This course will provide best practices that you need to know for extending on-premises assets to the cloud in a manner that allows for authentication, authorization, encryption, and a secured mobile experience.
The IT industry is facing an upward trend of employees demanding to use their own devices to access company-owned resources and saving data to personal storage locations. This course, Getting Started with the Microsoft Enterprise Mobility Suite, will provide a step-by-step guide to illustrate how an enterprise can design, install, configure, and maintain Microsoft Azure Active Directory Premium, Microsoft Intune, and Microsoft Azure Rights Management using the Microsoft Enterprise Mobility Suite of products. You will start with a discussion about how the rise of cloud computing has given birth to the need for a full enterprise mobility suite within the enterprise. Next, you'll see in detail, how to leverage the Azure AD Premium feature to help build quick wins within your own Office 365 deployment. You'll also learn through a hands-on approach how to leverage the Azure RMS feature to provide a secure wrapper around corporate data found within the enterprise. When you're finished with this course, you'll be ready for a successful implementation of the Microsoft Enterprise Mobility Suite of products.
Over the past 16 years, Justin has worked with a global customer base to deliver enterprise-level messaging, unified communications, and cloud-enabled virtualization solutions. Justin's focus is on developing solutions that enable businesses to deliver superior results to their customers. Justin holds the MCM/MCSM and MVP designations with Microsoft for Exchange.
Course Overview Hello everyone. My name is Justin Harris, and welcome to my course Getting Started with the Microsoft Enterprise Mobility Suite. Did you know that according to Forester 66% of employees are using personal devices for work, and 33% of employees now are actually working remote during the work week. From an end user perspective, the added flexibility to use my favorite mobile device or laptop it's great, but when you think about it, that's a lot of new endpoints that are connecting into the corporate network that can become potential security risks. So in this course I'm going to examine all the options that you have as an administrator to secure these personal devices, and to secure all the sensitive company data that resides on these devices by leveraging Microsoft's enterprise mobility platform. We're going to cover topics that include how to leverage a single identity across your on-premises applications within Office 365, and also within the vast array of Software as a Service applications. We're going to discuss how to manage the complete lifecycle of mobile devices from provisioning, remotely wiping, and providing automatic software installation and updates. And then lastly, we're going to discuss how to secure all the sensitive company information that's contained in the Word, PDF, and Excel documents that reside on these mobile devices. By the end of this course, you will feel comfortable with embracing Microsoft's enterprise mobility story day one, thanks to the hands-on approach taken within this course. I hope that you'll join me on this journey and learn about how to layer on additional security features within your own Office 365 environment by leveraging Microsoft's enterprise mobility story.
Cloud Computing & the Rise of BYOD Policies Welcome to the course, Getting Started with the Microsoft Enterprise Mobility Suite. My name is Justin Harris. So today we're going to talk about cloud computing and the rise of bring your own device policies. Now cloud computing is a pretty broad term, so we're going to spend a little bit of time to define what that actually is. Now as we go through and talk about cloud computing, the change in technology, the rapid evolution of technology, has enabled cloud computing, and has provided this platform where we as administrators and end users can leverage this technology to work very differently now than we could, let's say, 5 or even 10 years ago. Now because of this shift in technology, many companies have now started to support a bring your own device policy, BYOD. That sounds great. I get to take my iPhone or Android phone into work and access my corporate email, documents, and application, but while that works great for me as the end user, what's the impact on the IT department? So I don't want to provide any spoilers, but it does impact the IT department. Cloud computing and bring your own device policies impact the IT department in such a way that Microsoft has provided the Enterprise Mobility Suite that is really aimed to target these security risks and to mitigate them, while not impacting the end users day to day.
Understanding What's Included with Microsoft Azure AD Premium Now in module 2 we're going to discuss what is actually included with the Microsoft Azure Active Directory Premium service. In the previous module, we discussed that the EMS Suite, it's really a collection of several different Office 365 skews bundled together. And my personal opinion is that the Azure AD Premium service, it is hands-down one of the most undervalued features found within Office 365. The features that are now at your disposal is just incredible, and this is especially true when you think about how difficult and complex configuring some of these features on-premises is. So in this module I'm going to discuss some of those great features that are found in Azure Active Directory Premium, and I'm going to highlight some quick wins for you in your own Office 365 environment. And to build upon this knowledge, I'm actually going to show you how to configure these items as we move on to module 3. Alright, let's lay the foundation here.
Configuring Advanced Features of Microsoft Azure Active Directory Premium In the previous module, we spent a lot of time talking about all the great advanced features that you can actually leverage within the Azure Active Directory Premium skew, but for this module we're going to dig in a little bit deeper and we're going to spend time actually configuring these advanced features, so that way you get a better understanding of what you need to do, and the level of effort to implement these features in your own organization. So let's move on to the first feature and learn a little bit about how to configure directory synchronization and then get into the password reset capabilities.