# Mobile Device and MDM Operations One-sentence definition: Operate mobile management policies for BYOD/corporate devices with compliance and privacy balance. ## Key Facts - Enforce screen lock, encryption, OS version, app allowlists, jailbreak/root detection. - Use MAM for corporate data containers; remote wipe corporate data only. - Conditional access: device compliance signals; certificate auth where possible. - Handle lost/stolen procedures and ownership changes. - **Verify:** check official (ISC)² CBK and current exam outline. ## Exam Relevance - Choose MAM/MDM combos to protect data on mobile endpoints. **Mnemonic:** “**Manage** device, **mind** privacy.” ## Mini Scenario Q: BYOD refuses full wipe—how to comply? A: Corporate-only wipe via MAM; no personal data deletion. ## Revision Checklist - Two compliance checks. - Access tie-in. - Lost device step. ## Related [[Device Identity and MDM MAM (Compliance)]] · [[Conditional Access Policies (Risk Device Location)]] · [[Zero Trust Network Access (ZTNA)]] · [[Passwordless and FIDO2 WebAuthn]] · [[Domain 7 - Index]]