Presented by Bryan Davis at Microsoft Ignite, this session outlines achieving Zero Trust security in line with NIST 1800-35 using Forescout and Microsoft technologies such as Defender and Intune.

NIST Zero Trust with Forescout and Microsoft

Overview

This session provides a foundational look at implementing the NIST 1800-35 Zero Trust framework, leveraging Forescout and Microsoft solutions for enterprise security.

Speaker: Bryan Davis Event: Microsoft Ignite 2025

Chapters & Key Topics

0:00 - Overview of Zero Trust Framework Using NIST 1835

  • Explanation of the NIST Zero Trust architecture and its relevance to modern enterprise security.

00:04:10 - Introduction to Endpoint Security Data Sources

  • Discussion of data sources needed for assessing device security posture.

00:08:10 - Use of Forescout, Microsoft Defender, and Intune for Device Insights

  • Guidance on using Forescout and Microsoft Defender for gathering endpoint insights.
  • Role of Microsoft Intune in device lifecycle management and compliance.

00:10:57 - Applying the Zero Trust Model Using NIST Framework with Microsoft and Forescout

  • Step-by-step walkthrough of enforcing Zero Trust principles using integrated Microsoft and Forescout tools.

00:11:49 - Policy Decision Point Assesses Device Compliance

  • How policy engines evaluate managed and unmanaged device compliance automatically.

00:14:34 - Building a Protected Attack Surface for Managed and Unmanaged Devices

  • Strategies for segmenting and securing devices, including handling BYOD and unmanaged endpoints.

Technical Highlights

  • Real-world implementation tips for enterprises targeting NIST Zero Trust standards
  • How to unify security operations with Microsoft Defender and Intune
  • Using policy decision points to automate device security controls

Resources

Summary

This session equips security architects and IT professionals with practical steps for deploying Zero Trust models using NIST 1800-35 recommendations and Microsoft technologies, focusing on device compliance, controlled access, and unified endpoint protection.