https://store-images.s-microsoft.com/image/apps.50109.4e1c3b40-b088-47c0-be13-a3457ae0881b.478033b6-df16-418b-a1a1-19fa1af605ab.800ba233-9244-47d5-a7b8-920107d55fe9

Mobility Security - 10 Weeks Implementation

Orange Business Services SA

Microsoft Enterprise mobility and security deployment, technical assessment, audit of infrastructure, Configuration of Endpoint Manger Microsoft Intune.

• Technical workshop on enrolling Android, iOS/iPadOS, macOS and Windows 10/11 devices via the Microsoft Intune solution.

• Infrastructure audit if configurations are set up.

• Conditional access protects the organization's information by crossing.

• Our service includes the configuration of conditional access rules based on connection, user, operating system, geographic location or client applications.

• This protects the organization's information to allow access to devices.

• Implemented conditional access rules can block access or allow access by requiring multi-factor authentication (MFA).

• Microsoft Intune tenant configuration (Microsoft tenant creation and licensing.

• Creation of security profiles: Implementation of static security rules such as allowing NFC use, blocking changes to Wi-Fi settings, blocking data roaming on the cell phone network).

• Integration of modern Windows Hello authentication option using PIN, fingerprint or face recognition.

• Separate business and personal applications on the same device.

• Deploy and update applications on devices: Add and assign applications from the store, internal, web.

• Update operating system and security patches.

• Sending WiFi network certificates.

• Encryption of Windows 10/11 hard drives.

• Removal and wiping of remote terminals.

• Configure corporate compliance: strong password policy, block jailbroken devices.

• Ability to auto enroll your Apple, Android, Samsung mobile devices via KME, DEP and ZT programs.

• Ability to auto enroll Windows PCs via the Autopilot solution.

• Creation of a Cloud PC (Windows 365) allowing the user to connect to a virtual machine, in order to access his secure work environment.

• Thus, the user can connect on any device and browser.

Hiter pregled

https://store-images.s-microsoft.com/image/apps.43409.4e1c3b40-b088-47c0-be13-a3457ae0881b.71098984-4192-4e32-9b3f-70fa91d8a530.7c5219af-a3d0-46c7-8403-58b6b37b1ea4