close menu
Bookswagon-24x7 online bookstore
close menu
My Account
17%
Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD(IT Best Practices - Microsoft Press)

Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD(IT Best Practices - Microsoft Press)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Enable employees to be productive and access data from any location or device Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA). Plan, deploy, and deliver complete enterprise mobility while improving security Choose the right Microsoft enterprise mobility solution for your organization Protect apps and data with Microsoft Intune Mobile Application Management (MAM) Identify suspicious user or device activity in hybrid cloud/on-premises environments Prepare for and successfully implement Microsoft ATA Flexibly manage diverse mobile devices with MDM for Office 365 Configure access, define policies, enroll mobile devices, and manage compliance

Table of Contents:
Introduction     xiii Chapter 1: Understanding Microsoft enterprise mobility solutions     1 Enterprise mobility management concepts     1 Users     2 Devices     3 Apps     3 Data     4 Protection     4 Microsoft enterprise mobility solutions     4 Microsoft Enterprise Mobility Suite     5 Mobile device management for Office 365     7 Selecting the best solution for your organization     8 Planning and designing a solution     9 Comparing Microsoft mobility management solutions     15 Enterprise mobility management scenario     18 Chapter 2: Introducing mobile application management with Intune     21 The basics of app management with Intune     22 Set the mobile device management authority     22 Create user and device groups     23 Getting apps to the cloud     24 Software installation types      27 Understanding app deployment actions     33 Monitoring app deployments     35 Protecting apps and data with Intune MAM policies     36 Creating MAM policies to protect company apps and data     37 Creating a MAM-protected app of your own      41 Managing applications without managing devices      42 Chapter 3: Implementing mobile application management     47 Scenario      47 Implementation goals     48 Solution diagram     48 Planning and designing the solution     49 Users     49 Devices     50 Apps     50 Data-access strategy     50 Unmanaged devices     51 Preparing apps and policies      51 Publish the managed iOS apps      51 Create a managed app policy to deploy with managed iOS apps     58 Create a managed app policy to deploy without deploying apps or managing devices     61 Performing the app and policy rollout      68 Scope the rollout project     69 Proof of concept     70 Small production Pilot phase     80 Enterprise Rollout phase     81 Run State phase     81 Chapter 4: Introducing Microsoft Advanced Threat Analytics     83 Protecting on-premises resources     83 Understanding ATA     84 ATA architecture     90 Enhance enterprise mobility security with ATA     91 Planning and designing ATA     91 Infrastructure considerations     91 ATA Center considerations     92 ATA Gateway considerations     93 ATA Console considerations     93 Chapter 5: Implementing Microsoft Advanced Threat Analytics     95 Scenario requirements for on-premises protection     95 Implementation goals     96 Solution diagram     96 Deploying ATA     96 Installing ATA Center     97 Configuring domain connectivity     101 Installing ATA Gateway     102 Configuring ATA Gateway     105 Setting up the ATA environment     106 Configuring alerts     106 Monitoring resources     108 Detection settings      109 Telemetry settings      111 Database management     111 Leveraging ATA for threat mitigation and incident response     113 Reviewing suspicious activities     114 Attack detection     115 Chapter 6: Introducing Mobile Device Management for Office 365     117 Mobile device management concepts     118 Exchange ActiveSync     118 Mobile Device Management for Office 365     120 MDM for Office 365 architecture     120 MDM for Office 365 features and capabilities     121 Office 365 admin center     123 Office 365 Compliance Center     124 Planning for MDM for Office 365     125 Setting up MDM for Office 365     126 Apple Push Notification service certificate for iOS devices     126 Adding or configuring a domain     127 Multi-factor authentication     129 Device management     131 Organization-wide device access settings     132 Security policies     133 Wiping devices     135 Using the reporting features     137 Choosing MDM for Office 365     138 MDM for Office 365 and Intune coexistence     140 Chapter 7: Implementing Mobile Device Management for Office 365     145 Scenario      145 Implementation goals     146 Solution diagram     146 Planning for MDM for Office 365     147 Identity management     147 Policy considerations     149 Device considerations     149 Deploying MDM for Office 365     149 Office 365 tenant     150 Setting the MDM Authority     150 Configuring MDM for Office 365     151 Apple Push Notification service certificate for iOS devices     151 Organization-wide access settings     154 Security policies     155 Enrolling devices     158 Enrolling Android devices     159 Enrolling Apple iOS devices     161 Enrolling Windows Phone devices     163 Managing devices     166 Viewing enrolled devices     167 Viewing the device compliance report     167 Viewing and updating device security policies     168 User device management     169 Wiping mobile devices     170 Selective device wipe     171 Full device wipe     172 Appendix: Troubleshooting Microsoft Advanced Threat Analytics     173 Troubleshooting flow     173 Initial assessment     173 Data collection     174 Data analysis     175 Action plan     175 Validate the behavior and archive the ticket     176 Troubleshooting an ATA installation     176 Post-installation troubleshooting     178 Troubleshooting ATA operations     180 Hardware maintenance     181 Unable to access ATA Console     182 Unable to start ATA Center or ATA Gateway      183 Index     185


Best Seller

| | See All

Product Details
  • ISBN-13: 9781509301331
  • Publisher: Microsoft Press,U.S.
  • Publisher Imprint: Microsoft Press
  • Depth: 19
  • Language: English
  • Returnable: N
  • Spine Width: 15 mm
  • Weight: 376 gr
  • ISBN-10: 150930133X
  • Publisher Date: 08 Feb 2016
  • Binding: Paperback
  • Height: 226 mm
  • No of Pages: 224
  • Series Title: IT Best Practices - Microsoft Press
  • Sub Title: Beyond BYOD
  • Width: 189 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD(IT Best Practices - Microsoft Press)
Microsoft Press,U.S. -
Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD(IT Best Practices - Microsoft Press)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD(IT Best Practices - Microsoft Press)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA