From the course: Building a Mobile Endpoint Management Solution with Intune

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Documenting the security requirements

Documenting the security requirements

- Defining what security means for mobile devices takes two forms. There are general and specific security requirements. General requirements apply to all devices. For example, do all of the devices require a passcode or should all of the devices require only encrypted network connections? Whatever the security policy, general policies apply to every device in the organization's. managed fleet. Specific requirements apply to segments of devices. Devices deployed to executive employees will have their own set of security requirements than those deployed to employees at retail stores. General and specific security policies are accomplished and in tune through the use of policies and profiles. Policies are rules of use determined by the organization. Profiles are configuration of the device themselves, so the capabilities of the device. For example, what's the device passcode possibility? Or can we configure the device for…

Contents