From the course: Careers in Cloud Computing: IT Pro to Microsoft Cloud Pro

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Device compliance and policies

Device compliance and policies - Azure Tutorial

From the course: Careers in Cloud Computing: IT Pro to Microsoft Cloud Pro

Start my 1-month free trial

Device compliance and policies

- [Instructor] Organizations need to extend the security controls to include mobile devices, which can be used to access cloud-based data. Devices must be compliant and compatible with the security requirements of an organization. Devices are typically managed using a mobile device management solution, such as Microsoft Intune. The main threats for your organization's data are data theft, data loss, and data leakage. Data theft is where data is stolen for political or financial gain, usually by hacking or malware. Data loss is where important data becomes corrupted or misplaced and can no longer be accessed, or it is deleted by accident without having a valid backup, and data leakage is where data is transmitted outside of the company, usually through sharing between devices and applications. For example, leaking information onto social media. A device is considered compliant if it meets the security requirements of an organization. Examples of compliance requirements are that a…

Contents