From the course: Careers in Cloud Computing: IT Pro to Microsoft Cloud Pro
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Device compliance and policies - Azure Tutorial
From the course: Careers in Cloud Computing: IT Pro to Microsoft Cloud Pro
Device compliance and policies
- [Instructor] Organizations need to extend the security controls to include mobile devices, which can be used to access cloud-based data. Devices must be compliant and compatible with the security requirements of an organization. Devices are typically managed using a mobile device management solution, such as Microsoft Intune. The main threats for your organization's data are data theft, data loss, and data leakage. Data theft is where data is stolen for political or financial gain, usually by hacking or malware. Data loss is where important data becomes corrupted or misplaced and can no longer be accessed, or it is deleted by accident without having a valid backup, and data leakage is where data is transmitted outside of the company, usually through sharing between devices and applications. For example, leaking information onto social media. A device is considered compliant if it meets the security requirements of an organization. Examples of compliance requirements are that a…