Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security

Enterprise network engineers and managers, network security engineers and managers, anyone tasked with providing secure access to company resources from mobile devices


Expected Duration
79 minutes

The final stage in moving toward a secure mobile enterprise requires the use of a mobile device management (MDM) platform. These management systems can lock down and govern all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. In this course, you will learn about a model for enterprise mobile security and two MDM systems from Microsoft – Intune and System Center Configuration Manager.


Enterprise Implementation Example

  • start the course
  • describe network architecture challenges for securing enterprise mobile devices
  • describe a solution for enterprise mobile device security challenges based on Microsoft’s product portfolio

Configuring Microsoft Intune

  • create an account for Microsoft Intune
  • navigate the Microsoft Intune interface
  • enroll devices in Microsoft Intune
  • target devices in Microsoft Intune
  • enforce configurations in Microsoft Intune
  • handle certificates in Microsoft Intune
  • deploy enterprise profiles in Microsoft Intune
  • distribute apps in Microsoft Intune
  • protect data in Microsoft Intune

System Center Configuration Manager

  • describe Microsoft System Center Configuration Manager and Intune interoperability
  • configure the Microsoft Intune Connector Role
  • prepare for Windows Mobile device enrollment in Microsoft System Center Configuration Manager
  • prepare for iOS device enrollment in Microsoft System Center Configuration Manager

Practice: Microsoft Intune

  • create an account on Microsoft Intune, enroll devices, and deploy enterprise profiles





Multi-license discounts available for Annual and Monthly subscriptions.