Reader small image

You're reading from  Mastering Microsoft 365 Defender

Product typeBook
Published inJul 2023
PublisherPackt
ISBN-139781803241708
Edition1st Edition
Right arrow
Authors (2):
Ru Campbell
Ru Campbell
author image
Ru Campbell

Ruairidh (Ru) Campbell is a Microsoft Security MVP and leads Microsoft consultancy at Threatscape. At Threatscape, Ru develops, delivers, and manages offerings and professional services for cybersecurity, compliance, identity, and management. In the cybersecurity community, Ru runs the Microsoft 365 Security & Compliance user group and his blog (campbell.scot), regularly speaks at other user groups and conferences, and contributes to well-known industry publications such as Practical 365. Ru holds 14 Microsoft certifications and a B.Sc. (Distinction) in computer networking from the University of the West of Scotland. Away from cybersecurity, he is a petrolhead who enjoys heavy metal and hiking around Scotland with his wife.
Read more about Ru Campbell

Viktor Hedberg
Viktor Hedberg
author image
Viktor Hedberg

Viktor Hedberg is a Microsoft Security MVP and senior consultant at Truesec. At Truesec, Viktor works with proactive security measures within the Microsoft sphere of technologies, by delivering workshops on best practices and by his deep technical expertise in these areas. In the cybersecurity community, Viktor runs his blogs at Truesec (Experts – viktor-hedberg). Alongside this, he is one of the hosts of the Swedish Windows Security user group, as well as a co-host of the Swedish podcast The Nerd Herd. He is a frequent speaker at both conferences and user groups around the world, focusing on matters of Microsoft Security. Viktor holds numerous Microsoft certifications, as well as being a Microsoft Certified Trainer. Away from cybersecurity, Viktor is a family man, spending most of his time with his wife and three kids, as well as enjoying football, both as a practitioner and as a fan. Heavy metal has been part of his life since his early teens.
Read more about Viktor Hedberg

View More author details
Right arrow

Onboarding and Managing iOS and Android

You’ve reached the last chapter on onboarding and managing MDE devices! Last but by no means least, in this chapter, we will describe how you can protect the most mobile of all devices: those running iOS and Android. For iOS and Android, MDE is described as a mobile threat defense (MTD) solution, so keep reading to learn about the following:

  • How to deploy MDE to iOS and Android with Microsoft Intune
  • How to configure MDE’s iOS and Android features

MDE for Android and iOS includes capabilities such as web protection, vulnerability reporting, unified alerting in the Microsoft 365 Defender portal, and integration with mobile application management (MAM) services. Both iOS and Android can benefit from MDE across the management spectrum, from fully owned and managed by the organization to bring-your-own-device (BYOD) with very limited management.

So, let’s get on with things. As before, we will start with...

Onboarding mobile devices

Both iOS and iPadOS are supported and must be version 14 or later. For readability, this book simply refers to iOS, due to it being treated identically by Intune and MDE. Android support is limited to mobile phones, and they must be running version 6 or later.

This section focuses on onboarding devices that are fully Intune mobile device management (MDM)enrolled. This implies device-level control by the administrator so that you can deploy MDE en masse. Ideal for BYOD scenarios, you will learn about the app-level control option — mobile application management (MAM) — in the Working with mobile protection features section.

iOS

In this section, you will learn how to get Intune-enrolled iOS devices into MDE. We will do this with a capability referred to as zero-touch onboarding. This does not apply to devices without user affinity, such as shared iPads.

Zero-touch onboarding is achieved by deploying the MDE app and a VPN profile. Web...

Working with mobile protection features

Just as with other operating systems, onboarding Android and iOS is only the start. To suit the needs of your organization, you’ll want to make customizations and changes to MDE’s features. In this section, we look at how to do that across app protection policies, app configuration policies, and our tenant connectors.

Integration with app protection policies

Intune is both a MAM and MDM service. When you learned about automatically onboarding devices to MDE with Intune, you experienced its MDM capabilities – that is, the ability to control things at the device level, which we used to deploy applications and manage settings such as the VPN. However, MAM focuses on application-level control.

Using MAM, we can even extend MDE to devices that aren’t MDM enrolled. This is most commonly appropriate for BYOD scenarios, where we want a heightened level of protection if personal devices access corporate resources,...

Summary

The end of this chapter also marks the end of several chapters about onboarding and managing MDE devices. You are now aware of how to create a scalable approach to onboarding Intune-managed iOS and Android. You have also learned about the different capabilities each offers and the intricacies of configuring their deployment.

After deploying MDE to your iOS and Android devices, you can now configure their integration with app protection policy conditional launch, manage web protection for Microsoft-managed and custom web resources, manage app vulnerability assessment, and control privacy settings.

In the next chapter, we will venture beyond MDE and start to look at securing our on-premises and hybrid identities with Microsoft Defender for Identity.

Questions

Now that you understand the onboarding and management processes for MDE, test your knowledge with the following questions:

  1. True or false: Microsoft Defender Vulnerability Management integrates with MDE on iOS and Android to report vulnerable app?.
    1. True
    2. False
  2. What VPN server address should be used in a VPN configuration profile for iOS?
    1. 169.254.0.1
    2. 127.0.0.0
    3. 127.0.0.1
    4. 169.254.0.0
  3. All iOS devices in your environment are enrolled in Intune MDM. Some are in supervised mode and others are not. To protect them from phishing websites, you plan to onboard them to MDE. What is unique to these supervised devices compared to unsupervised devices regarding onboarding? Choose all that apply.
    1. Supervised devices support mobile application policies
    2. Supervised devices will route all device traffic through a remote proxy
    3. Supervised devices support zero-touch onboarding for shared devices
    4. Supervised devices do not require a local VPN to be configured
  4. Which permissions should you assign...

Further reading

There may be some specific scenarios regarding onboarding that this book has not discussed. You can find useful information on examples of these by looking at the following links:

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Mastering Microsoft 365 Defender
Published in: Jul 2023Publisher: PacktISBN-13: 9781803241708
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime

Authors (2)

author image
Ru Campbell

Ruairidh (Ru) Campbell is a Microsoft Security MVP and leads Microsoft consultancy at Threatscape. At Threatscape, Ru develops, delivers, and manages offerings and professional services for cybersecurity, compliance, identity, and management. In the cybersecurity community, Ru runs the Microsoft 365 Security & Compliance user group and his blog (campbell.scot), regularly speaks at other user groups and conferences, and contributes to well-known industry publications such as Practical 365. Ru holds 14 Microsoft certifications and a B.Sc. (Distinction) in computer networking from the University of the West of Scotland. Away from cybersecurity, he is a petrolhead who enjoys heavy metal and hiking around Scotland with his wife.
Read more about Ru Campbell

author image
Viktor Hedberg

Viktor Hedberg is a Microsoft Security MVP and senior consultant at Truesec. At Truesec, Viktor works with proactive security measures within the Microsoft sphere of technologies, by delivering workshops on best practices and by his deep technical expertise in these areas. In the cybersecurity community, Viktor runs his blogs at Truesec (Experts – viktor-hedberg). Alongside this, he is one of the hosts of the Swedish Windows Security user group, as well as a co-host of the Swedish podcast The Nerd Herd. He is a frequent speaker at both conferences and user groups around the world, focusing on matters of Microsoft Security. Viktor holds numerous Microsoft certifications, as well as being a Microsoft Certified Trainer. Away from cybersecurity, Viktor is a family man, spending most of his time with his wife and three kids, as well as enjoying football, both as a practitioner and as a fan. Heavy metal has been part of his life since his early teens.
Read more about Viktor Hedberg