Learn about the iOS/iPadOS framework deployment methodology This configuration enacts stronger password policies, disables more device functions, enforces additional data transfer restrictions, and requires apps to be installed through the Apple volume purchase program (VPP).įor more information about the security framework, including specific recommendations and the minimum apps that must be protected, see the articles listed in the following table. For example, users who handle highly sensitive data where unauthorized disclosure causes considerable material loss to the organization. High security (Level 3) – This configuration is recommended for devices used by specific users or groups who are uniquely high risk. It's applicable to most mobile users accessing work or school data on a device. This configuration enacts data sharing controls and blocks access to USB devices. This level is achieved by enforcing password policies, defining device lock characteristics, and disabling certain device functions (such as untrusted certificates).Įnhanced security (Level 2) – This configuration is recommended for devices from which users access sensitive or confidential information. The security levels for supervised devices are:īasic security (Level 1) – This configuration is recommended as the minimum security configuration for supervised devices where users access work or school data. This configuration enacts stronger password policies than the previous levels, disables more device functions, and enforces additional data transfer restrictions. This configuration enacts data sharing controls. This configuration enforces password policies, defines device lock characteristics, and disables certain device functions (such as untrusted certificates).Įnhanced security (Level 2) – This configuration is recommended for devices from which users access sensitive or confidential information. The security levels for personally owned devices are:īasic security (Level 1) – This configuration is recommended as the minimum security configuration for personal devices from which users access work or school data. Each security level builds off the previous one and offers more protection than the last. It applies to both personally owned and supervised devices, and includes the recommended settings for basic, enhanced, and high-level security. Microsoft Intune uses a taxonomy for this framework that's similar to the one used for security configurations in Windows 10. These recommendations help you tailor your organization's mobile device security protection to your specific needs. The iOS/iPadOS security configuration framework is a series of recommendations for device compliance and configuration policy settings. Leverage the iOS/iPadOS security configuration framework It also describes how to create plans for rollout, communication, support, testing, and validation. The Microsoft Intune planning guide provides guidance and advice to help you determine goals, use-case scenarios, and requirements. Set up Apple MDM push (APNs) certificate.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |