Planning and Managing Device and Application Compliance in Microsoft 365
Offered By: Pluralsight
Course Description
Overview
This course introduces, discusses, and explores the planning and deployment considerations for Microsoft 365 devices and applications. You will learn about planning for profiles and policies used to manage devices and applications.
Managing the devices used to access your company resources, and the applications running on those devices can be overwhelming. If the planning process doesn’t include the key considerations it can quickly become very challenging. In this course, Planning and Managing Device and Application Compliance in Microsoft 365, you will learn considerations for managing and monitoring devices and the applications on those devices. First, you will explore the management differences between Company Owned Devices (CODs) and Bring Your Own Devices (BYODs) that can be used to access your company resources. Next, you will discover the management and monitoring of the devices can be achieved using device co-management, Mobile Application Management (MAM), device profiles, and conditional access policies. Finally, you will learn about planning for profiles used to manage devices. When you are finished with this course, you will have the knowledge necessary to obtain a sign off from devices and applications that are going to be managed, controlled, configured, and monitored when accessing your company resources.
Managing the devices used to access your company resources, and the applications running on those devices can be overwhelming. If the planning process doesn’t include the key considerations it can quickly become very challenging. In this course, Planning and Managing Device and Application Compliance in Microsoft 365, you will learn considerations for managing and monitoring devices and the applications on those devices. First, you will explore the management differences between Company Owned Devices (CODs) and Bring Your Own Devices (BYODs) that can be used to access your company resources. Next, you will discover the management and monitoring of the devices can be achieved using device co-management, Mobile Application Management (MAM), device profiles, and conditional access policies. Finally, you will learn about planning for profiles used to manage devices. When you are finished with this course, you will have the knowledge necessary to obtain a sign off from devices and applications that are going to be managed, controlled, configured, and monitored when accessing your company resources.
Taught by
Brian Alderman
Related Courses
Aprende las funciones básicas de Microsoft FormsCoursera Project Network via Coursera البدء في استخدام Microsoft Forms
Coursera Project Network via Coursera بدء استخدام Microsoft Office 365
Coursera Project Network via Coursera Competencias digitales de ofimática: Microsoft Word
Universitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera Introducción al Office 365
Universitat Politècnica de València via edX