You are previewing Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD.
O'Reilly logo
Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD

Book Description

Enable employees to be productive and access data from any location or device
Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA).

Plan, deploy, and deliver complete enterprise mobility while improving security

  • Choose the right Microsoft enterprise mobility solution for your organization

  • Protect apps and data with Microsoft Intune Mobile Application Management (MAM)

  • Identify suspicious user or device activity in hybrid cloud/on-premises environments

  • Prepare for and successfully implement Microsoft ATA

  • Flexibly manage diverse mobile devices with MDM for Office 365

  • Configure access, define policies, enroll mobile devices, and manage compliance

  • Table of Contents

    1. Cover
    2. Title Page
    3. Copyright Page
    4. Contents at a glance
    5. Contents
    6. Foreword
    7. Introduction
      1. Acknowledgments
      2. Free ebooks from Microsoft Press
      3. Errata, updates, & book support
      4. We want to hear from you
      5. Stay in touch
    8. Chapter 1. Understanding Microsoft enterprise mobility solutions
      1. Enterprise mobility management concepts
        1. Users
        2. Devices
        3. Apps
        4. Data
        5. Protection
      2. Microsoft enterprise mobility solutions
        1. Microsoft Enterprise Mobility Suite
        2. Mobile Device Management for Office 365
      3. Selecting the best solution for your organization
        1. Planning and designing a solution
        2. Comparing Microsoft mobility management solutions
      4. Enterprise mobility management scenario
    9. Chapter 2. Introducing mobile application management with Intune
      1. The basics of app management with Intune
        1. Set the mobile device management authority
        2. Create user and device groups
        3. Getting apps to the cloud
        4. Software installation types
        5. Understanding app deployment actions
        6. Monitoring app deployments
      2. Protecting apps and data with Intune MAM policies
        1. Creating MAM policies to protect company apps and data
        2. Creating a MAM-protected app of your own
      3. Managing applications without managing devices
    10. Chapter 3. Implementing mobile application management
      1. Scenario
        1. Implementation goals
        2. Solution diagram
      2. Planning and designing the solution
        1. Users
        2. Devices
        3. Apps
        4. Data-access strategy
        5. Unmanaged devices
      3. Preparing apps and policies
        1. Publish the managed iOS apps
        2. Create a managed app policy to deploy with managed iOS apps
        3. Create a managed app policy to deploy without deploying apps or managing devices
      4. Performing the app and policy rollout
        1. Scope the rollout project
        2. Proof of concept
        3. Small production Pilot phase
        4. Enterprise Rollout phase
        5. Run State phase
    11. Chapter 4. Introducing Microsoft Advanced Threat Analytics
      1. Protecting on-premises resources
        1. Understanding ATA
        2. ATA architecture
        3. Enhance enterprise mobility security with ATA
      2. Planning and designing ATA
        1. Infrastructure considerations
        2. ATA Center considerations
        3. ATA Gateway considerations
        4. ATA Console considerations
    12. Chapter 5. Implementing Microsoft Advanced Threat Analytics
      1. Scenario requirements for on-premises protection
        1. Implementation goals
        2. Solution diagram
      2. Deploying ATA
        1. Installing ATA Center
        2. Configuring domain connectivity
        3. Installing ATA Gateway
        4. Configuring ATA Gateway
      3. Setting up the ATA environment
        1. Configuring alerts
        2. Monitoring resources
        3. Detection settings
        4. Telemetry settings
        5. Database management
      4. Leveraging ATA for threat mitigation and incident response
        1. Reviewing suspicious activities
        2. Attack detection
    13. Chapter 6. Introducing Mobile Device Management for Office 365
      1. Mobile device management concepts
      2. Exchange ActiveSync
      3. Mobile Device Management for Office 365
        1. MDM for Office 365 architecture
        2. MDM for Office 365 features and capabilities
        3. Office 365 admin center
        4. Office 365 Compliance Center
      4. Planning for MDM for Office 365
        1. Setting up MDM for Office 365
        2. Apple Push Notification service certificate for iOS devices
        3. Adding or configuring a domain
        4. Multi-factor authentication
      5. Device management
        1. Organization-wide device access settings
        2. Security policies
        3. Wiping devices
        4. Using the reporting features
      6. Choosing MDM for Office 365
        1. MDM for Office 365 and Intune coexistence
    14. Chapter 7. Implementing Mobile Device Management for Office 365
      1. Scenario
        1. Implementation goals
        2. Solution diagram
      2. Planning for MDM for Office 365
        1. Identity management
        2. Policy considerations
        3. Device considerations
      3. Deploying MDM for Office 365
        1. Office 365 tenant
        2. Setting the MDM Authority
      4. Configuring MDM for Office 365
        1. Apple Push Notification service certificate for iOS devices
        2. Organization-wide access settings
        3. Security policies
      5. Enrolling devices
        1. Enrolling Android devices
        2. Enrolling Apple iOS devices
        3. Enrolling Windows Phone devices
      6. Managing devices
        1. Viewing enrolled devices
        2. Viewing the device compliance report
        3. Viewing and updating device security policies
        4. User device management
      7. Wiping mobile devices
        1. Selective device wipe
        2. Full device wipe
    15. Appendix: Troubleshooting Microsoft Advanced Threat Analytics
      1. Troubleshooting flow
        1. Initial assessment
        2. Data collection
        3. Data analysis
        4. Action plan
        5. Validate the behavior and archive the ticket
      2. Troubleshooting an ATA installation
        1. Post-installation troubleshooting
      3. Troubleshooting ATA operations
        1. Hardware maintenance
        2. Unable to access ATA Console
        3. Unable to start ATA Center or ATA Gateway
    16. Index
    17. About the authors
    18. Free ebooks
    19. Microsoft Press Guided Tours
    20. Hear about it first
    21. Visit us today
    22. Survey
    23. Code Snippets