Book Image

Microsoft System Center Configuration Manager Cookbook - Second Edition

By : Samir Hammoudi, Matthew Hudson, Greg Ramsey, Brian Mason, Chuluunsuren Damdinsuren
Book Image

Microsoft System Center Configuration Manager Cookbook - Second Edition

By: Samir Hammoudi, Matthew Hudson, Greg Ramsey, Brian Mason, Chuluunsuren Damdinsuren

Overview of this book

This practical cookbook is based on the 1602 current branch of System Center Configuration Manager (SCCM). It shows you how to administer SCCM, giving you an essential toolbox of techniques to solve real-world scenarios. Packed with over 60 task-based and instantly usable recipes, you’ll discover how design a SCCM Infrastructure, and dive into topics such as the recommended SQL configuration for SCCM and how to deploy Windows 10 with Operating System Deployment (OSD). You will learn to easily manage Windows 10 devices by deploying applications, software updates, and feature upgrades, andl be able to leverage Mobile Device Management (MDM) using SCCM and Microsoft Intune. Finally, you see how to gather the inventory of all your PC park and create reports based on it. By the end of the book, you will have learned the best practices when working with SCCM and have a handy reference guide for troubleshooting.
Table of Contents (15 chapters)
Microsoft System Center Configuration Manager Cookbook - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Using Conditional Access to control devices' access to Office 365 services


One of the biggest concerns we hear constantly from administrators is how to implement a BYOD scenario while securing access to the corporate apps and data accessed from a mobile device. Using an MDM solution like Microsoft Intune coupled with CM, a mobile device can be secured by applying MDM policies. But how to make sure that any mobile device which has access to corporate apps and data is secured by Microsoft Intune and is compliant with the company's rules? Microsoft came up with a simple solution called Conditional Access (CA), which leverages a new type of policy called compliance policy.

To protect company data, you need to make sure that the devices used to access corporate apps and data, comply with certain rules like using a PIN to access the device, and encryption of data stored on the device. A set of such rules is referred to as a compliance policy.

By defining a compliance policy, we can define whether...