Mobile device management with Microsoft System Center 2012 R2

Professional Cleanup

Conclusions

Thanks to the integration of Windows Intune and System Center Configuration Manager, admins can anticipate uniform and holistic management of mobile devices; the use of policies means many mobile device features can be managed centrally, improving security in enterprise use. The drawbacks include the considerable effort involved in the initial Windows Intune and SCCM setup and the requirements you need to satisfy before you can fully leverage the potential of Windows Intune and SCCM integration.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Smartphone management with Microsoft products
    Managing mobile devices is quickly becoming part of the administrator's daily grind. System Center Configuration Manager and Intune can help with this in Microsoft environments.
  • System Center 2012 SP1: What's new?
    Service Pack 1 expands System Center 2012 primarily in terms of features for virtualization and cloud computing. We provide the details in this article.
  • Endpoint Security for Windows 10
    Windows 10, build 21H1, has numerous protection mechanisms out of the box. We look at the option for delaying updates, the components and features of Microsoft Defender, and recommendations for hardening the operating system.
  • Azure AD with Conditional Access
    Trust is good, but controls are better. As more flexible working models become widespread, the boundaries of the classic perimeter are blurring and softening existing models of trust for adopting cloud software and data storage or running domain controllers or core applications in the cloud.
  • Advanced Windows security using EMET
    Although attacks on computers are numerous and varied, they are predominantly based on the same techniques. Microsoft closes these vulnerabilities on Windows computers using the Enhanced Mitigation Experience Toolkit (EMET).
comments powered by Disqus