更新时间:2021-06-24 12:07:06
封面
Title Page
Copyright and Credits
Microsoft 365 Mobility and Security – Exam Guide MS-101
Dedication
About Packt
Why subscribe?
Contributors
About the author
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
Book structure
The exam
Certification
How to get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Section 1: Modern Device Services
Implementing Mobile Device Management (MDM)
Planning for MDM
Device types and enrollment
Configuring MDM integration with Azure AD
Registered versus joined devices
Setting up automatic enrollment
Setting an MDM authority
Setting device enrollment limits for users
Device type restrictions
Device limit restrictions
Summary
Questions
Further reading
Managing Device Compliance
Planning for device compliance
Configuring device compliance policies
Policy options
Creating a compliance policy
Designing creating and managing conditional access policies
Designing conditional access policies
Assignments
Users and groups
Cloud apps or actions
Conditions
Access controls
Grant
Session
Creating conditional access policies
Managing conditional access policies
Planning for Devices and Apps
Creating and configuring Microsoft Store for Business
Creating your private store
Setting your MDM solution in Microsoft Store
Configuring synchronization in Intune and synchronizing apps
Planning app deployment
Using a management tool
Making apps available via your private store
Assigning apps directly to employees
Planning device co-management
Planning device monitoring
Planning for device profiles
Assigning profiles
Monitoring profiles
Policy conflicts
Planning for MAM
Planning mobile device security
Planning Windows 10 Deployment
Planning for WaaS
Building and deploying
Servicing
Servicing channels
Servicing tools
Planning for Windows 10 Enterprise deployment
Windows Autopilot
In-place upgrades
Analyzing Upgrade Readiness for Windows 10
Additional Windows 10 Enterprise security features
Section 2: Microsoft 365 Security Threat Management
Implementing Cloud App Security (CAS)
Setting up CAS
Integrating AIP with CAS
Configuring CAS policies
Policies
Templates
Configuring connected apps
Designing a CAS solution
Managing CAS alerts
Uploading CAS traffic logs