administration. See also Advanced Threat Analytics (ATA), implementation; also Office 365 Mobile Device Management (MDM), implementation
access roles, configuring Intune MAM policies, 63–65
APPS workspace, Intune, 24–25, 35–36
location needs, defining, 10
managing applications but not devices, 42–46
Microsoft Intune cloud storage space, 27
Microsoft Intune Software Publisher, 25–27
mobile device life-cycle requirements, 13–14
mobile device management authority, Intune, 22–23
Office 365 Mobile Device Management
Intune coexistence with, 140–143, 150–151
Office 365, device management overview, 131–132, 166–170
policy-managed apps (MAM-protected), 36–42
Advanced Threat Analytics (ATA). See also Advanced Threat Analytics (ATA), implementation; also Advanced Threat Analytics (ATA), troubleshooting
ATA Center, 86–87. See also Advanced Threat Analytics (ATA) Center
ATA Console, 93. See also Advanced Threat Analytics (ATA) Console
ATA Gateway, 86–87. See also Advanced Threat Analytics (ATA) Gateway
enterprise security, enhancing, 91
Health Center, resource monitoring, 108–109
in restrictive communication environments, 87–90
infrastructure considerations, 91–92
machine learning and analysis, understanding of, 84–90
protecting on-premises resources, overview, 83–84
trial version, 96
Advanced Threat Analytics (ATA) Center, 86–87. See also Advanced Threat Analytics (ATA), troubleshooting
connection errors, 183
in firewall environments, 87–90
installation log file, 177–178
Advanced Threat Analytics (ATA) Console, 93. See also Advanced Threat Analytics (ATA), troubleshooting
timeout error message, 182
Advanced Threat Analytics (ATA) Console IIS, 97
Advanced Threat Analytics (ATA) Gateway, 86–87. See also Advanced Threat Analytics (ATA), troubleshooting
connection errors, 183
error log, 106
Health Center, resource monitoring, 108–109
in firewall environments, 87–90
log files, 178
Advanced Threat Analytics (ATA), implementation
ATA Center installation, 97–101
ATA Gateway installation, 102–104
ATA Gateway, configuring, 105–106
domain connectivity, configuring, 101–102
telemetry settings, 111
threat mitigation and incident response, 113–116
Timeline, event monitoring, 114–115
Advanced Threat Analytics (ATA), troubleshooting, 173
data analysis, 175
validate behavior and archive the ticket, 176
hardware maintenance, 181
installation troubleshooting, 176–179
operations troubleshooting, overview, 180–181
unable to access ATA Console, 182
unable to start ATA Center or ATA Gateway, 183
alerts
Advance Threat Analytics, configuring, 106–108
Advance Threat Analytics, leveraging, 113–116
Office 365 Mobile Device Management admin center, 123–124
Android
Intune App Wrapping Tool, 41–42
managed browser policy, creating in Intune, 39–40
managing applications but not devices, 45–46
Microsoft Intune, overview of, 6–7
mobile application management policy creation, 38–39
Office 365 Mobile Device Management, enrolling devices, 159–161, 166
policy-managed apps (MAM-protected), 36–42
public app stores, 31
selective wipes, 136
App Package for Android (.apk), 29
App Package for iOS (.ipa), 29
App Web Content policy settings, Intune, 59–60
Apple App Store for iOS devices
installing managed iOS apps, 31–33
links for Microsoft apps, 30, 57
publishing managed iOS apps, 51–57
Apple Push Notification service (APNs), Office 365 MDM
enrolling iOS devices, Office 365, 162
Intune coexistence and, 143
manage settings, 124
apps. See also Intune, Mobile Application Management (MAM) implementation
application settings, Office 365 access settings, 122
as key element of mobility management, 3
Azure Active Directory Premium, overview, 6
business needs, defining, 9
Enterprise Mobility Suite (EMS), overview, 5–7
Intune App Wrapping Tool, 41–42
MAM, implementation design, 50
managing applications but not devices, Azure, 42–46
Microsoft Intune Software Publisher, 25–27
Microsoft Intune, overview of, 7
mobility management, key concepts, 1–2, 21–22
Office 365 Mobile Device Management, overview, 7, 120–121
policy-managed apps (MAM-protected), 22, 36–42
APPS workspace, Intune
app installation status reports, 79–80
Intune Software Publisher, access to, 52, 56–57
mobile app deployment, 70–71, 73
ATA. See Advanced Threat Analytics (ATA)
ATA Center. See Advanced Threat Analytics (ATA) Center
ATA Console. See Advanced Threat Analytics (ATA) Console
ATA Gateway. See Advanced Threat Analytics (ATA) Gateway
authentication
managing applications but not devices, 43–44
mobile device life-cycle requirements, 12–14
multi-factor, Office 365 and, 129–131
authorization, mobile device life cycle, 12–14
Azure Active Directory (AAD)
identity management, 148
managing applications but not devices, 42–46
Azure Active Directory (Azure AD) Premium, 5–6
Azure AD Connect Health, 6
Azure Rights Management (Azure RMS), 5, 7
Azure, Intune Mobile Application Management and
adding Intune to portal services list, 62–63
configuring access role policies, 63–65
creating policies to manage Office apps for iOS, 65–68
implementing new policies, 77–79
backups, Office 365 security policy configuration, 156–157
Blue Yonder Airlines. See also Advanced Threat Analytics (ATA), implementation; also Intune, Mobile Application Management (MAM) implementation; also Office 365 Mobile Device Management (MDM), implementation
mobility management scenario, 18–19
Office 365 MDM selection decisions, 138–143
bring your own device (BYOD), 1, 3, 117
business needs, defining, 9
Certificate Signing Request, APN, 152–153
certificate-controlled resources
Microsoft Intune, overview of, 6
mobile device life-cycle requirements, 13–14
certificates
Advance Threat Analytics planning and design, 93
Advanced Threat Analytics installation, 97, 99–101
ATA Gateway installation, 104
for Apple Push Notification service (APNs), 126–127
Office 365 Mobile Device Management, configuring APNs, 151–153
cloud-based services
Azure Active Directory Premium, overview, 6
Azure Rights Management, overview, 7
business requirements, defining, 14–15
Enterprise Mobility Suite (EMS), overview, 5–7
Intune
cloud storage space, 27
getting apps to the cloud, 24–27
software installation types, 27–33
Office 365 Mobile Device Management
cloud settings, 122
overview, 7
compliance
business need, defining, 9
mobile device life-cycle requirements, 12
Office 365
Android device enrollment, 160–161
Compliance Center, 124–125, 133–134
device compliance report, 167–168
iOS device enrollment, 162
Mobile Device Management admin center, 123–124
Mobile Device Management, implementation, 149
vs. access, 132
Configuration Policies, Intune, 58–61
configure, mobile device life cycle, 11
Create New Policy dialog box, Intune, 58
credentials, Pass-the-Ticket IP address exclusions, 110
criteria membership rules, 24
Custom Performance Monitor, Advanced Threat Analytics, 97
cyber attacks. See Advanced Threat Analytics (ATA); threat protection and mitigation
data. See also Advanced Threat Analytics (ATA); also mobile application management (MAM)
Advanced Threat Analytics installation, 98–99
Advanced Threat Analytics, telemetry settings, 111
apps, installing and managing, 3
Azure Rights Management, overview, 7
Enterprise Mobility Suite (EMS), overview, 5–7
managing applications but not devices, 42–46
Microsoft Intune, overview of, 7
Mobile Application Management, implementation design, 50
mobile device life-cycle requirements, 12–14
mobility management, key concepts, 2, 4
Office 365 Mobile Device Management
features, 123
wiping devices, 135–136, 170–172
policy-managed apps (MAM-protected), 36–42
Data Relocation policy settings, Intune MAM, 60, 66–67
data-relocation policies, 44–46
deployment of apps, Microsoft Intune and
APPS workspace, 24–25, 70–71, 73
external link installations, 30–31
groups, deployment options, 33–35
managed app policy for iOS app deployment, 58–61
managed iOS apps from Apple Store, 31–33
policy-managed apps (MAM-protected), 38
software installation types, 27–33
task overview, 22
deployment, Office 365 Mobile Device Management (MDM), 149–151
detection settings, Advance Threat Analytics, 109–110
device-centric management, 2, 169–170
devices. See also Office 365 Mobile Device Management (MDM)
Advanced Threat Analytics analysis of, 84–85
Azure Active Directory Premium, overview, 6
business needs, defining, 9
device groups, creating in Intune, 23–24, 33–35
Enterprise Mobility Suite (EMS), overview, 5–7
factory reset, 7
managing applications but not devices, Azure, 42–46
Microsoft Intune, overview of, 6–7
mobile device life-cycle requirements, 10–14
mobile device management authority, Intune, 22–23
mobility management, implementation design, 50
mobility management, key concepts, 2–3, 117–118
Office 365
device considerations, 149
enrollment troubleshooting, 165–166
Mobile Device Management settings, 122
mobile device management, overview, 7
organization-wide device access settings, 132–133
remembered devices, 130
security policies, 133–134, 155–158
view, manage, and update policies, 168–169
viewing enrolled devices, 167
wiping devices, 135–136, 170–172
on-premises device management platforms, 121
synchronization of, 35
unmanaged devices, support for, 51
direct membership rules, 24
disk space
Advanced Threat Analytics installation, 98–99
DNS Reconnaissance IP address exclusions, 110
DNS records Office 365, adding or configuring, 127–129
domain connectivity
adding or configuring domains, Office 365, 127–129
Advanced Threat Analytics installation, 101–102
ATA Gateway installation and, 103
ATA Gateway, configuring, 105–106
domain controllers, ATA planning for, 92
enrolling Android devices, Office 365, 159–161
enrolling iOS devices, Office 365, 161–163
Office 365 device security policies, 133–134
organization-wide access settings, 133, 154–155
email alerts, Advance Threat Analytics, 106–108
email servers
Azure Rights Management, overview, 7
Microsoft Intune, overview of, 6–7
encryption
Azure Rights Management, overview, 7
managed app policy settings, Intune, 60–61
mobile device life-cycle requirements, 12–14
Office 365 Mobile Device Management (MDM), 122
Office 365 security policy configuration, 156–157
enrollment
mobile device life-cycle, 10–11
Office 365 Mobile Device Management, device enrollment, 158–166
enterprise mobility management, overview
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices, 5
entity relationship behavior, 84
Entity Resolver, Advanced Threat Analytics, 90
Entity Sender, ATA Center, 90
error log, ATA Gateway, 106. See also Advanced Threat Analytics (ATA), troubleshooting
Event Listener, Advanced Threat Analytics, 91
event monitoring. See also Advanced Threat Analytics (ATA)
mobile device life-cycle requirements, 14
Security Information and Event Management (SIEM), 85
Excel
Apple Store link for, 57
policy-managed apps (MAM-protected), 36–42
mobile device management, overview, 118–119
Office 365 Mobile Device Management, benefits of, 122–123
Office 365 Mobile Device Management, security policies, 133–134
Exchange Online
Android devices, enrolling in Office 365, 159–161
iOS devices, enrolling in Office 365, 161–163
Microsoft Intune, overview of, 7
mobile device management, overview, 118
Office 365 MDM architecture, 120–121
Office 365, organization-wide access settings, 154–155
external link, app installation with Intune, 30–31
factory reset, devices, 7
federated identity, management of, 148
firewalls, Advanced Threat Analytics deployment of, 87–90
full wipe, Office 365 Mobile Device Management, 123, 136, 172
Get-AdUser cmdlet, 110
Global Positioning System (GPS), defining location needs, 10
Google Play Store for Android devices, 31
groups
device groups, creating in Intune, 23–24
device groups, Intune deployment options, 33–35
Intune MAM, implementing new policies, 77–79
Office 365 security policy configuration, 157
user groups, creating in Intune, 23–24
honeytoken account SIDs, 110
Hyper V environments, ATA installation troubleshooting, 176–178
identity management
Azure Active Directory Premium, overview, 6
Azure Rights Management, overview, 7
Enterprise Mobility Suite (EMS), overview, 5–7
mobility management, key concepts, 2–3
Office 365 Mobile Device Management, implementation, 147–148
Office 365 Mobile Device Management, overview, 7
IIS, Advanced Threat Analytics overview, 86–87
installation
Advance Threat Analytics installation, troubleshooting, 176–179
app installation status reports, Intune, 79–81
APP Package for Android (.apk), 29
App Package for iOS (.ipa), 29
ATA Center installation, 97–101
ATA Gateway installation, 102–104
external link installations, 30–31
Intune Software Publisher, installation types, 27–33
of apps, Microsoft Intune and, 22
Windows app package (.appx, .appxbundle), 30
Windows Installer (.exe, .msi), 28, 30
Windows Phone app package (.xap, .appx, .appsbundle), 29
Internet Information Services (IIS), Advanced Threat Analytics installation, 97
Intune. See also Office 365 Mobile Device Management (MDM)
Apple Push Notification service (APNs) certificates, 126–127
cloud storage space, 27
enrolling Windows Phone devices, Office 365, 163–166
features and capabilities, summary, 16–17
Office 365 MDM architecture, 120–121
Office 365, coexistence with, 140–143, 150–151
requirements for, 16
Software Publisher, 25–27. See also Intune Software Publisher
supported operating systems, 22
Intune App Wrapping Tool, 36–37, 41–42
Intune Company Portal app
enrolling Android devices, Office 365, 159–161
enrolling iOS devices, Office 365, 161–163
Intune Managed Browser, 57
deploying Office mobile apps, 70–74
validating new MAM policies, 76–77
Intune SDK integration, 41
external link installations, 28, 30–31
publishing managed iOS apps, 52–60
software installer installations, 28–30
Intune, Mobile Application Management (MAM)
app deployment tasks, overview, 22
app deployment, approval and deadline options, 33–35
deployments, monitoring, 35–36
device groups, creating, 23–24
managed browser policy, creating, 39–40
managing applications but not devices, 42–46
mobile application management policy, creating, 38–39
mobile device management authority, 22–23
policy-managed apps (MAM-protected), 36–42
software installation types, 27–33
Intune, Mobile Application Management (MAM) implementation
apps and policies, preparing, 51
access roles, configuring policies, 63–65
adding Intune to Azure portal services, 62–63
managed app policy for iOS app deployment, 58–61
managed app policy to deploy without apps or managed devices, 61–68
policies to manage Office apps for iOS, 65–68
publishing managed iOS apps, 51–57
apps and policies, rollout, 68–69
deploying apps and policies, 70–74
enterprise rollout phase, 81
reporting installation status, 79–80
run state phase, 81
scope of project, 69
small production pilot phase, 80
takeover of previously installed Office iOS apps, 74
solution planning and design, 49–51
iOS
Apple Push Notification service (APNs) certificates, 126–127
Intune
App Wrapping Tool, 41
creating policies for managing apps, 65–68
managed browser policy creation, 39–40
publishing managed apps, 51–57
managed iOS apps from Apple Store, 31–33
managing applications but not devices, 45–46
mobile application management policy, creating, 38–39
Office 365
enrolling devices, 161–163, 166
Mobile Device Management, configuring APNs, 151–153
security policy configuration, 156
policy-managed apps (MAM-protected), 36–42
public app stores, 30
selective wipes, 136
IP addresses
Advanced Threat Analytics
Office 365, multi-factor authentication, 130
jailbroken devices
Office 365 Mobile Device Management (MDM), 122
Office 365 security policy configuration, 156
LDAP queries, Advanced Threat Analytics overview, 86–87
Let’s Get Started Wizard, Office 365, 150–151
license agreements, Intune APPS workspace, 24–25
location needs, defining, 10
location services, requirements for, 10
managed browser policy, creating in Intune, 39–40
membership rules, Intune groups, 24
metadata, Microsoft Intune Software Publisher, 25–27
Microsoft Advanced Threat Analytics. See Advanced Threat Analytics
Microsoft Azure Active Directory Premium. See Azure Active Directory (Azure AD) Premium
Microsoft Azure Rights Management. See Azure Rights Management
Microsoft enterprise mobility solutions, overview, 4
Microsoft Enterprise Mobility Suite (EMS). See also Advanced Threat Analytics (ATA)
Advanced Threat Analytics, overview, 7
Azure Rights Management, 7
features and capabilities, summary, 16–17
Microsoft Intune, overview, 6–7
mobility management scenario, 18–19
Office 365 and, 7
solution selection decisions, 8–18
business needs, defining, 9
comparing Microsoft solutions, 15–18
location needs, defining, 10
mobile device life cycle requirements, 10–14
SaaS requirements, defining, 14–15
Microsoft Excel
Apple Store link for, 57
policy-managed apps (MAM-protected), 36–42
Microsoft Exchange ActiveSync. See Exchange ActiveSync (EAS)
Microsoft Exchange Server, 7
Microsoft Identity Manager (MIM), overview of, 6
Microsoft Intune. See Intune
Microsoft Intune Managed Browser, 57, 70–74, 76–77
Microsoft Intune Software Publisher. See Intune Software Publisher
Microsoft Network Monitor tool, 180–181
Microsoft Office. See Office 365
Microsoft OneDrive, 36–42, 50, 57, 66. See also Office 365
Microsoft OneNote, 36–42. See also Office 365
Microsoft Outlook, 36–42, 51–57. See also Office 365
Microsoft PowerPoint, 36–42, 57, 70–74. See also Office 365
Microsoft System Center Configuration Manager (ConfigMgr), 121
Microsoft Word, 36–42, 57. See also Office 365
mobile application management (MAM). See also Intune, Mobile Application Management (MAM)
managing applications but not devices, 42–46
mobility management, key concepts, 1
mobile device lock, Intune, 7
mobile device management (MDM). See also Office 365 Mobile Device Management (MDM)
additional resources, 15
mobile device life-cycle requirements, 13–14
Mobile Device Management (MDM), Intune
mobile device management authority, setting of, 22–23
MongoDB
Advanced Threat Analytics installation, 97
database management, ATA Center, 111–112
monitoring
Advance Threat Analytics, 108–109
mobile device life-cycle requirements, 14
multi-factor authentication (MFA)
Azure Active Directory Premium, overview, 6
Office 365 Mobile Device Management admin center, 124
Network Activity Translator and Event Translator, 91
network adapter configuration, ATA Gateway installation, 102–103
network interface card, changes to, 181
Network Listener, Advanced Threat Analytics, 91
New Device Security Policy Wizard, 134, 156–157
Exchange ActiveSync and, 118–119
Intune, app and policy rollout scenario, 68–81
mobile device management, overview, 7, 16–17
requirements for mobile device management, 16
Office 365 Compliance Center, 154–155, 157–158, 168–169
Office 365 Mobile Device Management (MDM). See also Office 365 Mobile Device Management (MDM), implementation
Apple Push Notification service certificates, 126–127
device management, overview, 131–132
domains, adding or configuring, 127–129
features and capabilities, 121–123
Intune MAM, policies for managing apps for iOS, 65–68
Intune Managed Browser, deploying mobile apps, 70–74
Intune, coexistence with, 140–143
multi-factor authentication, 129–131
New Device Security Policy Wizard, 134
organization-wide device access settings, 132–133
overview, 7, 16–17, 117–118, 120
planning for, 125
policy-managed apps (MAM-protected), 36–42
publishing managed iOS apps, 51–57
setting up, 126
Office 365 Mobile Device Management (MDM), implementation
Apple Push Notification service certificates, 151–153
organization-wide access settings, 154–155
Windows Phone devices, 163–166
Let’s Get Started Wizard, 150–151
overview, 145
planning for MDM, 147
Set Up Mobile Device Management Wizard, Office 365, 153
OneDrive, Microsoft, 36–42, 50, 57, 66. See also Office 365
OneNote, Microsoft, 36–42. See also Office 365
operating systems
Office 365 security policies and, 155–158
Office 365, enrolling devices, 158–166
Organizational Security Graph, 86. See also Advanced Threat Analytics (ATA)
Outlook, Microsoft, 36–42, 51–57. See also Office 365
pass-the-hash attacks, 84
Pass-the-Ticket IP address exclusions, 110
passwords
Azure Active Directory Premium, overview, 6
multi-factor authentication, Office 365, 130
Office 365 Mobile Device Management (MDM), 122
Office 365 security policy configuration, 156
penetration testing
Pass-the-Ticket IP address exclusions, 110
people-centric management, 2
permissions
access roles, configuring Intune MAM policies, 63–65
Azure Rights Management, overview, 7
mobile device life-cycle requirements, 12–14
mobile device management authority, Intune, 22–23
Office 365 Mobile Device Management admin center, 123–124
PIN access policy settings, Intune, 60, 67–68
implementing new MAM policies, 75–79
policies. See also Intune, Mobile Application Management (MAM) implementation
Azure Rights Management, overview, 7
managed browser policy, creating in Intune, 39–40
managing applications but not devices, 42–46
mobile application management policy, creating in Intune, 38–39
mobile device life-cycle requirements, 13–14
Office 365 device management, overview, 131–132
Office 365 Mobile Device Management admin center, 123–124
Office 365 Mobile Device Management security policies, 133–134
Office 365 Mobile Device Management, implementation, 149
Office 365 Mobile Device Management, security policy configuration, 155–158
Office 365, view, manage, and update policies, 168–169
policy-managed apps (MAM-protected), 36–42
port mirroring
Advance Threat Analytics, planning for, 92
Advanced Threat Analytics, overview, 86–87
ATA Gateway installation and, 103
ATA Gateway, configuring, 105–106
ATA installation troubleshooting, 176–178
Advanced Threat Analytics installation, 99
Advanced Threat Analytics, in firewall environments, 87–90
Advanced Threat Analytics, overview, 86–87
PowerPoint, Microsoft, 36–42, 57, 70–74. See also Office 365
privacy policies, mobile device life-cycle, 12
profiles, mobile device life-cycle, 13–14. See also Advanced Threat Analytics (ATA)
public app stores, Intune external link installations, 30–31. See also Apple App Store for iOS devices
read-only domain controller, ATA Gateway configuration, 105–106
remembered devices, 130
remote PIN reset, 7. See also PIN access policy settings, Intune
remote wipes, 123
reporting
device compliance report, Office 365, 167–168
Intune MAM, app installation status, 79–81
mobile device life-cycle requirements, 14
Office 365 Mobile Device Management features, 137–138
Office 365 security policy configuration, 156
Request for Comments (RFCs), 108
Requirements, Intune Software Publisher, 54–55
resource monitoring
Advance Threat Analytics, 108–109
Office 365 Mobile Device Management, access control, 122–123
rooted devices
Office 365 Mobile Device Management (MDM), 122
Office 365 security policy configuration, 156
Secure Sockets Layer (SSL), Advanced Threat Analytics and, 86–87
security
mobile device life-cycle, 12–13
Office 365 Mobile Device Management security policies, 155–158
Office 365, view, manage, and update policies, 168–169
security groups, Office 365 policy configuration, 157
security incident response, 113–116
Security Information and Event Management (SIEM), 85, 107–108
selective wipes
Office 365 Mobile Device Management, 123, 135–136, 170–171
Office 365 security policy configuration, 156
self-signed certificates, Advanced Threat Analytics installation, 97, 99–101
Set Up Mobile Device Management Wizard, Office 365, 152–153
short-term lease subnets, 110
single sign-on (SSO) support, Azure Active Directory Premium, 6
SMTP Server, Advance Threat Analytics alerts, 107–108
Software as a Service (SaaS) applications
Azure Active Directory Premium, overview, 6
business requirements, defining, 14–15
Enterprise Mobility Suite (EMS), overview, 5–7
Software Description, Intune Software Publisher, 54
software inventory
Intune Software Publisher, 25–27
Intune, software installation types, 27–33
Software Setup, Intune Software Publisher, 53–57
storage
Advanced Threat Analytics installation, 98–99
subnets, Advance Threat Analytics detection settings, 109–110
Syslog Server, Advance Threat Analytics alerts, 106
system settings, Office 365 Mobile Device Management, 122
telemetry settings, Advance Threat Analytics, 111
threat protection and mitigation. See also Advanced Threat Analytics (ATA)
Advanced Threat Analytics, leveraging of, 113–116
Advanced Threat Analytics, overview, 7
apps, installing and managing, 3
as key element of mobility management, 2, 4
Azure Rights Management, overview, 7
business needs, defining, 9
data management, key concerns, 4
Enterprise Mobility Suite (EMS), overview, 5–7
managed browser policy, creating in Intune, 39–40
mobile device life-cycle requirements, 10–14
Office 365 Mobile Device Management
implementation, 149
overview, 7
view, manage, and update policies, 168–169
policy-managed apps (MAM-protected), 36–42
user identification management, 2–3
Timeline, Advance Threat Analytics, 114–115
timeout error, ATA Console, 182
tokens, managing applications but not devices, 43–44
troubleshooting. See also Advanced Threat Analytics (ATA), troubleshooting
database management, MongoDB, 111–112
URLs
for public app store apps, 30–31
managed browser policy, creating in Intune, 39–40
users
access roles, configuring Intune MAM policies, 63–65
as key element of mobility management, 2–3
Azure Active Directory Premium, overview, 6
behavior analysis by Advanced Threat Analytics, 84–85
business needs, defining, 9
Enterprise Mobility Suite (EMS), overview, 5–7
excluded users, device access settings, 133
identity management, Office 365 MDM, 147–148
Mobile Application Management, implementation design, 49
mobile device life-cycle requirements, 10–14
Office 365 Mobile Device Management, overview, 7
Office 365 security policy configuration, groups, 157
privacy and compliance, 12
user device management, 169–170
user groups, creating in Intune, 23–24
user groups, Intune app deployment options, 33–35
virtual private networks (VPNs)
Microsoft Intune, overview of, 6
mobile device life-cycle requirements, 13–14
web-based apps, Intune external link installation, 30–31
Wi-Fi network access, mobile device life-cycle, 13–14
Windows app package (.appx, .appxbundle)
app installation with Intune, 30
Windows Event Forwarding (WEF), 85
Windows Installer (.exe, .msi)
app installation with Intune, 28
Windows Installer through MDM, (.msi)
app installation with Intune, 30
Windows PC management, Intune, overview of, 6–7
Windows Phone app package (.xap, .appx, .appxbundle)
app installation with Intune, 29
Windows Phone devices, enrolling in Office 365, 163–166
Windows Phone Store for Windows devices, 31
Windows Server Active Directory, Office 365 identity management, 148
wipes, data
Office 365 Mobile Device Management, 123, 170–172
Office 365 security policy configuration, 156
wiping devices, 135–136, 170–172
wireless networks, Intune and, 6
Word, Microsoft, 36–42, 57. See also Office 365
3.128.197.2