September 2017
Intermediate to advanced
314 pages
8h 5m
English
To ensure that a BYOD device meets the necessary security standards, you should ensure it is enrolled in AD, or the user enrolls in the MDM solution. These options will enable central configuration of the security required.
Some cloud services, such as Azure AD, can then use conditional access policies to ensure access is only granted to specific services if the device is compliant and/or domain joined.
Device configuration requirements can vary from one company to another, but the fundamental configurations that should be enforced include:
Read now
Unlock full access