Introduction |
|
xiii | |
Chapter 1 Understanding Microsoft enterprise mobility solutions |
|
1 | (20) |
|
Enterprise mobility management concepts |
|
|
1 | (3) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
Microsoft enterprise mobility solutions |
|
|
4 | (4) |
|
Microsoft Enterprise Mobility Suite |
|
|
5 | (2) |
|
Mobile device management for Office 365 |
|
|
7 | (1) |
|
Selecting the best solution for your organization |
|
|
8 | (10) |
|
Planning and designing a solution |
|
|
9 | (6) |
|
Comparing Microsoft mobility management solutions |
|
|
15 | (3) |
|
Enterprise mobility management scenario |
|
|
18 | (3) |
Chapter 2 Introducing mobile application management with Intune |
|
21 | (26) |
|
The basics of app management with Intune |
|
|
22 | (14) |
|
Set the mobile device management authority |
|
|
22 | (1) |
|
Create user and device groups |
|
|
23 | (1) |
|
Getting apps to the cloud |
|
|
24 | (3) |
|
Software installation types |
|
|
27 | (6) |
|
Understanding app deployment actions |
|
|
33 | (2) |
|
Monitoring app deployments |
|
|
35 | (1) |
|
Protecting apps and data with Intune MAM policies |
|
|
36 | (6) |
|
Creating MAM policies to protect company apps and data |
|
|
37 | (4) |
|
Creating a MAM-protected app of your own |
|
|
41 | (1) |
|
Managing applications without managing devices |
|
|
42 | (5) |
Chapter 3 Implementing mobile application management |
|
47 | (36) |
|
|
47 | (2) |
|
|
48 | (1) |
|
|
48 | (1) |
|
Planning and designing the solution |
|
|
49 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Preparing apps and policies |
|
|
51 | (17) |
|
Publish the managed iOS apps |
|
|
51 | (7) |
|
Create a managed app policy to deploy with managed iOS apps |
|
|
58 | (3) |
|
Create a managed app policy to deploy without deploying apps or managing devices |
|
|
61 | (7) |
|
Performing the app and policy rollout |
|
|
68 | (15) |
|
Scope the rollout project |
|
|
69 | (1) |
|
|
70 | (10) |
|
Small production Pilot phase |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (2) |
Chapter 4 Introducing Microsoft Advanced Threat Analytics |
|
83 | (12) |
|
Protecting on-premises resources |
|
|
83 | (8) |
|
|
84 | (6) |
|
|
90 | (1) |
|
Enhance enterprise mobility security with ATA |
|
|
91 | (1) |
|
Planning and designing ATA |
|
|
91 | (4) |
|
Infrastructure considerations |
|
|
91 | (1) |
|
ATA Center considerations |
|
|
92 | (1) |
|
ATA Gateway considerations |
|
|
93 | (1) |
|
ATA Console considerations |
|
|
93 | (2) |
Chapter 5 Implementing Microsoft Advanced Threat Analytics |
|
95 | (22) |
|
Scenario requirements for on-premises protection |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (10) |
|
|
97 | (4) |
|
Configuring domain connectivity |
|
|
101 | (1) |
|
|
102 | (3) |
|
|
105 | (1) |
|
Setting up the ATA environment |
|
|
106 | (7) |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
111 | (2) |
|
Leveraging ATA for threat mitigation and incident response |
|
|
113 | (4) |
|
Reviewing suspicious activities |
|
|
114 | (1) |
|
|
115 | (2) |
Chapter 6 Introducing Mobile Device Management for Office 365 |
|
117 | (28) |
|
Mobile device management concepts |
|
|
118 | (1) |
|
|
118 | (2) |
|
Mobile Device Management for Office 365 |
|
|
120 | (5) |
|
MDM for Office 365 architecture |
|
|
120 | (1) |
|
MDM for Office 365 features and capabilities |
|
|
121 | (2) |
|
|
123 | (1) |
|
Office 365 Compliance Center |
|
|
124 | (1) |
|
Planning for MDM for Office 365 |
|
|
125 | (6) |
|
Setting up MDM for Office 365 |
|
|
126 | (1) |
|
Apple Push Notification service certificate for iOS devices |
|
|
126 | (1) |
|
Adding or configuring a domain |
|
|
127 | (2) |
|
Multi-factor authentication |
|
|
129 | (2) |
|
|
131 | (7) |
|
Organization-wide device access settings |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
135 | (2) |
|
Using the reporting features |
|
|
137 | (1) |
|
Choosing MDM for Office 365 |
|
|
138 | (7) |
|
MDM for Office 365 and Intune coexistence |
|
|
140 | (5) |
Chapter 7 Implementing Mobile Device Management for Office 365 |
|
145 | (28) |
|
|
145 | (2) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Planning for MDM for Office 365 |
|
|
147 | (2) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (1) |
|
Deploying MDM for Office 365 |
|
|
149 | (2) |
|
|
150 | (1) |
|
Setting the MDM Authority |
|
|
150 | (1) |
|
Configuring MDM for Office 365 |
|
|
151 | (7) |
|
Apple Push Notification service certificate for iOS devices |
|
|
151 | (3) |
|
Organization-wide access settings |
|
|
154 | (1) |
|
|
155 | (3) |
|
|
158 | (8) |
|
Enrolling Android devices |
|
|
159 | (2) |
|
Enrolling Apple iOS devices |
|
|
161 | (2) |
|
Enrolling Windows Phone devices |
|
|
163 | (3) |
|
|
166 | (4) |
|
|
167 | (1) |
|
Viewing the device compliance report |
|
|
167 | (1) |
|
Viewing and updating device security policies |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (3) |
|
|
171 | (1) |
|
|
172 | (1) |
Appendix Troubleshooting Microsoft Advanced Threat Analytics |
|
173 | (12) |
|
|
173 | (3) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Validate the behavior and archive the ticket |
|
|
176 | (1) |
|
Troubleshooting an ATA installation |
|
|
176 | (4) |
|
Post-installation troubleshooting |
|
|
178 | (2) |
|
Troubleshooting ATA operations |
|
|
180 | (5) |
|
|
181 | (1) |
|
Unable to access ATA Console |
|
|
182 | (1) |
|
Unable to start ATA Center or ATA Gateway |
|
|
183 | (2) |
Index |
|
185 | |