From the course: Building a Mobile Endpoint Management Solution with Intune
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Security incident
From the course: Building a Mobile Endpoint Management Solution with Intune
Security incident
- [Narrator] As we have seen, device security is accomplished through the use of structured policies. Yet no matter how well an organization plans its mobile program, not every eventuality can be accounted for. Therefore, the mobile team is often thrown in two opposing directions. First, for an organization that is uncomfortable with potential loss, the policies running the program will be so restrictive that the program is not adopted and has little value to the organization. On the other hand, an organization that needs to enable a mobile workforce but does not want to restrict their devices in any way runs the risk of a number of security incidents. Therefore, it is a best practice to have an ever-evolving mobile program that documents how and why certain policies are in place and works directly with its user base to adapt to their unique and changing needs. To that end and to the best of your ability, I have…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.