Peer to Peer Magazine

Fall 2015

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/588021

Contents of this Issue

Navigation

Page 45 of 79

WWW.ILTANET.ORG 47 How You Manage Devices Built-In MDM for Office 365 The Office 365 admin center Microsoft Intune In the standalone version, the Intune admin console; when integrated with System Center 2012 Configuration Manager, the Configuration Manager console manages devices on-premises and in the cloud Devices You Can Manage Built-In MDM for Office 365 Cloud-based management for devices that run on the following platforms: • iOS • Android • Windows Phone Microsoft Intune Cloud-based management for devices that run on the following platforms: • iOS • Android • Windows Phone • Windows Key Capabilities Built-In MDM for Office 365 CONDITIONAL ACCESS: • Set up security policies to ensure Office 365 corporate email and documents can be accessed only on phones and tablets managed by your company and compliant with your IT policies DEVICE MANAGEMENT: • Set and manage security policies such as device-level PIN locks and jailbreak detection to prevent unauthorized users from accessing corporate email and data on a device when it is lost or stolen SELECTIVELY WIPE: • Remove Office 365 company data from an employee's device while leaving personal data in place Microsoft Intune Microsoft Intune includes all of the MDM for Office 365 capabilities, plus: ADVANCED MOBILE DEVICE MANAGEMENT: • Provision and manage certificates, Wi-Fi, VPN (device- and app-specific), and email profiles automatically for devices that enroll, enabling users to access corporate resources with the appropriate security configurations • Enroll and manage collections of corporate-owned devices, simplifying policy and app deployment MOBILE APPLICATION MANAGEMENT: • Deploy both internal line-of-business apps and those from public app stores to users • Enable your workforce to access corporate information securely using Office mobile apps while preventing leakage of company data by restricting actions of movement (such as copy, cut, paste and save as) to only those apps managed by Intune • Extend protection for company data to existing line-of-business apps using the Intune App Wrapping Tool • Enable secure viewing of content using the Intune Managed Browser, PDF Viewer, AV Player and Image Viewer apps PC MANAGEMENT: • Manage devices from the cloud with no infrastructure required or connect Intune to System Center 2012 Configuration Manager to manage all devices — including PCs, Macs, Linux and UNIX servers, and mobile devices — from a single management console

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Fall 2015