MENU

Fun & Interesting

Protecting Corporate Data on Personal Cell Phones | Microsoft Security

T-Minus365 2,960 1 month ago
Video Not Working? Fix It Now

In this video, I cover how to provide secure access to your corporate data on personal smartphones—without enrolling those devices under full IT management. I’ll walk you through MDM vs. MAM, creating App Protection Policies, setting up Conditional Access, and handling executive pushback so you can strike the perfect balance between security and user convenience. 🚀 What You’ll Learn MDM vs. MAM: Understand the key differences and why MAM is often the best solution for BYOD. App Protection Policies: Learn how to block data transfer to unmanaged apps, enforce PIN or Face ID, and more. Conditional Access Setup: Discover how to require approved apps for email, chat, and other corporate data. Handling Exceptions: Get practical tips for dealing with execs and other “snowflake” users who insist on native apps. 💡 Why Watch? BYOD (Bring Your Own Device) is here to stay, but it opens a massive security gap if not managed correctly. This video cuts through the complexity of Microsoft 365 and Intune policies, offering real-world steps you can take today to protect corporate data without alienating users. Whether you’re an MSP, IT pro, or sysadmin, these tactics will help you maintain robust security while keeping user satisfaction high. 👍 Engage with Me Enjoyed this tutorial? Give it a thumbs up, subscribe, and share it with your colleagues! I’d also love to hear your experiences or any tips you’ve discovered—drop them in the comments below, and let’s learn together. 🤖 Automate Your M365 Security Assessments https://hubs.ly/Q032f8qd0 Blog: https://tminus365.com/protecting-corporate-data-on-personal-cell-phones-microsoft-security/ Securing Devices Playlist: https://www.youtube.com/playlist?list=PL7bgJJ6_IY_tR43AYPa-08GvGahqgmD6m Intro Music Jordyn Edmonds – https://www.youtube.com/watch?v=y06dz2cX4r0 Table of Contents 00:00 - Intro 00:26 - The Problem 01:17 - 1. MDM vs MAM Demystified 01:49 - 2. Creating App Protection Policies 07:10 - 3. Configuring Conditional Access 09:45 - 4. End User Experience 10:56 - 5. Handling Executive Pushback & Exceptions 12:23 - 6. Creating a selective app wipe request Give this video a thumbs up if you found it useful! #BYOD #MDM #MAM #Intune #Microsoft365 #CyberSecurity #TMinus365 Thanks for watching the video Securing Corporate Data on Personal Devices | MDM vs. MAM!

Comment