To support using Lookout for work with enrolled devices: Users also receive guidance from the Lookout for work app installed in their devices to resolve the issue and regain access to corporate resources. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. Support for enrolled devices - Intune device compliance policy includes a rule for Mobile Threat Defense (MTD), which can use risk assessment information from Lookout for work. You can change risk level classifications for threats in the Lookout console to suit your requirements. This app captures file system, network stack, and device and application telemetry where available, then sends it to the Lookout cloud service to assess the device's risk for mobile threats. Lookout's mobile app, Lookout for work, is installed and run on mobile devices. How do Intune and Lookout Mobile Endpoint Security help protect company resources? For unenrolled devices, you can use app protection policies to enforce a block or selective wipe based on detected threats. You can configure Conditional Access policies based on Lookout's risk assessment enabled through Intune compliance policies for enrolled devices, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats. Risk is assessed based on telemetry collected from devices by the Lookout service including: You can control mobile device access to corporate resources based on risk assessment conducted by Lookout, a Mobile Threat Defense solution integrated with Microsoft Intune.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |