SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Gerenciamento de dispositivos
móveis com Intune e SCCM
Guilherme Maia
Axter
guilhermemaia.com.br
fb.com/guilhermemaia.com.br
$
Agenda
• Mobilidade empresarial
• Microsoft Intune
• System Center Configuration Manager
• Melhores juntos
• Prática
• Dúvidas $
Business anywhere
The explosion of devices is
eroding the standards-based
approach to corporate IT
Devices
Deploying and managing
applications across
platforms is difficult
Apps
Today’s challenges
Data
Users need to be productive
while maintaining
compliance and reducing
risk
Users expect to be able to
work in any location and
have access to all their
work resources
Users
Business anywhere
Devices AppsUsers
Empowering People-Centric IT
Enable users
Allow users to work on the
devices of their choice and
provide consistent access to
corporate resources
Protect your data
Help protect corporate
information and manage riskManagement. Access. Protection.
Data
Unify your environment
Deliver a unified application and
device management on
premises and in the cloud
Business anywhere
Selecting the management platform
Unified Device Management: System
Center 2012 R2 Configuration Manager
with Microsoft Intune
Build on existing Configuration Manager
deployment
– Full PC management (OS Deployment, Endpoint
Protection, application delivery control, rich
Cloud-based management: Standalone
Microsoft Intune
No existing Configuration Manager deployment
Simplified policy control
Simple web-based administration console
Microsoft Intune
Business anywhere
Microsoft Intune standalone service
Windows PCs
(x86/64, Intel SoC)
Windows RT,
Windows Phone 8.x
iOS, Android
Microsoft Intune
Business anywhere
Manage and secure devices anywhere
Simple web-based administration console
and a richer experience for information
workers
 Help protect PCs from malware
 Manage updates
 Proactive monitoring and alerts
 Provide remote assistance
 Inventory hardware and software
 Monitor and track licenses
 Increase insight with reporting
 Set security policies
 Distribute software
 Richer mobile device management
Business anywhere
End user experience
Consistent self-service experience for end users across mobile platforms
Available in the
Windows Store
Windows Phone iOS
Side-loaded
during enrollment
Available in the
Apple App store
Windows Android
Available in the
Google Play Store
Business anywhere
Mobile device inventory
Hardware properties for mobile
devices are collected through the
Device Management Authority, as
well as Exchange ActiveSync
No software inventory for mobile
devices to respect the information
workers’ privacy on their own
device
IT pros can track storage on
mobile devices, which helps
them anticipate and
troubleshoot issues
Business anywhere
Settings management
• Security policy on devices by direct management and EAS
• New expanded policy set
Reporting available on
each setting, whether it
is applicable,
conformant, or has an
error
The same security
policy template is
used for both direct
management and
EAS to help admins
Older Android and
Windows Phone 7
devices can be
managed through
EAS
Business anywhere
Mobile device settings in Microsoft Intune
Category Windows 8.1 PC
and RT
Windows
Phone 8.1
iOS Android
Password    
Encryption    
Malware 
System settings   
Cloud 
Windows Server Work Folders 
Browser   
Applications and gaming   
Device restrictions   
Store access  
Roaming  
* Subset of settings Note: Table applicable to direct MDM and not EAS
Business anywhere
Software distribution summary
Platform
Desktop apps
(.msi, .exe)*
Modern app types
Side loading Deep
links
Web
apps.appx .xap .ipa .apk
Windows 8 Pro and
Enterprise
   
Windows RT   
iOS   
Android   
Windows Phone 8   
Windows 7 and below  
Business anywhere
Personal Apps
and Data
Lost or Stolen
Company Apps
and Data
Remote App
Protect your data
Help protect corporate information and manage risk
Centralized
Data
EnrollmentRetired
Company Apps
and Data
Remote App
Policies
Policies
Lost or Stolen
Company Apps
and Data
Remote App
Policies
Personal Apps
and Data
Retired
Personal
Apps and
Data
IT can provide a secure and
familiar solution for users to
access sensitive corporate data
from anywhere with VDI and
RemoteApp technologies.
Users can access
corporate data regardless
of device or location with
Work Folders for data
sync and desktop
virtualization for
centralized applications
• Selective wipe removes
corporate applications,
data, and policies based as
supported by each
platform
• Full wipe if supported by
each platform
• Can be executed by IT or
by user via Company Portal
• Sensitive data or
Business anywhere
New device actions in Microsoft Intune
Remote Lock
• If a device is lost or stolen, a Microsoft Intune admin can remotely lock the device to its lock
screen.
• Supported on iOS, Android, Windows, and Windows RT
Passcode Reset
• If users forget the passcode to unlock their device, a Microsoft Intune admin can remotely reset
the passcode
• iOS – Clears passcode from device
• Android – Temporary passcode is created
• Not supported on Windows or Windows RT
Business anywhere
Better together
Prática
27
Dúvidas
Obrigado

Weitere ähnliche Inhalte

Was ist angesagt?

VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...aOS Community
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioIvanti
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingIvanti
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionLai Yoong Seng
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 

Was ist angesagt? (20)

BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
System safety
System safetySystem safety
System safety
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 

Ähnlich wie Gerenciamento de dispositivos móveis com Intune e SCCM

What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraAptera Inc
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile securityJ Hartig
 
Hexnode UEM Remote Device Management
 Hexnode UEM Remote Device Management Hexnode UEM Remote Device Management
Hexnode UEM Remote Device ManagementHexnode
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 

Ähnlich wie Gerenciamento de dispositivos móveis com Intune e SCCM (20)

What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
Hexnode UEM Remote Device Management
 Hexnode UEM Remote Device Management Hexnode UEM Remote Device Management
Hexnode UEM Remote Device Management
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Gerenciamento de dispositivos móveis com Intune e SCCM

  • 1. Gerenciamento de dispositivos móveis com Intune e SCCM Guilherme Maia Axter guilhermemaia.com.br fb.com/guilhermemaia.com.br $
  • 2. Agenda • Mobilidade empresarial • Microsoft Intune • System Center Configuration Manager • Melhores juntos • Prática • Dúvidas $
  • 3. Business anywhere The explosion of devices is eroding the standards-based approach to corporate IT Devices Deploying and managing applications across platforms is difficult Apps Today’s challenges Data Users need to be productive while maintaining compliance and reducing risk Users expect to be able to work in any location and have access to all their work resources Users
  • 4. Business anywhere Devices AppsUsers Empowering People-Centric IT Enable users Allow users to work on the devices of their choice and provide consistent access to corporate resources Protect your data Help protect corporate information and manage riskManagement. Access. Protection. Data Unify your environment Deliver a unified application and device management on premises and in the cloud
  • 5. Business anywhere Selecting the management platform Unified Device Management: System Center 2012 R2 Configuration Manager with Microsoft Intune Build on existing Configuration Manager deployment – Full PC management (OS Deployment, Endpoint Protection, application delivery control, rich Cloud-based management: Standalone Microsoft Intune No existing Configuration Manager deployment Simplified policy control Simple web-based administration console Microsoft Intune
  • 6. Business anywhere Microsoft Intune standalone service Windows PCs (x86/64, Intel SoC) Windows RT, Windows Phone 8.x iOS, Android Microsoft Intune
  • 7. Business anywhere Manage and secure devices anywhere Simple web-based administration console and a richer experience for information workers  Help protect PCs from malware  Manage updates  Proactive monitoring and alerts  Provide remote assistance  Inventory hardware and software  Monitor and track licenses  Increase insight with reporting  Set security policies  Distribute software  Richer mobile device management
  • 8. Business anywhere End user experience Consistent self-service experience for end users across mobile platforms Available in the Windows Store Windows Phone iOS Side-loaded during enrollment Available in the Apple App store Windows Android Available in the Google Play Store
  • 9. Business anywhere Mobile device inventory Hardware properties for mobile devices are collected through the Device Management Authority, as well as Exchange ActiveSync No software inventory for mobile devices to respect the information workers’ privacy on their own device IT pros can track storage on mobile devices, which helps them anticipate and troubleshoot issues
  • 10. Business anywhere Settings management • Security policy on devices by direct management and EAS • New expanded policy set Reporting available on each setting, whether it is applicable, conformant, or has an error The same security policy template is used for both direct management and EAS to help admins Older Android and Windows Phone 7 devices can be managed through EAS
  • 11. Business anywhere Mobile device settings in Microsoft Intune Category Windows 8.1 PC and RT Windows Phone 8.1 iOS Android Password     Encryption     Malware  System settings    Cloud  Windows Server Work Folders  Browser    Applications and gaming    Device restrictions    Store access   Roaming   * Subset of settings Note: Table applicable to direct MDM and not EAS
  • 12. Business anywhere Software distribution summary Platform Desktop apps (.msi, .exe)* Modern app types Side loading Deep links Web apps.appx .xap .ipa .apk Windows 8 Pro and Enterprise     Windows RT    iOS    Android    Windows Phone 8    Windows 7 and below  
  • 13. Business anywhere Personal Apps and Data Lost or Stolen Company Apps and Data Remote App Protect your data Help protect corporate information and manage risk Centralized Data EnrollmentRetired Company Apps and Data Remote App Policies Policies Lost or Stolen Company Apps and Data Remote App Policies Personal Apps and Data Retired Personal Apps and Data IT can provide a secure and familiar solution for users to access sensitive corporate data from anywhere with VDI and RemoteApp technologies. Users can access corporate data regardless of device or location with Work Folders for data sync and desktop virtualization for centralized applications • Selective wipe removes corporate applications, data, and policies based as supported by each platform • Full wipe if supported by each platform • Can be executed by IT or by user via Company Portal • Sensitive data or
  • 14. Business anywhere New device actions in Microsoft Intune Remote Lock • If a device is lost or stolen, a Microsoft Intune admin can remotely lock the device to its lock screen. • Supported on iOS, Android, Windows, and Windows RT Passcode Reset • If users forget the passcode to unlock their device, a Microsoft Intune admin can remotely reset the passcode • iOS – Clears passcode from device • Android – Temporary passcode is created • Not supported on Windows or Windows RT