg\" alt=\"\" width=\"816\" height=\"204\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Deployment blueprint with Microsoft 365 E3<\/h2>\n<p>Zero Trust can be deployed effectively and at scale using standard Microsoft 365 E3 licenses. The following outlines practical guidance for the three parts of the Zero Trust architecture.<\/p>\n<h2>Input Signals<\/h2>\n<p><strong>Cloud Identity<\/strong>: Configure modern cloud identity with Azure Active Directory, biometrics, self-service password reset, multi-factor authentication, and single sign-on, if possible.\u00a0Decommission on-premise AD when possible and retire any tools that complicate your identity infrastructure.<\/p>\n<p><strong>Corporate Devices<\/strong>:\u00a0Enroll all company-owned devices, including laptops and smartphones, in Microsoft Endpoint Manager\/Intune.\u00a0Legacy devices in SCCM can be co-managed in Intune, or Hybrid Azure AD Joined (HAADJ).\u00a0Ultimately you will want to migrate to Azure AD joined and fully managed in Intune.<\/p>\n<p><strong>Personal Devices<\/strong>:\u00a0Protect Office 365 data on BYO and unmanaged smartphones via Intune App Protection Policies.\u00a0Assure your employees that their personal privacy is respected while company data is protected.\u00a0Use Azure Virtual Desktop or Windows 365 for BYO MacBooks, and Windows.<\/p>\n<p><strong>Endpoint Protection<\/strong>:\u00a0Configure Defender for Endpoints with anti-malware, web filtering and endpoint firewall to identify and block endpoint breaches.\u00a0Set-up rules to force the device back into a trustworthy state when it is compromised.<\/p>\n<p><strong>Device Encryption<\/strong>:\u00a0Avoid regulatory notifications for minor security incidents and reduce your insurance premiums by insisting on encryption for all devices.\u00a0This may require replacing old Windows devices that don\u2019t have a TPM 2 chip.<\/p>\n<h2>Policy Engine<\/h2>\n<p><strong>Conditional Access<\/strong>:\u00a0Configure risk-based Conditional Access\u00a0policies in \u2018report mode\u2019 initially.\u00a0Then apply a gentle set of restrictions to high-risk situations and gradually tighten the policies as confidence and experience allows.<\/p>\n<p><strong>Change Management<\/strong>:\u00a0Employee push-back is inevitable as policies restrict certain activities that were previously permitted.\u00a0Ultimately the user experience will be much better, but it will be different and that requires a change management approach.\u00a0Regular communication to execs and end-users is critical to ensure the success of the Zero Trust journey.<\/p>\n<p><strong>Education<\/strong>: Ensure your people are not the weakest link by providing a steady stream of security awareness education and communications on good security practices.<\/p>\n<h3>Access Control<\/h3>\n<p><strong>Risk Mitigation<\/strong>:\u00a0Configure Defender for Office 365 to protect against malicious links, phishing attacks, attachments, and websites.\u00a0Configure Defender for Identity to limit lateral movement and account compromises in the event of a breach.<\/p>\n<p><strong>Azure App Proxy and Private Link<\/strong>:\u00a0Eliminate the need for a VPN by using a secure connection to legacy applications and on-premise web apps with the Azure AD App Proxy.\u00a0For companies with substantial on-premise infrastructure, enable Azure Private Link to extend Zero Trust capabilities from the cloud to on-premise.\u00a0Azure Private Link can be skipped by going all-in with modern cloud applications.<\/p>\n<p><strong>Information Protection<\/strong>:\u00a0Implement Information Protection by defining sensitive data categories and manually applying labels.\u00a0Assign policies to labels to trigger protective actions, such as encryption or limiting access to third-party apps.<\/p>\n<h3>Better security plus better employee experience<\/h3>\n<p>The elegance of Zero Trust is that it improves endpoint security AND employee experience. This is very different to traditional security models where more security meant more restrictions.<\/p>\n<p>Proactive IT leaders now have an opportunity to measure specific metrics before and after the deployment of Zero Trust to demonstrate the improvements in security and experience.<\/p>\n<p>This visibility is important to stakeholders who invested in E3 and want to see a return on investment before committing to invest in E5 in the future.<\/p>\n<h3>Why upgrade to E5?<\/h3>\n<p>You can go a long way towards deploying Zero Trust with E3. At some point, however, you will want to upgrade to E5. Yes, E5 comes with a higher price tag, but the uplift from E3 to E5 is a small price to pay compared to the $9 Million cost of an average cyber security breach.<\/p>\n<p>In part 3 of our Zero Trust series, Mobile Mentor will explain how E5 enhances a Zero Trust architecture at enterprise scale.<\/p>\n<p>Get your regular fix of thought leadership from Mobile Mentor by <a href=\"https:\/\/share.hsforms.com\/1MsbipM9aRLCamtSuCGmSqAc0ver?utm_campaign=website&amp;utm_medium=newsletter_sub&amp;utm_source=umbrellar_connect&amp;utm_content=mm_zero_trust&amp;utm_term=\" target=\"_blank\" rel=\"noopener\">joining their newsletter<\/a>.<\/p>\n<p><strong>Read the rest of the Zero Trust series to round out your knowledge:<\/strong><br \/>\n<a href=\"\/blog\/the-underlying-principles-of-zero-trust\/\">Part 1: Underlying principles of Zero Trust<\/a><br \/>\n<a href=\"\/blog\/zero-trust-at-scale\/\">Part 3: Zero Trust &#8211; At Scale<\/a><br \/>\n<a href=\"\/blog\/6-transformations-to-disrupt-your-legacy-it-operations\/\">Part 4: 6 transformations to disrupt your legacy IT operations<\/a><\/p>\n<p><img decoding=\"async\" class=\"wp-image-993 alignnone\" src=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/mobile-mentor-logo.png\" alt=\"Mobile Mentor\" width=\"259\" height=\"111\" \/><\/p>\n<p><em>Mobile Mentor is Microsoft\u2019s 2021 Partner of the Year for endpoint ecosystems. Certified by Microsoft, Apple and Google, they work tirelessly with clients to balance endpoint security with an empowering employee experience.<\/em><\/p>\n<p><a class=\"btn-primary\" href=\"\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences<\/p>\n","protected":false},"author":141,"featured_media":1616,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[53,5],"tags":[58],"class_list":["post-1614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apac","category-security","tag-cybersecuritye3microsoft-365mobile-mentortechnology-policyuser-experiencezero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Getting started with Zero Trust - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Getting started with Zero Trust - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-08T06:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T00:54:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/e3-Zero-Trust_1200.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Getting started with Zero Trust\",\"datePublished\":\"2022-03-08T06:59:00+00:00\",\"dateModified\":\"2023-05-16T00:54:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/\"},\"wordCount\":909,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/e3-Zero-Trust_1200.png\",\"keywords\":[\"cybersecurity|E3|Microsoft 365|Mobile Mentor|technology policy|user experience|zero trust\"],\"articleSection\":[\"Pax8 APAC\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/\",\"name\":\"Getting started with Zero Trust - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/e3-Zero-Trust_1200.png\",\"datePublished\":\"2022-03-08T06:59:00+00:00\",\"dateModified\":\"2023-05-16T00:54:16+00:00\",\"description\":\"Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/e3-Zero-Trust_1200.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/e3-Zero-Trust_1200.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/getting-started-with-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Getting started with Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Getting started with Zero Trust - Pax8 Blog","description":"Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Getting started with Zero Trust - Pax8 Blog","og_description":"Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences","og_url":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/","og_site_name":"Pax8 Blog","article_published_time":"2022-03-08T06:59:00+00:00","article_modified_time":"2023-05-16T00:54:16+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/e3-Zero-Trust_1200.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Getting started with Zero Trust","datePublished":"2022-03-08T06:59:00+00:00","dateModified":"2023-05-16T00:54:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/"},"wordCount":909,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/e3-Zero-Trust_1200.png","keywords":["cybersecurity|E3|Microsoft 365|Mobile Mentor|technology policy|user experience|zero trust"],"articleSection":["Pax8 APAC","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/","url":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/","name":"Getting started with Zero Trust - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/e3-Zero-Trust_1200.png","datePublished":"2022-03-08T06:59:00+00:00","dateModified":"2023-05-16T00:54:16+00:00","description":"Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/e3-Zero-Trust_1200.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/e3-Zero-Trust_1200.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/getting-started-with-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Getting started with Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1614"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1614\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/1616"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}