- Microsoft 365 Security Administration:MS-500 Exam Guide
- Peter Rising
- 208字
- 2021-06-18 18:57:32
References
Please refer to the following links for more information:
- The following link is an example of a device compliance policy. Before configuring the device compliance policies, make sure that you are aware of all of the device types in your organization that you will need to protect: https://docs.microsoft.com/en-gb/intune/protect/quickstart-set-password-length-android?wt.mc_id=4039827
- The following link shows how to configure a device-based Conditional Access policy. When using these, always test them thoroughly with a small pilot group before targeting all users: https://docs.microsoft.com/en-gb/intune/protect/create-conditional-access-intune
- This policy helps you to set rules on your devices to allow access. The Ways to deploy device compliance policies section will give you a greater understanding of how to plan for device rules: https://docs.microsoft.com/en-gb/intune/protect/device-compliance-get-started
- This link will show you how to plan for app-based Conditional Access using Intune: https://docs.microsoft.com/en-gb/intune/protect/app-based-conditional-access-intune
- This link will show you how to set up app-based Conditional Access policies using Intune. Remember that you need an Azure AD Premium license to create Conditional Access policies from the Intune portal: https://docs.microsoft.com/en-gb/intune/protect/app-based-conditional-access-intune-create
- This link will show you how to create and assign app protection policies: https://docs.microsoft.com/en-gb/intune/apps/app-protection-policies
- This link will show you how you can monitor your Intune device compliance policies. Remember that devices must always be enrolled in Intune in order to take advantage of these policies: https://docs.microsoft.com/en-us/intune/protect/compliance-policy-monitor
推薦閱讀
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- 白話(huà)網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- Mobile Forensics Cookbook
- 特種木馬防御與檢測(cè)技術(shù)研究
- 網(wǎng)絡(luò)安全保障能力研究
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 計(jì)算機(jī)使用安全與防護(hù)
- INSTANT Windows PowerShell
- 代碼審計(jì):企業(yè)級(jí)Web代碼安全架構(gòu)
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- 華為防火墻實(shí)戰(zhàn)指南
- 無(wú)線(xiàn)傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專(zhuān)供版)
- 聯(lián)邦學(xué)習(xí)原理與算法