Home Page Icon
Home Page
Table of Contents for
Visit us today
Close
Visit us today
by Robert Mazzoli, Jeff Gilbert, Yuri Diogenes
Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD
Cover
Title Page
Copyright Page
Contents at a glance
Contents
Foreword
Introduction
Acknowledgments
Free ebooks from Microsoft Press
Errata, updates, & book support
We want to hear from you
Stay in touch
Chapter 1. Understanding Microsoft enterprise mobility solutions
Enterprise mobility management concepts
Users
Devices
Apps
Data
Protection
Microsoft enterprise mobility solutions
Microsoft Enterprise Mobility Suite
Mobile Device Management for Office 365
Selecting the best solution for your organization
Planning and designing a solution
Comparing Microsoft mobility management solutions
Enterprise mobility management scenario
Chapter 2. Introducing mobile application management with Intune
The basics of app management with Intune
Set the mobile device management authority
Create user and device groups
Getting apps to the cloud
Software installation types
Understanding app deployment actions
Monitoring app deployments
Protecting apps and data with Intune MAM policies
Creating MAM policies to protect company apps and data
Creating a MAM-protected app of your own
Managing applications without managing devices
Chapter 3. Implementing mobile application management
Scenario
Implementation goals
Solution diagram
Planning and designing the solution
Users
Devices
Apps
Data-access strategy
Unmanaged devices
Preparing apps and policies
Publish the managed iOS apps
Create a managed app policy to deploy with managed iOS apps
Create a managed app policy to deploy without deploying apps or managing devices
Performing the app and policy rollout
Scope the rollout project
Proof of concept
Small production Pilot phase
Enterprise Rollout phase
Run State phase
Chapter 4. Introducing Microsoft Advanced Threat Analytics
Protecting on-premises resources
Understanding ATA
ATA architecture
Enhance enterprise mobility security with ATA
Planning and designing ATA
Infrastructure considerations
ATA Center considerations
ATA Gateway considerations
ATA Console considerations
Chapter 5. Implementing Microsoft Advanced Threat Analytics
Scenario requirements for on-premises protection
Implementation goals
Solution diagram
Deploying ATA
Installing ATA Center
Configuring domain connectivity
Installing ATA Gateway
Configuring ATA Gateway
Setting up the ATA environment
Configuring alerts
Monitoring resources
Detection settings
Telemetry settings
Database management
Leveraging ATA for threat mitigation and incident response
Reviewing suspicious activities
Attack detection
Chapter 6. Introducing Mobile Device Management for Office 365
Mobile device management concepts
Exchange ActiveSync
Mobile Device Management for Office 365
MDM for Office 365 architecture
MDM for Office 365 features and capabilities
Office 365 admin center
Office 365 Compliance Center
Planning for MDM for Office 365
Setting up MDM for Office 365
Apple Push Notification service certificate for iOS devices
Adding or configuring a domain
Multi-factor authentication
Device management
Organization-wide device access settings
Security policies
Wiping devices
Using the reporting features
Choosing MDM for Office 365
MDM for Office 365 and Intune coexistence
Chapter 7. Implementing Mobile Device Management for Office 365
Scenario
Implementation goals
Solution diagram
Planning for MDM for Office 365
Identity management
Policy considerations
Device considerations
Deploying MDM for Office 365
Office 365 tenant
Setting the MDM Authority
Configuring MDM for Office 365
Apple Push Notification service certificate for iOS devices
Organization-wide access settings
Security policies
Enrolling devices
Enrolling Android devices
Enrolling Apple iOS devices
Enrolling Windows Phone devices
Managing devices
Viewing enrolled devices
Viewing the device compliance report
Viewing and updating device security policies
User device management
Wiping mobile devices
Selective device wipe
Full device wipe
Appendix: Troubleshooting Microsoft Advanced Threat Analytics
Troubleshooting flow
Initial assessment
Data collection
Data analysis
Action plan
Validate the behavior and archive the ticket
Troubleshooting an ATA installation
Post-installation troubleshooting
Troubleshooting ATA operations
Hardware maintenance
Unable to access ATA Console
Unable to start ATA Center or ATA Gateway
Index
About the authors
Free ebooks
Microsoft Press Guided Tours
Hear about it first
Visit us today
Survey
Code Snippets
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Hear about it first
Next
Next Chapter
Survey
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset