Course Description
Managing Security for Mobile Devices have never been more important. You should not allow any device accessing your environment or data without some sort of controls. Unprotected or unknown devices are a risk for your organization.
In this course you will learn how to secure access to your data using a combination of Azure AD Conditional Access and Microsoft Intune. You will also learn how to manage and secure Android and iOS/iPadOS devices. You will learn some basics on how to setup the requirements for managing each platform before we spend the time diving into the details. The Course is delivered in cooperation with our partner CloudWay. The instructors on the course are Microsoft MVPs Maurice Daly, Sandy Zeng, Ben Whitmore, and Jan Ketil Skanke. As with all our academy courses, the info presented is up to date, and gathered from real-world implementations.
Note: If you already have an All Access Pass subscription, this course has been added to your account.
This program runs for six weeks and includes:
- Weekly live webinars (with recordings and Q&A)
- Weekly assignments to guide your progress
- A community of individuals with the same goals
- A private Facebook group with other participants for sharing reflections, progress, etc.
- The chance to ask the CloudWay team questions directly
Course Schedule
Dates and start time for the live two-hour webinars:
- Module 1: Wednesday, Jan 26, 9:00 AM-11:00 AM Central Time (US and Canada)
- Module 2: Wednesday, Feb 2, 9:00 AM-11:00 AM Central Time (US and Canada)
- Module 3: Wednesday, Feb 9, 9:00 AM-11:00 AM Central Time (US and Canada)
- Module 4: Wednesday, Feb 16, 9:00 AM-11:00 AM Central Time (US and Canada)
- Module 5: Wednesday, Feb 23, 9:00 AM-11:00 AM Central Time (US and Canada)
- Module 6: Wednesday, Mar 2, 9:00 AM-11:00 AM Central Time (US and Canada)
Course Outline
Module 1: Securing your Mobile Devices with Microsoft Intune – Introduction and overview
- Securing access to your environment using Azure AD Conditional Access and Intune
- What is Microsoft Intune mobile device management (MDM) and mobile application management (MAM
- Planning for mobile device management, determine management type (enrollment type), personal devices vs Organization-owned devices.
- Tenant configuration (Branding, licenses, and Device enrollment restriction)
- Prerequisites for each platform (Apple Enrollment, Google Play for Work)
Module 2: Platform Overview
- Enrollment and Management Options
- Android Enterprise overview
- Apple Business Manager
- Enrollment options
- Device Compliance Policies
- Company data and personal data, how iOS and Android differ
Module 3: Application Management / App Protection / Data Protection
- MAM with or without enrollment
- MAM or MDM enrollment, the differences, and which is right for your organization?
- Application configuration policies, and the differences between iOS and Android permissions
- Application protection policy, and securing access to devices based on MAM or MDM enrollment states
- How to configure the basic apps - Microsoft Edge, Outlook, Teams
Module 4: Managing Android Devices
- Configure the different deployment type profiles
- Android Work Profile, Fully Managed, Kiosk/Dedicated
- App deployment prerequisites
- App Deployment best practices
- Filters and User or device group-based targeting, when and where to use what
- Static or dynamic groups, the differences, highlights, and pitfalls
- Deploying Android apps through Google Managed Play
- Configuration profiles: Android Work Profile, Fully Managed, Kiosk/Dedicated
- Android and the power of OEM Config
Module 5: Managing Apple Devices
- Configure the different deployment type profiles
- User Enrollment, Device Enrollment, Apple Automated Enrollment
- IOS supervised mode, what is it?, do I need it?
- App deployment prerequisites
- App Deployment best practices
- Apple store or VPP, which is right for you?
- Filters and User or device group-based targeting, when and where to use what
- Static or dynamic groups, the differences, highlights, and pitfalls
Module 6: Securing and supporting your environment
- Controlling access to your environment
- Azure AD Conditional Access, Intune Compliant Device
- Lifecycle of user / device
- Wipe/Retire
- User Leaving - What now?
- Supporting your users
- Locate, Restart, "Unlock/Lock", Troubleshooting
- Understand where to view logs, enrollment failures etc.
- Reporting – What is built in and what can we do if integrate the logs instead?
Instructor(s)
Instructor Bio:
Sandy Zeng
Cloud Architect
Instructor(s)
Instructor Bio:
Jan Ketil Skanke
Partner and Principal Cloud Architect
Instructor(s)
Instructor Bio:
Ben Whitmore
Cloud Consultant
Instructor(s)
Instructor Bio:
Maurice Daly
Principal Cloud Architect