Muutke küpsiste eelistusi

Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD [Pehme köide]

  • Formaat: Paperback / softback, 224 pages, kõrgus x laius x paksus: 226x189x15 mm, kaal: 376 g
  • Sari: IT Best Practices - Microsoft Press
  • Ilmumisaeg: 08-Feb-2016
  • Kirjastus: Microsoft Press
  • ISBN-10: 150930133X
  • ISBN-13: 9781509301331
  • Pehme köide
  • Hind: 39,69 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 224 pages, kõrgus x laius x paksus: 226x189x15 mm, kaal: 376 g
  • Sari: IT Best Practices - Microsoft Press
  • Ilmumisaeg: 08-Feb-2016
  • Kirjastus: Microsoft Press
  • ISBN-10: 150930133X
  • ISBN-13: 9781509301331

This guide offers a complete, proven, real-world approach to managing enterprise mobility, enabling your people to be productive on any device, anywhere, while you protect both corporate assets and user privacy.

 

Yuri Diogenes and Jeff Gilbert show how to leverage Microsoft Intune's powerful capabilities to manage application mobility based on your organization's specific requirements. You'll also learn how to take full advantage of the Mobile Device Management (MDM) capabilities now built into Microsoft Office 365, and how to protect on-premises resources with Microsoft Advanced Threat Analytics (ATA), a key component of Microsoft's Enterprise Mobility Suite.

 

If you want to maximize the value of mobility and the cloud,Enterprise Mobility from App Management to Threat Mitigation will help you do so with more security, more control, and greater confidence.

Introduction xiii
Chapter 1 Understanding Microsoft enterprise mobility solutions 1(20)
Enterprise mobility management concepts
1(3)
Users
2(1)
Devices
3(1)
Apps
3(1)
Data
4(1)
Protection
4(1)
Microsoft enterprise mobility solutions
4(4)
Microsoft Enterprise Mobility Suite
5(2)
Mobile device management for Office 365
7(1)
Selecting the best solution for your organization
8(10)
Planning and designing a solution
9(6)
Comparing Microsoft mobility management solutions
15(3)
Enterprise mobility management scenario
18(3)
Chapter 2 Introducing mobile application management with Intune 21(26)
The basics of app management with Intune
22(14)
Set the mobile device management authority
22(1)
Create user and device groups
23(1)
Getting apps to the cloud
24(3)
Software installation types
27(6)
Understanding app deployment actions
33(2)
Monitoring app deployments
35(1)
Protecting apps and data with Intune MAM policies
36(6)
Creating MAM policies to protect company apps and data
37(4)
Creating a MAM-protected app of your own
41(1)
Managing applications without managing devices
42(5)
Chapter 3 Implementing mobile application management 47(36)
Scenario
47(2)
Implementation goals
48(1)
Solution diagram
48(1)
Planning and designing the solution
49(2)
Users
49(1)
Devices
50(1)
Apps
50(1)
Data-access strategy
50(1)
Unmanaged devices
51(1)
Preparing apps and policies
51(17)
Publish the managed iOS apps
51(7)
Create a managed app policy to deploy with managed iOS apps
58(3)
Create a managed app policy to deploy without deploying apps or managing devices
61(7)
Performing the app and policy rollout
68(15)
Scope the rollout project
69(1)
Proof of concept
70(10)
Small production Pilot phase
80(1)
Enterprise Rollout phase
81(1)
Run State phase
81(2)
Chapter 4 Introducing Microsoft Advanced Threat Analytics 83(12)
Protecting on-premises resources
83(8)
Understanding ATA
84(6)
ATA architecture
90(1)
Enhance enterprise mobility security with ATA
91(1)
Planning and designing ATA
91(4)
Infrastructure considerations
91(1)
ATA Center considerations
92(1)
ATA Gateway considerations
93(1)
ATA Console considerations
93(2)
Chapter 5 Implementing Microsoft Advanced Threat Analytics 95(22)
Scenario requirements for on-premises protection
95(1)
Implementation goals
96(1)
Solution diagram
96(1)
Deploying ATA
96(10)
Installing ATA Center
97(4)
Configuring domain connectivity
101(1)
Installing ATA Gateway
102(3)
Configuring ATA Gateway
105(1)
Setting up the ATA environment
106(7)
Configuring alerts
106(2)
Monitoring resources
108(1)
Detection settings
109(2)
Telemetry settings
111(1)
Database management
111(2)
Leveraging ATA for threat mitigation and incident response
113(4)
Reviewing suspicious activities
114(1)
Attack detection
115(2)
Chapter 6 Introducing Mobile Device Management for Office 365 117(28)
Mobile device management concepts
118(1)
Exchange ActiveSync
118(2)
Mobile Device Management for Office 365
120(5)
MDM for Office 365 architecture
120(1)
MDM for Office 365 features and capabilities
121(2)
Office 365 admin center
123(1)
Office 365 Compliance Center
124(1)
Planning for MDM for Office 365
125(6)
Setting up MDM for Office 365
126(1)
Apple Push Notification service certificate for iOS devices
126(1)
Adding or configuring a domain
127(2)
Multi-factor authentication
129(2)
Device management
131(7)
Organization-wide device access settings
132(1)
Security policies
133(2)
Wiping devices
135(2)
Using the reporting features
137(1)
Choosing MDM for Office 365
138(7)
MDM for Office 365 and Intune coexistence
140(5)
Chapter 7 Implementing Mobile Device Management for Office 365 145(28)
Scenario
145(2)
Implementation goals
146(1)
Solution diagram
146(1)
Planning for MDM for Office 365
147(2)
Identity management
147(2)
Policy considerations
149(1)
Device considerations
149(1)
Deploying MDM for Office 365
149(2)
Office 365 tenant
150(1)
Setting the MDM Authority
150(1)
Configuring MDM for Office 365
151(7)
Apple Push Notification service certificate for iOS devices
151(3)
Organization-wide access settings
154(1)
Security policies
155(3)
Enrolling devices
158(8)
Enrolling Android devices
159(2)
Enrolling Apple iOS devices
161(2)
Enrolling Windows Phone devices
163(3)
Managing devices
166(4)
Viewing enrolled devices
167(1)
Viewing the device compliance report
167(1)
Viewing and updating device security policies
168(1)
User device management
169(1)
Wiping mobile devices
170(3)
Selective device wipe
171(1)
Full device wipe
172(1)
Appendix Troubleshooting Microsoft Advanced Threat Analytics 173(12)
Troubleshooting flow
173(3)
Initial assessment
173(1)
Data collection
174(1)
Data analysis
175(1)
Action plan
175(1)
Validate the behavior and archive the ticket
176(1)
Troubleshooting an ATA installation
176(4)
Post-installation troubleshooting
178(2)
Troubleshooting ATA operations
180(5)
Hardware maintenance
181(1)
Unable to access ATA Console
182(1)
Unable to start ATA Center or ATA Gateway
183(2)
Index 185
YURI DIOGENES is a Senior Content Developer on the CSI Enterprise Mobility Team, focusing on BYOD and Azure Security Center. Previously, Yuri has worked as a writer for the Windows Security Team and as a Support Escalation Engineer for the CSS Forefront Team, also at Microsoft. He has a Master of Science degree in Cybersecurity Intelligence and Forensics from UTICA College and an MBA from FGF in Brazil, and he holds several industry certifications. He is co-author of  Enterprise Mobility Suite: Managing BYOD and Company-Owned Devices (Microsoft Press, 2015),  Microsoft Forefront Threat Management Gateway (TMG) Administrators Companion (Microsoft Press, 2010), and three other Forefront titles from Microsoft Press.   JEFF GILBERT is a Senior Content Publishing Manager on the Enterprise Mobility Team at Microsoft. He manages the documentation teams supporting Microsoft System Center Configuration Manager and Microsoft Intune. Prior to returning to management, he was responsible for authoring cross-product solutions to IT business problems involving enterprise client-management technologies, including Microsoft System Center Configuration Manager, Microsoft Intune, and MDOP. Previously, Jeff was the content publishing manager for MDOP and a senior technical writing lead for the Configuration Manager 2007 documentation team. Before joining Microsoft, Jeff was an SMS administrator with the US Army. Jeff is a regular speaker on enterprise client management and MDOP technologies at conferences including the Microsoft Management Summit (MMS), TechEd, IT\Dev Connections, and the Minnesota Management Summit (MMS).   ROBERT MAZZOLI is a Senior Content Developer with Microsoft on the Enterprise Mobility team, working on developing enterprise mobility solutions using the Microsoft Enterprise Mobility Suite and MDM for Office 365. Robert joined the Enterprise Mobility team in 2014 and has been a speaker on enterprise mobility solutions and mobile device management at several conferences, including Ignite 2015 and the 2015 Microsoft MVP Summit. Previously, Robert was a Senior Content Developer for Microsoft Exchange Server and Exchange Online in Office 365, specializing in Exchange hybrid deployments and managing the Exchange Server Deployment Assistant. Before joining Microsoft, Robert owned an information technology consulting business and served as an officer in the United States Navy.