Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
welcome back submarines to the M s. 3 65 Security Administration course.
00:06
Does my esteem, privilege and honor to be your instructor, Jim Daniels.
00:11
And Model three is what we're at today in mystery c c five threat protection
00:16
we're seeing start on less than four mobility with mobile app management.
00:21
Pretty simple objective. We're gonna learn how to plan for mobile application management. Name
00:27
man. My wife Location management is a suite of management features unless you published
00:32
Pushed configure, secure monitor and update mobile applications.
00:37
Man is configured by intern
00:39
by using at protection policies.
00:42
At protection policies can be applied to mobile app on IOS and Android devices that support man.
00:49
A couple important benefits of using have protection policies
00:53
are they protect your company data at the AF level
00:56
and in user productivity is not impacted.
01:00
Policies aren't employed when using the app in a personal context,
01:03
only four corporate
01:06
usage.
01:07
If you want to use S e C M systems center configuration manager,
01:12
your national deploy and manage desktop Paps, including Microsoft Store applications.
01:18
You can deploy this by configuring the applications or configuring packages and programs.
01:23
You'll be connected the in tune in order to Manu's mobile applications. This is co management.
01:30
You can't manage mobile applications in configuration manager
01:34
when it's connected with Inter.
01:37
Microsoft in tune APP Software development kit must be incorporated to apply APP restrictions.
01:44
Using in tune will help manage the lifecycle traditional desktop ABS and Microsoft Store apps.
01:52
It supports two configurations of man.
01:56
One of them
01:57
is in tune. India with man,
02:00
Hotty admits, can only manage APS using man
02:02
and have protection policies on devices that are intro enrolled within your Indian.
02:09
The other way is without device management. T admissions can manage axes and man and and protection policies,
02:16
Hotty admits. Can manage APS using ma'am and at protection policies on devices not enrolled within into
02:24
This means asking be managed by in tune when devices and roll with third party
02:30
ability managers and also asked would be wired the implementation.
02:36
So the first
02:37
would be more for corporate type devices. Maybe you have corporate devices that you're gonna let them use for personal reasons as well.
02:44
The second one is more for be Wired E.
02:46
You're not going to force them to enroll their personal device into your corporate into an environment. However, you still want application management?
02:55
Four. Your corporate data
03:00
utilizing as your A D provides several benefits for application management.
03:06
You can use it for authentication and authorization,
03:08
user authentication and authorization.
03:12
You can have SSO using Passwords Inc.
03:15
You can provisioning users and synchronize um into the application.
03:20
You can have our back role based access control
03:23
and you can do application, publishing and proxy.
03:29
All right. Quiz
03:30
Lots of requirement to manage mobile applications with configuration Manager S E C M
03:37
Enrollment of device in the end zone.
03:40
Integration of config Manager within tune for co management of Devices
03:46
Trust is certain. Stole on mobile device
03:50
configuration Manager Server OS of Server 2019
03:57
What's the requirement?
04:01
Correct? Answer is
04:03
be
04:05
kind of a short question.
04:08
Some of the other ones were half truths, but it's not a requirement.
04:12
The correct answer is B integration of conflict manager within tune for co management.
04:17
The only way with config manager you can manage mobile applications
04:21
is co management with intern. That's it.
04:26
Aroma of devices.
04:27
Remember we can do it b Y o b tight mobile at management where they don't have to be enrolled in the intern.
04:33
Same thing with trusted served
04:36
B Y o d allows that without having a half the trust of certain stole
04:44
to recap The lesson man is a suite of management features. Unless you publish push, configure, secure monitor and update my collapse.
04:53
Config Manager sec. You
04:56
can support man when integrated into into in co management mode.
05:01
Thank you for joining me on this lesson. I hope to see you for the next one. Take care.

Up Next

MS-500: Microsoft 365 Security Administration

The Microsoft 365 Security Administration course is designed to prepare students to take and pass the MS-500 certification exam. The course covers the four domains of the exam, providing students with the knowledge and skills they need to earn their credential.

Instructed By

Instructor Profile Image
Jim Daniels
IT Architect
Instructor