Module 5 - Device Management 1 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Microsoft 365 SMB

Technical Fundamentals
Module 5: Manage Devices
Pedro F. Pereira
Pedro.F.Pereira@Rumos.pt
Module 6: After this module you should know
and understand:
Introduction
• Transform IT delivery and
device management
• Why Device Managment
Transform IT delivery and
device management

Zero-touch IT provisioning for all


devices using Windows Autopilot,
Apple Business Manager, or Android
Enterprise

App lifecycle management for


in-house (LOB) apps, public store
apps, and traditional Win32 apps

Depth of configuration and security


controls across any device
Secure apps and data in the
modern workplace

Respond to internal and external


threats with real-time risk-analysis
before access to company data

Protect corporate data before, during


and after they are shared, even outside
the company

Extensive visibility and intelligent


cloud-powered insights to improve
end-to-end security posture
Maximize user productivity

Deliver native app experiences that


work and feel natural on any platform

Simplify access to resources


employees need with single sign-on,
for faster service roll-out

Enable Office apps that users


love on mobile devices, without
compromising data security
Securing the devices that connect to your data
Phones Tablets Laptops Desktops

Comprehensive device management solution


Includes the full capabilities of Microsoft Intune
Ensures devices and apps are compliant with your organization's
security requirements
Includes policies that help keep your organization data safe
Protect your data on virtually any device with Intune

Mobile Device Enroll devices for


management
Provision settings,
certs, profiles
Management (MDM)
Conditional Access: Report & measure Remove corporate
Restrict access to managed device compliance data from devices
and compliant devices

Mobile Application Publish mobile


apps to users
Configure and
update apps
Management (MAM)
Conditional Access: Report app Secure & remove
inventory & usage corporate data within
Restrict which apps can be mobile apps
used to access email or files
Require key security features on
mobile devices

The problem:
Mobile devices provide productivity benefits, but they
can be difficult to secure company data on.

The solution:
Easily enforce use of key security features with Intune
Mobile Application Management:
• Deny access to jailbroken or rooted devices
• Prevent users from pasting data to unsecured apps
Remove company data when
employee leaves company

The problem:
When an employee loses a device, or leaves the
company, your data is still on their device.
Completely wiping the device will delete the employee’s
personal files such as photos and text messages

The solution:
Remotely delete company data from a device without
impacting personal files personal information intact.
Manage Windows devices

The problem:
There are several security actions that can be enabled
for Windows devices, but it is cumbersome to enable
these capabilities on a per-computer basis.

The solution:
Microsoft 365 Business offers centralized management of
Windows 10 devices so you can easily manage a
consistent set of security options.
Demo

Secure Windows devices


Too many apps available;
many not secure

The problem:
There are over 1.5 million apps available on Apple’s
app store and over 600k on Google Play, with more are
added every day. You will want to ensure that only a
select group of secure apps access company data.

The solution:
Control which apps can be installed on company-issued
mobile devices.
End of Module 5

Thank you

Next up: Hands on Lab


Lab Activity

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy