January 2023
Intermediate to advanced
992 pages
23h 44m
English
Now that you understand the technologies that make up Microsoft Enterprise Mobility + Security (EMS), let’s look at what you should do with them.
In this chapter, we will go over how to implement some of the security features of Enterprise Mobility + Security to strengthen your corporate security posture and better secure your users and the devices they use—regardless of who owns them or where they are. Instead of following the same order of coverage as Chapter 7, we will address what you should do following a recommended order in which you should do it to get to a minimum-security posture. We will assume that you have EMS E5, so make ...
Read now
Unlock full access