- Microsoft 365 Mobility and Security:Exam Guide MS-101
- Nate Chamberlain
- 359字
- 2021-06-24 12:06:24
Planning for MDM
When thinking of your organization's path to MDM, you'll want to consider and assess your company's unique requirements. The exam will likely focus more on the settings and configuration of MDM, so we'll focus primarily on them. When you're ready to begin implementing MDM, you can generally break it down into the following 10 steps:
- Configure the security groups in Active Directory (AD) or Azure AD that will allow you to easily assign policies or apply restrictions based on membership. Many of the later steps will depend on you thoughtfully creating these groups on which you'll base restrictions and permissions:

- Assign Intune and Office 365 licenses to users from within the Microsoft 365 admin center (admin.microsoft.com) or Azure Active Directory. Users must be assigned an Intune license to be able to enroll their device.
- Set your MDM authority to Intune (see the Setting an MDM authority section), and create an MDM push certificate for Apple devices (see the Device types and enrollment section).
- Create terms and conditions via Intune | Tenant Administration | Terms and Conditions | Create, as seen in the following screenshot:

Deploying terms and conditions is optional, but requires users to accept your company's terms of usage prior to enrolling via the company portal. This can also be configured during setup of conditional access, which we'll discuss more in Chapter 2, Managing Device Compliance:
- Deploy general/custom configuration policies (restrictions or allowances based on device types and groups). The following example of a configuration profile will block access to Game Center for iOS devices:

- Deploy resource profiles (Wi-Fi, email, and VPN resources that can be deployed).
- Deploy store or custom/line-of-business apps.
- Deploy compliance policies to make sure users are using approved devices (specific OS versions, not jailbroken devices, and so on). The following example policy ensures iOS devices use passwords to unlock the device with at least four characters:

- Enable conditional access policies that will restrict users from accessing company data if certain criteria aren't met, such as the compliance policies in step 8.
- Finally, enroll the devices.
Next, we will look at device types.
推薦閱讀
- 火格局的時空變異及其在電網(wǎng)防火中的應(yīng)用
- Introduction to DevOps with Kubernetes
- 腦動力:PHP函數(shù)速查效率手冊
- 深度學(xué)習(xí)中的圖像分類與對抗技術(shù)
- 統(tǒng)計(jì)策略搜索強(qiáng)化學(xué)習(xí)方法及應(yīng)用
- Hybrid Cloud for Architects
- 變頻器、軟啟動器及PLC實(shí)用技術(shù)260問
- The Python Workshop
- 分析力!專業(yè)Excel的制作與分析實(shí)用法則
- Mastering GitLab 12
- 大數(shù)據(jù)案例精析
- 電腦上網(wǎng)入門
- Redash v5 Quick Start Guide
- 數(shù)據(jù)清洗
- Eclipse全程指南