{"id":13369,"date":"2016-11-15T00:00:00","date_gmt":"2016-11-15T06:00:00","guid":{"rendered":"https:\/\/centricconsulting.com\/post\/office-365-mobile-device-management-solutions\/"},"modified":"2022-06-28T08:49:01","modified_gmt":"2022-06-28T12:49:01","slug":"office-365-mobile-device-management-solutions","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/office-365-mobile-device-management-solutions\/","title":{"rendered":"Office 365 Mobility: Securing Data with Mobile Device Management Solutions"},"content":{"rendered":"
Part three of a series<\/a>.<\/em><\/p>\n When\u00a0migrating or deploying to Office 365, it’s important to consider mobility options. Because, if you don’t implement\u00a0mobile use policies, then all devices will have access to all of Office 365 through mobile apps and browsers.<\/p>\n That means that with their credentials, any user can access their company’s Office 365 data with the use of any device and from anywhere that has a connection to the Internet. That also means users can move that data – files, email, or other types of data – to other locations. All this is even easier thanks to mobile apps.<\/p>\n But, with no protection, organizations face\u00a0security risks. How can organizations properly manage this?<\/p>\n The Office 365 Security and Compliance Center\u2019s Threat Management section includes some built-in mobile device management utilities (MDM). MDM uses Intune for device management and governs any device that attempts to connect to the corporate tenant, forcing the devices to enroll in MDM so they can be monitored.\u00a0Note that Apple Devices cannot be enrolled until an APNs Certificate is configured for the Office 365 tenant.<\/p>\n Let’s take a deeper look at Office 365’s mobile device management and security policies.<\/p>\n Mobile device management allows an admin to perform the following:<\/p>\n It’s important to put\u00a0security policies in place, so you can control the flow of information. Security policies\u00a0can include\u00a0blocking unsupported devices from connecting to Exchange and exempting individual groups from all policies.<\/p>\n Some device security policies include:<\/p>\n The built-in MDM options in Office 365 answer the question: \u201cCan users connect from their mobile devices and if so, what are the basic requirements for those connections?”<\/p>\n The idea with Office 365, of course, isn\u2019t to disallow mobility as a whole, rather to govern and enforce policies in concert with data loss prevention (DLP) policies. Centric’s Modern Workplace Practice<\/a> has led many governance and policy planning projects to help organizations govern Office 365 use.<\/p>\n There are also many third\u00a0party identity and device management options. If the organization is federated using ADFS, then it’s possible to define\u00a0access policies that will limit – among other restrictions – access by users using http(s) or users not on the network. This eliminates browser-based access by a device to Office 365 – another porthole through which the company\u2019s vital and most confidential data could escape.\u00a0Centric has teams dedicated to supporting the Windows server platform and can help with the more advanced ADFS policy topics.<\/p>\n Finally, Microsoft offers full protection and resolute device and policy management using Azure Active Directory Premium<\/a> or Enterprise Mobility + Security<\/a>. These are suites and a la carte options that can be customized to each organization\u2019s particular needs. They require careful planning, however, like everything in Office 365, to balance between security and adoption.<\/p>\n Centric Consulting has conducted numerous workshops and planning sessions with various organizations to prepare them for a secure trip to the cloud. Call on us to assist in planning your move.<\/p>\n","protected":false},"excerpt":{"rendered":" When deploying Office 365, it’s important to implement mobile use policies, so you can govern data flow through mobile apps and browsers.<\/p>\n","protected":false},"author":147,"featured_media":24673,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[],"coauthors":[15625],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-22 09:34:52","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/13369"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=13369"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/13369\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/24673"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=13369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=13369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=13369"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=13369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Device Management<\/h2>\n
\n
Device Security Policies<\/h2>\n
\n
Governing Office 365 Mobility Options<\/h2>\n