NIST Zero Trust with Forescout and Microsoft
Presented by Bryan Davis at Microsoft Ignite, this session outlines achieving Zero Trust security in line with NIST 1800-35 using Forescout and Microsoft technologies such as Defender and Intune.
NIST Zero Trust with Forescout and Microsoft
Overview
This session provides a foundational look at implementing the NIST 1800-35 Zero Trust framework, leveraging Forescout and Microsoft solutions for enterprise security.
Speaker: Bryan Davis Event: Microsoft Ignite 2025
Chapters & Key Topics
0:00 - Overview of Zero Trust Framework Using NIST 1835
- Explanation of the NIST Zero Trust architecture and its relevance to modern enterprise security.
00:04:10 - Introduction to Endpoint Security Data Sources
- Discussion of data sources needed for assessing device security posture.
00:08:10 - Use of Forescout, Microsoft Defender, and Intune for Device Insights
- Guidance on using Forescout and Microsoft Defender for gathering endpoint insights.
- Role of Microsoft Intune in device lifecycle management and compliance.
00:10:57 - Applying the Zero Trust Model Using NIST Framework with Microsoft and Forescout
- Step-by-step walkthrough of enforcing Zero Trust principles using integrated Microsoft and Forescout tools.
00:11:49 - Policy Decision Point Assesses Device Compliance
- How policy engines evaluate managed and unmanaged device compliance automatically.
00:14:34 - Building a Protected Attack Surface for Managed and Unmanaged Devices
- Strategies for segmenting and securing devices, including handling BYOD and unmanaged endpoints.
Technical Highlights
- Real-world implementation tips for enterprises targeting NIST Zero Trust standards
- How to unify security operations with Microsoft Defender and Intune
- Using policy decision points to automate device security controls
Resources
Summary
This session equips security architects and IT professionals with practical steps for deploying Zero Trust models using NIST 1800-35 recommendations and Microsoft technologies, focusing on device compliance, controlled access, and unified endpoint protection.