Cart
Free US shipping over $10
Proud to be B-Corp

Enterprise Mobility with App Management, Office 365, and Threat Mitigation Yuri Diogenes

Enterprise Mobility with App Management, Office 365, and Threat Mitigation By Yuri Diogenes

Enterprise Mobility with App Management, Office 365, and Threat Mitigation by Yuri Diogenes


$10.00
Condition - Very Good
Only 1 left

Enterprise Mobility with App Management, Office 365, and Threat Mitigation Summary

Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD by Yuri Diogenes

Enable employees to be productive and access data from any location or device Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA). Plan, deploy, and deliver complete enterprise mobility while improving security Choose the right Microsoft enterprise mobility solution for your organization Protect apps and data with Microsoft Intune Mobile Application Management (MAM) Identify suspicious user or device activity in hybrid cloud/on-premises environments Prepare for and successfully implement Microsoft ATA Flexibly manage diverse mobile devices with MDM for Office 365 Configure access, define policies, enroll mobile devices, and manage compliance

About Yuri Diogenes

YURI DIOGENES is a Senior Content Developer on the CSI Enterprise Mobility Team, focusing on BYOD and Azure Security Center. Previously, Yuri has worked as a writer for the Windows Security Team and as a Support Escalation Engineer for the CSS Forefront Team, also at Microsoft. He has a Master of Science degree in Cybersecurity Intelligence and Forensics from UTICA College and an MBA from FGF in Brazil, and he holds several industry certifications. He is co-author of Enterprise Mobility Suite: Managing BYOD and Company-Owned Devices (Microsoft Press, 2015), Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion (Microsoft Press, 2010), and three other Forefront titles from Microsoft Press. JEFF GILBERT is a Senior Content Publishing Manager on the Enterprise Mobility Team at Microsoft. He manages the documentation teams supporting Microsoft System Center Configuration Manager and Microsoft Intune. Prior to returning to management, he was responsible for authoring cross-product solutions to IT business problems involving enterprise client-management technologies, including Microsoft System Center Configuration Manager, Microsoft Intune, and MDOP. Previously, Jeff was the content publishing manager for MDOP and a senior technical writing lead for the Configuration Manager 2007 documentation team. Before joining Microsoft, Jeff was an SMS administrator with the US Army. Jeff is a regular speaker on enterprise client management and MDOP technologies at conferences including the Microsoft Management Summit (MMS), TechEd, IT\Dev Connections, and the Minnesota Management Summit (MMS). ROBERT MAZZOLI is a Senior Content Developer with Microsoft on the Enterprise Mobility team, working on developing enterprise mobility solutions using the Microsoft Enterprise Mobility Suite and MDM for Office 365. Robert joined the Enterprise Mobility team in 2014 and has been a speaker on enterprise mobility solutions and mobile device management at several conferences, including Ignite 2015 and the 2015 Microsoft MVP Summit. Previously, Robert was a Senior Content Developer for Microsoft Exchange Server and Exchange Online in Office 365, specializing in Exchange hybrid deployments and managing the Exchange Server Deployment Assistant. Before joining Microsoft, Robert owned an information technology consulting business and served as an officer in the United States Navy.

Table of Contents

Introduction xiii Chapter 1: Understanding Microsoft enterprise mobility solutions 1 Enterprise mobility management concepts 1 Users 2 Devices 3 Apps 3 Data 4 Protection 4 Microsoft enterprise mobility solutions 4 Microsoft Enterprise Mobility Suite 5 Mobile device management for Office 365 7 Selecting the best solution for your organization 8 Planning and designing a solution 9 Comparing Microsoft mobility management solutions 15 Enterprise mobility management scenario 18 Chapter 2: Introducing mobile application management with Intune 21 The basics of app management with Intune 22 Set the mobile device management authority 22 Create user and device groups 23 Getting apps to the cloud 24 Software installation types 27 Understanding app deployment actions 33 Monitoring app deployments 35 Protecting apps and data with Intune MAM policies 36 Creating MAM policies to protect company apps and data 37 Creating a MAM-protected app of your own 41 Managing applications without managing devices 42 Chapter 3: Implementing mobile application management 47 Scenario 47 Implementation goals 48 Solution diagram 48 Planning and designing the solution 49 Users 49 Devices 50 Apps 50 Data-access strategy 50 Unmanaged devices 51 Preparing apps and policies 51 Publish the managed iOS apps 51 Create a managed app policy to deploy with managed iOS apps 58 Create a managed app policy to deploy without deploying apps or managing devices 61 Performing the app and policy rollout 68 Scope the rollout project 69 Proof of concept 70 Small production Pilot phase 80 Enterprise Rollout phase 81 Run State phase 81 Chapter 4: Introducing Microsoft Advanced Threat Analytics 83 Protecting on-premises resources 83 Understanding ATA 84 ATA architecture 90 Enhance enterprise mobility security with ATA 91 Planning and designing ATA 91 Infrastructure considerations 91 ATA Center considerations 92 ATA Gateway considerations 93 ATA Console considerations 93 Chapter 5: Implementing Microsoft Advanced Threat Analytics 95 Scenario requirements for on-premises protection 95 Implementation goals 96 Solution diagram 96 Deploying ATA 96 Installing ATA Center 97 Configuring domain connectivity 101 Installing ATA Gateway 102 Configuring ATA Gateway 105 Setting up the ATA environment 106 Configuring alerts 106 Monitoring resources 108 Detection settings 109 Telemetry settings 111 Database management 111 Leveraging ATA for threat mitigation and incident response 113 Reviewing suspicious activities 114 Attack detection 115 Chapter 6: Introducing Mobile Device Management for Office 365 117 Mobile device management concepts 118 Exchange ActiveSync 118 Mobile Device Management for Office 365 120 MDM for Office 365 architecture 120 MDM for Office 365 features and capabilities 121 Office 365 admin center 123 Office 365 Compliance Center 124 Planning for MDM for Office 365 125 Setting up MDM for Office 365 126 Apple Push Notification service certificate for iOS devices 126 Adding or configuring a domain 127 Multi-factor authentication 129 Device management 131 Organization-wide device access settings 132 Security policies 133 Wiping devices 135 Using the reporting features 137 Choosing MDM for Office 365 138 MDM for Office 365 and Intune coexistence 140 Chapter 7: Implementing Mobile Device Management for Office 365 145 Scenario 145 Implementation goals 146 Solution diagram 146 Planning for MDM for Office 365 147 Identity management 147 Policy considerations 149 Device considerations 149 Deploying MDM for Office 365 149 Office 365 tenant 150 Setting the MDM Authority 150 Configuring MDM for Office 365 151 Apple Push Notification service certificate for iOS devices 151 Organization-wide access settings 154 Security policies 155 Enrolling devices 158 Enrolling Android devices 159 Enrolling Apple iOS devices 161 Enrolling Windows Phone devices 163 Managing devices 166 Viewing enrolled devices 167 Viewing the device compliance report 167 Viewing and updating device security policies 168 User device management 169 Wiping mobile devices 170 Selective device wipe 171 Full device wipe 172 Appendix: Troubleshooting Microsoft Advanced Threat Analytics 173 Troubleshooting flow 173 Initial assessment 173 Data collection 174 Data analysis 175 Action plan 175 Validate the behavior and archive the ticket 176 Troubleshooting an ATA installation 176 Post-installation troubleshooting 178 Troubleshooting ATA operations 180 Hardware maintenance 181 Unable to access ATA Console 182 Unable to start ATA Center or ATA Gateway 183 Index 185

Additional information

GOR008611548
9781509301331
150930133X
Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD by Yuri Diogenes
Used - Very Good
Paperback
Microsoft Press,U.S.
2016-02-08
224
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Enterprise Mobility with App Management, Office 365, and Threat Mitigation