Download PDF
of this course

MS55078 - Mobile Device Management (MS55078)

  • Overview
  • Who Should Attend
  • Certifications
  • Prerequisites
  • Objectives
  • Content
  • Schedule
Course Overview

Duration : 2 Days

This two-day instructor-led course is intended for IT professionals who are responsible for developing a management strategy for mobile devices in the enterprise.  Devices running Windows, iOS and Android operating systems will be covered.  Utilizing various Microsoft technologies students will create a mobile device plan, configure mobile device management and master both connectivity and data security on these devices.  With the shift to BYOD (bring your own device) it is necessary that enterprises allow users to access information from a variety of devices with a minimum of risk to the loss of that information.  The new tools implemented as a part of Windows Server 2012 and Windows Server 2012 R2 as well as System Center will allow for a complete set of BYOD enterprise policies.

Who Should Attend

  • This course is intended for IT professionals who have experience with mobile devices and some version of Windows client and server operating systems.Previous experience with management tools such as Microsoft System Center Configuration Manager would also be valuable but is not required.

Course Certifications

This course is part of the following Certifications:


Before attending this course, students must have:

  • Basic understanding of TCP/IP and networking concepts.

  • Basic Windows and Active Directory knowledge.

  • Basic understanding of security concepts such as authentication and authorization.

  • Basic experience with a mobile device and mobile operating system.

  • Basic understanding of device management fundamentals.


Course Objectives

After completing this course, students will be able to:

  • Understand the various types of mobile devices which may connect to the enterprise.

  • Determine requirements for and connecting mobile devices via domain join, Workplace Join and VPNs.

  • Create a mobile device management strategy.

  • Configure a mobile device management infrastructure using Microsoft System Center products and Windows Server 2012 R2.

  • Secure corporate data when in transit or on the devices with IPSec and BitLocker.

  • Manage data security with Group Policy Objects (GPOs)

  • Synchronize data across multiple mobile devices using Work Folders in Windows 8/Windows 8.1.

  • Connecting to applications via Web Application Proxy.


Course Content

Module 1 : Overview of MObile Device Management

In the past organizations , either provided laptops or smart phones approved by the IT department and or allowed users to connect from their Windows based computers using options such as VPNs or Remote Desktop Gateways. These options still exist and remain common. However , the incredible growth of mobile devices from various vendors creates a need for managing access to data and applications from these devices. Organizations must determine the best method for doing so in a secure manner.


  • What is Mobile Device Management
  • Overview of Device Management Options

Atfer completing this module , students will be able to :

  • Understand the basics of mobile device management
  • Gain a high level overview of Microsoft Mobile Device Management tools


Module 2 : Mobile Device Management Strategy and Infrastructre

Every organization has unique needs for connecting mobile devices to the corporate network to increase user productivity. Based on the principle of People-Centric IT ( PCIT ) a mobile device strategy can be created ti meet those needs. Once the strategy has been determined then its time to created the infrastructure .


  • Planning for a Mobile Device Management Strategy
  • Designing a Mobile Device Management Infrastructure with Windows Server 2012 R2

Lab : Create the Mobile Device Management Infrastructure 

After completing this module , students will be able to :

  • Create a mobile device management ( MDM ) Strategy
  • Design a mobile device management infrastructure based on Windows Server 2012 R2 technologies.


Module 3: Workplace Join and Work Folders

Allowing devices connectivity is important , but more important is managing that connectivity . Workplace Join allows a way to track and control which devices can connect. Once connected , users will need access to data , no matter the device . That data must be current and consistent without users manually copying files. Work Folders creates this ability.


  • Workplace Join for Mobile Devices 
  • Work Folders

Lab : Workplace Join Windows and IOS Devices

Lab : Work Folders

After completing this module , students will be able to :

  • Set up the requirements for Workplace Join
  • Workplace Join devices to Active Directory
  • Create the Work Folders infraastructure.
  • Test Work Folders on devices
  • Resolve common appication compatability issues.


Module 4 : Web Application Proxy

In the previous module , we learned how to connecting non-admin devices to Active Directory for management and policies with Workplace Join . In addition we showed how to synchronize data between mutliple devices using Work Folders. However almost always data will be used in some type of application , therefore a part of our MDM ( Mobile Device Management ) strategy must include accessing those applications from devices . This is the responsibility of Web Application Proxy.


  • Web Application Proxy Overview
  • Installing the Web Application Proxy Role Service
  • Configuring the WAP and Publishing Applications

Lab : Web Application Proxy 

After completing this module , students will be able to  :

  • Understand the features and benefits of Web Application Proxy ( WAP ) 
  • Install and configure WAP 
  • Publish and connect to applications using WAP.


Module 5 :Mobile Device Management Security

One of the primary responsibilities of any IT professional is security . Physical Security , netowrk security and data security are critical . In this module , we will look at how mobile devices affect security are critical. In this module , we will look at how mobile devices security plans not just for BYOD , but also for the entire network infrastructure. 


  • Overview of Enterprise and Mobile Device Management Security
  • Hardening the Mobile Device Management Infrastructure.

Lab : Securing the MDM Infrastructure the MDM Infrastructure and Communications

After completing this module , students will be able to :

  • Understand security in the enterprise
  • See how previously discussed MDM Technologies are secured 
  • Harden the security infrastructure for mobile devices


Module 6 : Mobile Device Lifecycle and Application Management

In this module we will discover the process of managing mobile devices throughout their lifecycles. technologies including the Microsoft Exchange Connector , System Center Configuration Manager and Windows InTune can be used for these purposes . We will also see how applications can be managed for mobile devices.


  • Mobile Device Lifecycle Management
  • Configuring the SCCM Windows InTune Connector 
  • Mobile Device Application Management

Lab : Managing Mobile Devices with SCCM and Windows InTune 

After completing this module , students will be able to :

  • Understand the Microsoft Exchange Connector
  • Connect System Center Configuration Manager to Windows InTune
  • Manage applicaitons for mobile devices


Course ID: MS55078

Show Schedule for 1 Month  3 Months  All 
Date Country Location Register