Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft 365 Defender

You're reading from  Mastering Microsoft 365 Defender

Product type Book
Published in Jul 2023
Publisher Packt
ISBN-13 9781803241708
Pages 572 pages
Edition 1st Edition
Languages
Authors (2):
Ru Campbell Ru Campbell
Profile icon Ru Campbell
Viktor Hedberg Viktor Hedberg
Profile icon Viktor Hedberg
View More author details

Table of Contents (33) Chapters

Preface 1. Part 1: Cyber Threats and Microsoft 365 Defender
2. Chapter 1: Microsoft and Modern Cybersecurity Threats 3. Chapter 2: Microsoft 365 Defender: The Big Picture 4. Part 2: Microsoft Defender for Endpoint
5. Chapter 3: The Fundamentals of Microsoft Defender for Endpoint 6. Chapter 4: Onboarding Windows Clients and Servers 7. Chapter 5: Getting Started with Microsoft Defender Antivirus for Windows 8. Chapter 6: Advanced Microsoft Defender Antivirus for Windows 9. Chapter 7: Managing Attack Surface Reduction for Windows 10. Chapter 8: Managing Additional Capabilities for Windows 11. Chapter 9: Onboarding and Managing macOS 12. Chapter 10: Onboarding and Managing Linux Servers 13. Chapter 11: Onboarding and Managing iOS and Android 14. Part 3: Microsoft Defender for Identity
15. Chapter 12: Deploying Microsoft Defender for Identity 16. Chapter 13: Managing Defender for Identity 17. Part 4: Microsoft Defender for Office 365
18. Chapter 14: Deploying Exchange Online Protection 19. Chapter 15: Deploying Defender for Office 365 20. Part 5: Microsoft Defender for Cloud Apps
21. Chapter 16: Implementing and Managing Microsoft Defender for Cloud Apps 22. Part 6: Proactive Security and Incident Response
23. Chapter 17: Maintaining Security Hygiene and Threat Awareness 24. Chapter 18: Extended Detection and Response with Microsoft 365 Defender 25. Chapter 19: Advanced Hunting with KQL 26. Chapter 20: Microsoft Sentinel Integration 27. Chapter 21: Understanding Microsoft 365 Defender APIs 28. Part 7: Glossary and Answers
29. Chapter 22: Glossary
30. Chapter 23: Answers 31. Index 32. Other Books You May Enjoy

Onboarding and Managing iOS and Android

You’ve reached the last chapter on onboarding and managing MDE devices! Last but by no means least, in this chapter, we will describe how you can protect the most mobile of all devices: those running iOS and Android. For iOS and Android, MDE is described as a mobile threat defense (MTD) solution, so keep reading to learn about the following:

  • How to deploy MDE to iOS and Android with Microsoft Intune
  • How to configure MDE’s iOS and Android features

MDE for Android and iOS includes capabilities such as web protection, vulnerability reporting, unified alerting in the Microsoft 365 Defender portal, and integration with mobile application management (MAM) services. Both iOS and Android can benefit from MDE across the management spectrum, from fully owned and managed by the organization to bring-your-own-device (BYOD) with very limited management.

So, let’s get on with things. As before, we will start with...

Onboarding mobile devices

Both iOS and iPadOS are supported and must be version 14 or later. For readability, this book simply refers to iOS, due to it being treated identically by Intune and MDE. Android support is limited to mobile phones, and they must be running version 6 or later.

This section focuses on onboarding devices that are fully Intune mobile device management (MDM)enrolled. This implies device-level control by the administrator so that you can deploy MDE en masse. Ideal for BYOD scenarios, you will learn about the app-level control option — mobile application management (MAM) — in the Working with mobile protection features section.

iOS

In this section, you will learn how to get Intune-enrolled iOS devices into MDE. We will do this with a capability referred to as zero-touch onboarding. This does not apply to devices without user affinity, such as shared iPads.

Zero-touch onboarding is achieved by deploying the MDE app and a VPN profile. Web...

Working with mobile protection features

Just as with other operating systems, onboarding Android and iOS is only the start. To suit the needs of your organization, you’ll want to make customizations and changes to MDE’s features. In this section, we look at how to do that across app protection policies, app configuration policies, and our tenant connectors.

Integration with app protection policies

Intune is both a MAM and MDM service. When you learned about automatically onboarding devices to MDE with Intune, you experienced its MDM capabilities – that is, the ability to control things at the device level, which we used to deploy applications and manage settings such as the VPN. However, MAM focuses on application-level control.

Using MAM, we can even extend MDE to devices that aren’t MDM enrolled. This is most commonly appropriate for BYOD scenarios, where we want a heightened level of protection if personal devices access corporate resources,...

Summary

The end of this chapter also marks the end of several chapters about onboarding and managing MDE devices. You are now aware of how to create a scalable approach to onboarding Intune-managed iOS and Android. You have also learned about the different capabilities each offers and the intricacies of configuring their deployment.

After deploying MDE to your iOS and Android devices, you can now configure their integration with app protection policy conditional launch, manage web protection for Microsoft-managed and custom web resources, manage app vulnerability assessment, and control privacy settings.

In the next chapter, we will venture beyond MDE and start to look at securing our on-premises and hybrid identities with Microsoft Defender for Identity.

Questions

Now that you understand the onboarding and management processes for MDE, test your knowledge with the following questions:

  1. True or false: Microsoft Defender Vulnerability Management integrates with MDE on iOS and Android to report vulnerable app?.
    1. True
    2. False
  2. What VPN server address should be used in a VPN configuration profile for iOS?
    1. 169.254.0.1
    2. 127.0.0.0
    3. 127.0.0.1
    4. 169.254.0.0
  3. All iOS devices in your environment are enrolled in Intune MDM. Some are in supervised mode and others are not. To protect them from phishing websites, you plan to onboard them to MDE. What is unique to these supervised devices compared to unsupervised devices regarding onboarding? Choose all that apply.
    1. Supervised devices support mobile application policies
    2. Supervised devices will route all device traffic through a remote proxy
    3. Supervised devices support zero-touch onboarding for shared devices
    4. Supervised devices do not require a local VPN to be configured
  4. Which permissions should you assign...

Further reading

There may be some specific scenarios regarding onboarding that this book has not discussed. You can find useful information on examples of these by looking at the following links:

lock icon The rest of the chapter is locked
You have been reading a chapter from
Mastering Microsoft 365 Defender
Published in: Jul 2023 Publisher: Packt ISBN-13: 9781803241708
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}