6 hours 59 minutes
welcome back submarines to the M s. 3 65 Security Administration course.
Does my esteem, privilege and honor to be your instructor, Jim Daniels.
And Model three is what we're at today in mystery c c five threat protection
we're seeing start on less than four mobility with mobile app management.
Pretty simple objective. We're gonna learn how to plan for mobile application management. Name
man. My wife Location management is a suite of management features unless you published
Pushed configure, secure monitor and update mobile applications.
Man is configured by intern
by using at protection policies.
At protection policies can be applied to mobile app on IOS and Android devices that support man.
A couple important benefits of using have protection policies
are they protect your company data at the AF level
and in user productivity is not impacted.
Policies aren't employed when using the app in a personal context,
only four corporate
If you want to use S e C M systems center configuration manager,
your national deploy and manage desktop Paps, including Microsoft Store applications.
You can deploy this by configuring the applications or configuring packages and programs.
You'll be connected the in tune in order to Manu's mobile applications. This is co management.
You can't manage mobile applications in configuration manager
when it's connected with Inter.
Microsoft in tune APP Software development kit must be incorporated to apply APP restrictions.
Using in tune will help manage the lifecycle traditional desktop ABS and Microsoft Store apps.
It supports two configurations of man.
One of them
is in tune. India with man,
Hotty admits, can only manage APS using man
and have protection policies on devices that are intro enrolled within your Indian.
The other way is without device management. T admissions can manage axes and man and and protection policies,
Hotty admits. Can manage APS using ma'am and at protection policies on devices not enrolled within into
This means asking be managed by in tune when devices and roll with third party
ability managers and also asked would be wired the implementation.
So the first
would be more for corporate type devices. Maybe you have corporate devices that you're gonna let them use for personal reasons as well.
The second one is more for be Wired E.
You're not going to force them to enroll their personal device into your corporate into an environment. However, you still want application management?
Four. Your corporate data
utilizing as your A D provides several benefits for application management.
You can use it for authentication and authorization,
user authentication and authorization.
You can have SSO using Passwords Inc.
You can provisioning users and synchronize um into the application.
You can have our back role based access control
and you can do application, publishing and proxy.
All right. Quiz
Lots of requirement to manage mobile applications with configuration Manager S E C M
Enrollment of device in the end zone.
Integration of config Manager within tune for co management of Devices
Trust is certain. Stole on mobile device
configuration Manager Server OS of Server 2019
What's the requirement?
Correct? Answer is
kind of a short question.
Some of the other ones were half truths, but it's not a requirement.
The correct answer is B integration of conflict manager within tune for co management.
The only way with config manager you can manage mobile applications
is co management with intern. That's it.
Aroma of devices.
Remember we can do it b Y o b tight mobile at management where they don't have to be enrolled in the intern.
Same thing with trusted served
B Y o d allows that without having a half the trust of certain stole
to recap The lesson man is a suite of management features. Unless you publish push, configure, secure monitor and update my collapse.
Config Manager sec. You
can support man when integrated into into in co management mode.
Thank you for joining me on this lesson. I hope to see you for the next one. Take care.
Microsoft 365 Fundamentals [MS-900]
Microsoft 365 Fundamentals is a course designed to help both those looking for more information ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
AZ-500: Microsoft Azure Security Technologies
In this Microsoft Azure Security Technologies (AZ-500) training, students will learn the skills that are ...
9 CEU/CPE Hours Available
Certificate of Completion Offered