Chapter 8
Security features of Enterprise Mobility + Security
Now that you understand the technologies that make up Microsoft Enterprise Mobility + Security (EMS), let’s look at what you should do with them.
In this chapter, we will go over how to implement some of the security features of Enterprise Mobility + Security to strengthen your corporate security posture and better secure your users and the devices they use—regardless of who owns them or where they are. Instead of following the same order of coverage as Chapter 7, we will address what you should do following a recommended order in which you should do it to get to a minimum-security posture. We will assume that you have EMS E5, so make ...
Get Microsoft 365 Administration Inside Out, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.