PRZEDMIOTEM OFERTY JEST KOD DOSTĘPOWY DO KSIĄŻKI ELEKTRONICZNEJ (EBOOK)
KSIĄŻKA JEST DOSTĘPNA NA ZEWNĘTRZNEJ PLATFORMIE. KSIĄŻKA NIE JEST W POSTACI PLIKU.
Enable employees to be productive and access data from any location or device Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA). Plan, deploy, and deliver complete enterprise mobility while improving security Choose the right Microsoft enterprise mobility solution for your organization Protect apps and data with Microsoft Intune Mobile Application Management (MAM) Identify suspicious user or device activity in hybrid cloud/on-premises environments Prepare for and successfully implement Microsoft ATA Flexibly manage diverse mobile devices with MDM for Office 365 Configure access, define policies, enroll mobile devices, and manage compliance
- Autorzy: Yuri Diogenes Jeff Gilbert Robert Mazzoli
- Wydawnictwo: Pearson Technology Group
- Data wydania: 2016
- Wydanie: 1
- Liczba stron:
- Forma publikacji: ePub (online)
- Język publikacji: angielski
- ISBN: 9781509301355
- Cover
- Title Page
- Copyright Page
- Contents at a glance
- Contents
- Foreword
- Introduction
- Acknowledgments
- Free ebooks from Microsoft Press
- Errata, updates, & book support
- We want to hear from you
- Stay in touch
- Chapter 1. Understanding Microsoft enterprise mobility solutions
- Enterprise mobility management concepts
- Users
- Devices
- Apps
- Data
- Protection
- Microsoft enterprise mobility solutions
- Microsoft Enterprise Mobility Suite
- Mobile Device Management for Office 365
- Selecting the best solution for your organization
- Planning and designing a solution
- Comparing Microsoft mobility management solutions
- Enterprise mobility management scenario
- Chapter 2. Introducing mobile application management with Intune
- The basics of app management with Intune
- Set the mobile device management authority
- Create user and device groups
- Getting apps to the cloud
- Software installation types
- Understanding app deployment actions
- Monitoring app deployments
- Protecting apps and data with Intune MAM policies
- Creating MAM policies to protect company apps and data
- Creating a MAM-protected app of your own
- Managing applications without managing devices
- Chapter 3. Implementing mobile application management
- Scenario
- Implementation goals
- Solution diagram
- Planning and designing the solution
- Users
- Devices
- Apps
- Data-access strategy
- Unmanaged devices
- Preparing apps and policies
- Publish the managed iOS apps
- Create a managed app policy to deploy with managed iOS apps
- Create a managed app policy to deploy without deploying apps or managing devices
- Performing the app and policy rollout
- Scope the rollout project
- Proof of concept
- Small production Pilot phase
- Enterprise Rollout phase
- Run State phase
- Chapter 4. Introducing Microsoft Advanced Threat Analytics
- Protecting on-premises resources
- Understanding ATA
- ATA architecture
- Enhance enterprise mobility security with ATA
- Planning and designing ATA
- Infrastructure considerations
- ATA Center considerations
- ATA Gateway considerations
- ATA Console considerations
- Chapter 5. Implementing Microsoft Advanced Threat Analytics
- Scenario requirements for on-premises protection
- Implementation goals
- Solution diagram
- Deploying ATA
- Installing ATA Center
- Configuring domain connectivity
- Installing ATA Gateway
- Configuring ATA Gateway
- Setting up the ATA environment
- Configuring alerts
- Monitoring resources
- Detection settings
- Telemetry settings
- Database management
- Leveraging ATA for threat mitigation and incident response
- Reviewing suspicious activities
- Attack detection
- Chapter 6. Introducing Mobile Device Management for Office 365
- Mobile device management concepts
- Exchange ActiveSync
- Mobile Device Management for Office 365
- MDM for Office 365 architecture
- MDM for Office 365 features and capabilities
- Office 365 admin center
- Office 365 Compliance Center
- Planning for MDM for Office 365
- Setting up MDM for Office 365
- Apple Push Notification service certificate for iOS devices
- Adding or configuring a domain
- Multi-factor authentication
- Device management
- Organization-wide device access settings
- Security policies
- Wiping devices
- Using the reporting features
- Choosing MDM for Office 365
- MDM for Office 365 and Intune coexistence
- Chapter 7. Implementing Mobile Device Management for Office 365
- Scenario
- Implementation goals
- Solution diagram
- Planning for MDM for Office 365
- Identity management
- Policy considerations
- Device considerations
- Deploying MDM for Office 365
- Office 365 tenant
- Setting the MDM Authority
- Configuring MDM for Office 365
- Apple Push Notification service certificate for iOS devices
- Organization-wide access settings
- Security policies
- Enrolling devices
- Enrolling Android devices
- Enrolling Apple iOS devices
- Enrolling Windows Phone devices
- Managing devices
- Viewing enrolled devices
- Viewing the device compliance report
- Viewing and updating device security policies
- User device management
- Wiping mobile devices
- Selective device wipe
- Full device wipe
- Appendix: Troubleshooting Microsoft Advanced Threat Analytics
- Troubleshooting flow
- Initial assessment
- Data collection
- Data analysis
- Action plan
- Validate the behavior and archive the ticket
- Troubleshooting an ATA installation
- Post-installation troubleshooting
- Troubleshooting ATA operations
- Hardware maintenance
- Unable to access ATA Console
- Unable to start ATA Center or ATA Gateway
- Index
- About the authors
- Free ebooks
- Microsoft Press Guided Tours
- Hear about it first
- Visit us today
- Survey
- Code Snippets
W tej ofercie kupujesz kod dostępowy umożliwiający dostęp do wskazanej treści. Kod umożliwia dostęp do treści za pomocą przeglądarki WWW, dedykowanej aplikacji iOS (Apple) ze sklepu App Store lub dedykowanej aplikacji Android ze sklepu Play. Kod oraz instrukcje otrzymasz pocztą elektroniczną niezwłocznie po zaksięgowaniu płatności. Brak możliwości pobrania pliku.
Na podstawie art. 38 pkt 13 Ustawy z dnia 30 maja 2014 roku o prawach konsumenta realizując kod dostępowy rezygnujesz z prawa do odstąpienia od umowy zawartej na odległość.
Typ licencji: licencja wieczysta.
BRAK MOŻLIWOŚCI POBRANIA PLIKU.
NIE PRZESYŁAMY PLIKÓW E-MAILEM.