Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft 365 Mobility and Security – Exam Guide MS-101

You're reading from  Microsoft 365 Mobility and Security ‚Äö√Ñ√¨ Exam Guide MS-101

Product type Book
Published in Nov 2019
Publisher Packt
ISBN-13 9781838984656
Pages 312 pages
Edition 1st Edition
Languages
Author (1):
Nate Chamberlain Nate Chamberlain
Profile icon Nate Chamberlain
Toc

Table of Contents (22) Chapters close

Preface 1. Section 1: Modern Device Services
2. Implementing Mobile Device Management (MDM) 3. Managing Device Compliance 4. Planning for Devices and Apps 5. Planning Windows 10 Deployment 6. Section 2: Microsoft 365 Security Threat Management
7. Implementing Cloud App Security (CAS) 8. Implementing Threat Management 9. Implementing Windows Defender ATP 10. Managing Security Reports and Alerts 11. Section 3: Microsoft 365 Governance Compliance
12. Configuring Data Loss Prevention (DLP) 13. Implementing Azure Information Protection (AIP) 14. Managing Data Governance 15. Managing Auditing 16. Managing eDiscovery 17. Section 4: Mock Exams
18. Mock Exam 1
19. Mock Exam 2
20. Assessments 21. Another Book You May Enjoy

Planning for Devices and Apps

Being able to provision licenses for purchased apps through a customized app store is one component of managing your enterprise data and security. You're effectively able to select which apps are (and aren't) allowed for users to install on their own, using a customized store you set up for them. And for apps that are not self-service downloads/installs, you're able, as an administrator, to deploy apps through other methods to devices.

Once users have apps connecting to company resources and data, you can use mobile application management (MAM) to make sure users are responsibly accessing and interacting with content. For example, you could disable copy/paste functionality for Office apps to make it more difficult for data to leave your environment.

This chapter provides information about deploying apps and utilizing MAM, specifically...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}