SlideShare une entreprise Scribd logo
1  sur  170
Télécharger pour lire hors ligne
David J. Rosenthal
CEO, Atidan
May 4, 2015
Ignite Conference, Chicago, IL
Mobile Device
Management for
Office 365
Agenda Trends around mobility and BYOD
MDM for Office 365 overview
Demo admin setup & end user experience
iOS and Android apps
Enforce app password
Wipe just the app
Entire org or individuals (no
groups)
Exchange ActiveSync
Devices supporting EAS
Enforce device password
Wipe entire device
Entire org or individuals (no
groups)
Other appsOWA for Devices
No controls
Protect
your data
Enable
your users Unify Your Environment
Devices Apps Data
Helping organizations enable their users to be productive on the devices they love
while helping ensure corporate assets are secure
Enroll
• Provide a self-service Company
Portal for users to enroll devices
• Deliver custom terms and
conditions at enrollment
• Bulk enroll devices using Apple
Configurator or service account
• Restrict access to Exchange
email if a device is not enrolled
Retire
• Revoke access to corporate
resources
• Perform selective wipe
• Audit lost and stolen devices
Provision
• Deploy certificates, email, VPN,
and WiFi profiles
• Deploy security policy
• Install mandatory apps
• Deploy app restriction policies
• Deploy data protection policies
Manage and Protect
• Restrict access to corporate
resources if policies are violated
(e.g., jailbroken device)
• Protect corporate data by
restricting actions such as
copy/cut/paste/save outside of
managed app ecosystem
• Report on device and app
compliance
User IT
Inventory mobile devices that access corporate applications
Remote factory reset (full device wipe)
Mobile device configuration settings (PIN length, PIN required, lock time, etc.)
Self-service password reset (Office 365 cloud only users)
Provides reporting on devices that do not meet IT policy
Group-based policies and reporting (ability to use groups for targeted device configuration)
Root cert and jailbreak detection
Remove Office 365 app data from mobile devices while leaving personal data and apps intact (selective wipe)
Prevent access to corporate email and documents based upon device enrollment and compliance policies
Self-service Company Portal for users to enroll their own devices and install corporate apps
Deploy certificates, VPN profiles (including app-specific profiles), and Wi-Fi profiles
Prevent cut/copy/paste/save as of data from corporate apps to personal apps (mobile application management)
Secure content viewing via Managed browser, PDF viewer, Imager viewer, and AV player apps for Intune
Remote device lock via self-service Company Portal and via admin console
PC management (e.g. inventory, antimalware, patch, policies, etc.)
OS deployment (via System Center ConfigMgr)
PC software management
Single management console for PCs and mobile devices (through integration with System Center ConfigMgr)
Microsoft IntuneBuilt-In
Device
Management
Conditional
Access
Selective Wipe
Built-In Microsoft Intune
LoB
app
User-centric approach
Before mobile devices can access Office 365 data, they must be enrolled and healthy.
1. A user downloads
the public OneDrive
app on a personal iPad
2. The user is shown a
page that directs them
to enroll the iPad
3. The user steps
through the enrollment
process
4. The OneDrive app is
now MDM enabled
5. The user is able to
access their OneDrive
data
Device Polices
• Control what mobile devices can connect to Office
365 Data
• Set device configuration policies such as pin lock
• Enforce data encryption on devices
Admin Controls
• Built-In management in Office 365 Admin Center,
and PowerShell
• Configure device policies by groups
• Product level granular control
Device Reporting
• Device compliance reports
• Mobile usage and trends in our organization
• API support
The IT admin can wipe Office 365 data from the user’s device. When they trigger the wipe,
all of the data cached or stored by the apps will be deleted, while all of the user’s personal
content remains intact.
1. An employee uses Office 365
apps and data on a mobile
device. The employee leaves
the company.
2. The IT admin logins into Office
365 Admin Center to perform a
selective wipe
3. The Office 365 data is removed
from the Office applications
leaving personal information
intact
* Native email clients that use ActiveSync will support Conditional Access, and Selective Wipe
** Office on Windows Phone (Combined App)
Configure Microsoft Intune
with Office 365
http://portal.office.com
http://aka.ms/TryIntune
Action required to access your organization’s
email
This email was automatically generated by Microsoft Exchange.
You are receiving this message because your IT department requires
that you enroll your device in order to access Exchange email. This
helps to protect corporate information in your organization.
Follow the steps listed on this site to enroll your device, verify
compliance, and activate your email.
Please contact your IT department with any questions or problems.
portal.manage.microsoft.com/?portalAction=EmailQuarantine
www.microsoftintune/contoso/devicemanagement.com
Activating…
www.microsoftintune/contoso/devicemanagement.com
www.microsoftintune/contoso/devicemanagement.com
Contoso company…Contoso device enro…
www.microsoftintune/contoso/devicemanagement.com
Contoso company…Contoso device e…
www.microsoftintune/contoso/devicemanagement.com
Contoso
Contoso IT Contoso DashContoso Data Store
Contoso Viewer
Outlook
Contoso managed
Contoso manage
Jessica
@jesssssss
Pasting content not allowed
This content is managed by Contoso. The
destination is not. Pasting this content is
not allowed by your administrator.
paste close
Jame
s
james@contoso.com
Jame
s
Contoso IT
Device Not Enrolled
To Access emails and other company resources
CONTOSO
11:18
Contoso IT
Device Not Enrolled
Thu 1/16, 11:18
To: Contoso Employees
To access emails and other company
resources, your device needs to be enrolled
with Contoso. To enroll your device follow the
instructions below:
Step 1:
Enroll your Device
Step 2:
Once you’ve enrolled your device.
Click here to activate
Redirecting to device enrollment...
https://portal.manage.micro
james@contoso.com
Contoso
james@contoso.com
Contoso
Contoso IT
Jame
s
Contoso IT
Device Not Enrolled
To Access emails and other company resources
CONTOSO
Contoso IT
Device Not Enrolled
Thu 1/16, 11:18
To: Contoso Employees
To access emails and other company
resources, your device needs to be enrolled
with Contoso. To enroll your device follow the
instructions below:
Step 1:
Enroll your Device
Step 2:
Once you’ve enrolled your device.
Click here to activate
Jame
s
Activating…
https://activate.aad/contoso/
Jame
s
Activation
Successful!
Your access to emails and other company
resources has been granted.
https://activate.aad/contoso/
Jame
s
4
Contoso IT
Device Not Enrolled
To Access emails and other company resources
CONTOSO
Office 365Users on their devices Azure AD
Report device
compliance
Enroll device, evaluate & enforce
compliance with device
management policies
Microsoft
Intune
IT Admin
(Workplace Join +
management)
4
Conditional access control - Exchange ActiveSync (EAS)
Azure AD DRS
EAS Client
EAS Server
Intune
Get email
EAS ID,
username,
password
1
Lookup device
compliance state
2
Register EAS
email client
6
Create EASID to
device ID binding
7
Set device
management/
compliance
status 5
Device object
- device id
- isManaged
- MDMStatus
- EASIDs
Azure AD
Push device into
quarantine
Quarantine
email
Quarantine email
Step 1: Enroll device
Step 2: Register EAS
client
3
© 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on
the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
office365@atidan.com
Corporate
Complete mobile application management
• Securely access corporate information using Office
mobile apps, while preventing company data loss
by restricting actions such as copy/cut/paste/save
in your managed app ecosystem
• Extend these capabilities to existing line of business
apps using the Intune app wrapper
• Enable secure viewing of content using the
Managed Browser, PDF Viewer, AV Player, and
Image Viewer apps
Manage all of your corporate apps and data with
Intune’s mobile device and application
management solution
Personal
Managed Browser
& Viewer Apps
Mobile device management
• Deploy certificates, WiFi, VPN, and email profiles
automatically once a device is enrolled for management
• Enable bulk enrollment of task-worker devices to set
policies and deploy applications on a large scale
• Provide a self-service Company Portal for users to enroll
their own devices and install corporate apps
PC management
• Provide lightweight, agentless management from the
cloud
• Connect Intune to System Center 2012 R2 Configuration
Manager to manage all of your devices including PCs,
Macs, Unix/Linux Servers, and mobile devices from a
single management console
• Provide real-time protection against malware threats on
managed computers
• Collect information about hardware configurations and
software installed on managed computers
• Deploy software based upon policies set by the
administrator
User
for Business
bryan@microsoft.com
bryan@microsoft.com
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan

Contenu connexe

Tendances

Active directory domain and trust
Active directory domain and trustActive directory domain and trust
Active directory domain and trustChinmoy Jena
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGAzure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGRoy Kim
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Intro to the Office 365 Admin Center
Intro to the Office 365 Admin CenterIntro to the Office 365 Admin Center
Intro to the Office 365 Admin CenterNikkia Carter
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Modern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group PoliciesModern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group PoliciesAnoop Nair
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 

Tendances (20)

Active directory domain and trust
Active directory domain and trustActive directory domain and trust
Active directory domain and trust
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Data security
Data securityData security
Data security
 
Active directory
Active directory Active directory
Active directory
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Windows server
Windows serverWindows server
Windows server
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGAzure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Intro to the Office 365 Admin Center
Intro to the Office 365 Admin CenterIntro to the Office 365 Admin Center
Intro to the Office 365 Admin Center
 
Data Security
Data SecurityData Security
Data Security
 
Modern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group PoliciesModern Device Management Intune Policies vs Group Policies
Modern Device Management Intune Policies vs Group Policies
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 

En vedette

State of the Virtualized Data Center
State of the Virtualized Data CenterState of the Virtualized Data Center
State of the Virtualized Data CenterJuniper Networks
 
Five Power Trends on Their Way to Your Data Center
Five Power Trends on Their Way to Your Data CenterFive Power Trends on Their Way to Your Data Center
Five Power Trends on Their Way to Your Data Centerdigitallibrary
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsAFCOM
 
Data Center Trends 2014
Data Center Trends 2014Data Center Trends 2014
Data Center Trends 2014Belden Inc
 
Architectural Principles for Software + Services
Architectural Principles for Software + ServicesArchitectural Principles for Software + Services
Architectural Principles for Software + ServicesSimon Guest
 
Data Center Infrastructure Trends
Data Center Infrastructure TrendsData Center Infrastructure Trends
Data Center Infrastructure TrendsViridity Software
 
Megatrends: Shaping the Future
Megatrends: Shaping the FutureMegatrends: Shaping the Future
Megatrends: Shaping the FutureDigital October
 
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17Mark Goldstein
 
Smart building controls and energy management system trends
Smart building controls and energy management system trends  Smart building controls and energy management system trends
Smart building controls and energy management system trends BSRIA
 

En vedette (10)

State of the Virtualized Data Center
State of the Virtualized Data CenterState of the Virtualized Data Center
State of the Virtualized Data Center
 
Current trends in DBMS
Current trends in DBMSCurrent trends in DBMS
Current trends in DBMS
 
Five Power Trends on Their Way to Your Data Center
Five Power Trends on Their Way to Your Data CenterFive Power Trends on Their Way to Your Data Center
Five Power Trends on Their Way to Your Data Center
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
 
Data Center Trends 2014
Data Center Trends 2014Data Center Trends 2014
Data Center Trends 2014
 
Architectural Principles for Software + Services
Architectural Principles for Software + ServicesArchitectural Principles for Software + Services
Architectural Principles for Software + Services
 
Data Center Infrastructure Trends
Data Center Infrastructure TrendsData Center Infrastructure Trends
Data Center Infrastructure Trends
 
Megatrends: Shaping the Future
Megatrends: Shaping the FutureMegatrends: Shaping the Future
Megatrends: Shaping the Future
 
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
 
Smart building controls and energy management system trends
Smart building controls and energy management system trends  Smart building controls and energy management system trends
Smart building controls and energy management system trends
 

Similaire à Mobile Device Management for Office 365 - Atidan

Intune Concept.pptx
Intune Concept.pptxIntune Concept.pptx
Intune Concept.pptxjmbrrvgzhr
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0Huy Pham
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Nordic Infrastructure Conference
 

Similaire à Mobile Device Management for Office 365 - Atidan (20)

Intune Concept.pptx
Intune Concept.pptxIntune Concept.pptx
Intune Concept.pptx
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0EMS-HPT Template-v.1.0
EMS-HPT Template-v.1.0
 
Intune Deployment .pptx
Intune Deployment .pptxIntune Deployment .pptx
Intune Deployment .pptx
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 

Plus de David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from MicrosoftDavid J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsDavid J Rosenthal
 

Plus de David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft Teams
 

Dernier

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

Mobile Device Management for Office 365 - Atidan

  • 1. David J. Rosenthal CEO, Atidan May 4, 2015 Ignite Conference, Chicago, IL Mobile Device Management for Office 365
  • 2. Agenda Trends around mobility and BYOD MDM for Office 365 overview Demo admin setup & end user experience
  • 3.
  • 4. iOS and Android apps Enforce app password Wipe just the app Entire org or individuals (no groups) Exchange ActiveSync Devices supporting EAS Enforce device password Wipe entire device Entire org or individuals (no groups) Other appsOWA for Devices No controls
  • 5. Protect your data Enable your users Unify Your Environment Devices Apps Data Helping organizations enable their users to be productive on the devices they love while helping ensure corporate assets are secure
  • 6. Enroll • Provide a self-service Company Portal for users to enroll devices • Deliver custom terms and conditions at enrollment • Bulk enroll devices using Apple Configurator or service account • Restrict access to Exchange email if a device is not enrolled Retire • Revoke access to corporate resources • Perform selective wipe • Audit lost and stolen devices Provision • Deploy certificates, email, VPN, and WiFi profiles • Deploy security policy • Install mandatory apps • Deploy app restriction policies • Deploy data protection policies Manage and Protect • Restrict access to corporate resources if policies are violated (e.g., jailbroken device) • Protect corporate data by restricting actions such as copy/cut/paste/save outside of managed app ecosystem • Report on device and app compliance User IT
  • 7. Inventory mobile devices that access corporate applications Remote factory reset (full device wipe) Mobile device configuration settings (PIN length, PIN required, lock time, etc.) Self-service password reset (Office 365 cloud only users) Provides reporting on devices that do not meet IT policy Group-based policies and reporting (ability to use groups for targeted device configuration) Root cert and jailbreak detection Remove Office 365 app data from mobile devices while leaving personal data and apps intact (selective wipe) Prevent access to corporate email and documents based upon device enrollment and compliance policies Self-service Company Portal for users to enroll their own devices and install corporate apps Deploy certificates, VPN profiles (including app-specific profiles), and Wi-Fi profiles Prevent cut/copy/paste/save as of data from corporate apps to personal apps (mobile application management) Secure content viewing via Managed browser, PDF viewer, Imager viewer, and AV player apps for Intune Remote device lock via self-service Company Portal and via admin console PC management (e.g. inventory, antimalware, patch, policies, etc.) OS deployment (via System Center ConfigMgr) PC software management Single management console for PCs and mobile devices (through integration with System Center ConfigMgr)
  • 9. Before mobile devices can access Office 365 data, they must be enrolled and healthy. 1. A user downloads the public OneDrive app on a personal iPad 2. The user is shown a page that directs them to enroll the iPad 3. The user steps through the enrollment process 4. The OneDrive app is now MDM enabled 5. The user is able to access their OneDrive data
  • 10. Device Polices • Control what mobile devices can connect to Office 365 Data • Set device configuration policies such as pin lock • Enforce data encryption on devices Admin Controls • Built-In management in Office 365 Admin Center, and PowerShell • Configure device policies by groups • Product level granular control Device Reporting • Device compliance reports • Mobile usage and trends in our organization • API support
  • 11. The IT admin can wipe Office 365 data from the user’s device. When they trigger the wipe, all of the data cached or stored by the apps will be deleted, while all of the user’s personal content remains intact. 1. An employee uses Office 365 apps and data on a mobile device. The employee leaves the company. 2. The IT admin logins into Office 365 Admin Center to perform a selective wipe 3. The Office 365 data is removed from the Office applications leaving personal information intact
  • 12. * Native email clients that use ActiveSync will support Conditional Access, and Selective Wipe ** Office on Windows Phone (Combined App)
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Action required to access your organization’s email This email was automatically generated by Microsoft Exchange. You are receiving this message because your IT department requires that you enroll your device in order to access Exchange email. This helps to protect corporate information in your organization. Follow the steps listed on this site to enroll your device, verify compliance, and activate your email. Please contact your IT department with any questions or problems.
  • 30.
  • 31.
  • 32.
  • 33.
  • 37. Contoso company…Contoso device enro… www.microsoftintune/contoso/devicemanagement.com
  • 38. Contoso company…Contoso device e… www.microsoftintune/contoso/devicemanagement.com
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Contoso Contoso IT Contoso DashContoso Data Store Contoso Viewer Outlook
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 63.
  • 65. Pasting content not allowed This content is managed by Contoso. The destination is not. Pasting this content is not allowed by your administrator. paste close
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 91.
  • 92.
  • 95. Contoso IT Device Not Enrolled To Access emails and other company resources CONTOSO 11:18
  • 96. Contoso IT Device Not Enrolled Thu 1/16, 11:18 To: Contoso Employees To access emails and other company resources, your device needs to be enrolled with Contoso. To enroll your device follow the instructions below: Step 1: Enroll your Device Step 2: Once you’ve enrolled your device. Click here to activate
  • 97. Redirecting to device enrollment... https://portal.manage.micro
  • 98.
  • 103. Jame s
  • 104. Contoso IT Device Not Enrolled To Access emails and other company resources CONTOSO
  • 105. Contoso IT Device Not Enrolled Thu 1/16, 11:18 To: Contoso Employees To access emails and other company resources, your device needs to be enrolled with Contoso. To enroll your device follow the instructions below: Step 1: Enroll your Device Step 2: Once you’ve enrolled your device. Click here to activate
  • 107. Jame s Activation Successful! Your access to emails and other company resources has been granted. https://activate.aad/contoso/
  • 109. Contoso IT Device Not Enrolled To Access emails and other company resources CONTOSO
  • 110. Office 365Users on their devices Azure AD Report device compliance Enroll device, evaluate & enforce compliance with device management policies Microsoft Intune IT Admin
  • 111. (Workplace Join + management) 4 Conditional access control - Exchange ActiveSync (EAS) Azure AD DRS EAS Client EAS Server Intune Get email EAS ID, username, password 1 Lookup device compliance state 2 Register EAS email client 6 Create EASID to device ID binding 7 Set device management/ compliance status 5 Device object - device id - isManaged - MDMStatus - EASIDs Azure AD Push device into quarantine Quarantine email Quarantine email Step 1: Enroll device Step 2: Register EAS client 3
  • 112. © 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. office365@atidan.com
  • 113.
  • 114. Corporate Complete mobile application management • Securely access corporate information using Office mobile apps, while preventing company data loss by restricting actions such as copy/cut/paste/save in your managed app ecosystem • Extend these capabilities to existing line of business apps using the Intune app wrapper • Enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps Manage all of your corporate apps and data with Intune’s mobile device and application management solution Personal Managed Browser & Viewer Apps
  • 115. Mobile device management • Deploy certificates, WiFi, VPN, and email profiles automatically once a device is enrolled for management • Enable bulk enrollment of task-worker devices to set policies and deploy applications on a large scale • Provide a self-service Company Portal for users to enroll their own devices and install corporate apps PC management • Provide lightweight, agentless management from the cloud • Connect Intune to System Center 2012 R2 Configuration Manager to manage all of your devices including PCs, Macs, Unix/Linux Servers, and mobile devices from a single management console • Provide real-time protection against malware threats on managed computers • Collect information about hardware configurations and software installed on managed computers • Deploy software based upon policies set by the administrator User
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 147.