![]() The first action is to configure the integration between MDE and Microsoft Intune. Integration of Microsoft Defender for Endpoint with Microsoft Intune Note: More information about getting started with MDE for iOS can be found here and more information about getting started with MDE for Android can be found here. ![]() Important: At the moment of writing this article, this functionality is still in preview. This post will go through those configurations and it will show the user experience. This behavior can be achieved by configuring an integration between MDE and Microsoft Intune, to send the required signals to Microsoft Intune, and by configuring an app protection policy, to create a conditional launch for the app, based on the signals provided by MDE. That enables the usage of MDE on unmanaged devices for even better protection of work data. Those signals are based on the protection against phishing, unsafe network connections (on Android and iOS), and malicious apps (on Android only). That new and exiting functionality is that MDE risk signals can now be used in app protection policies for Android and iOS. This week is all about some new and exiting functionality related to Microsoft Defender for Endpoint (MDE) that was announced around Microsoft Ignite.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |