Planning and Managing Device and Application Compliance in Microsoft 365
Offered By: Pluralsight
Course Description
Overview
This course introduces, discusses, and explores the planning and deployment considerations for Microsoft 365 devices and applications. You will learn about planning for profiles and policies used to manage devices and applications.
Managing the devices used to access your company resources, and the applications running on those devices can be overwhelming. If the planning process doesn’t include the key considerations it can quickly become very challenging. In this course, Planning and Managing Device and Application Compliance in Microsoft 365, you will learn considerations for managing and monitoring devices and the applications on those devices. First, you will explore the management differences between Company Owned Devices (CODs) and Bring Your Own Devices (BYODs) that can be used to access your company resources. Next, you will discover the management and monitoring of the devices can be achieved using device co-management, Mobile Application Management (MAM), device profiles, and conditional access policies. Finally, you will learn about planning for profiles used to manage devices. When you are finished with this course, you will have the knowledge necessary to obtain a sign off from devices and applications that are going to be managed, controlled, configured, and monitored when accessing your company resources.
Managing the devices used to access your company resources, and the applications running on those devices can be overwhelming. If the planning process doesn’t include the key considerations it can quickly become very challenging. In this course, Planning and Managing Device and Application Compliance in Microsoft 365, you will learn considerations for managing and monitoring devices and the applications on those devices. First, you will explore the management differences between Company Owned Devices (CODs) and Bring Your Own Devices (BYODs) that can be used to access your company resources. Next, you will discover the management and monitoring of the devices can be achieved using device co-management, Mobile Application Management (MAM), device profiles, and conditional access policies. Finally, you will learn about planning for profiles used to manage devices. When you are finished with this course, you will have the knowledge necessary to obtain a sign off from devices and applications that are going to be managed, controlled, configured, and monitored when accessing your company resources.
Taught by
Brian Alderman
Related Courses
Introduction to Office 365 Development and APIsMicrosoft via edX Office 365: Managing Identities and Services with Hands-on Labs
Microsoft via edX Compliance in Office 365: eDiscovery
Microsoft via edX Compliance in Office 365: Data Governance
Microsoft via edX Microsoft Exchange Server 2016 - 5: Hybrid Topologies with Office 365
Microsoft via edX