The blog post discusses the process of onboarding Intune managed iOS User Enrollment devices to Microsoft Defender for Endpoint. It details how the unified endpoint security platform offers protection, detection, investigation, and response capabilities, and the need to assign licenses to users.
Introducing Microsoft Defender for Endpoint on Intune Managed iOS Devices
Microsoft has recently announced the support of Microsoft Defender for Endpoint on Intune managed iOS/iPadOS devices. This new feature brings unified endpoint security to Apple devices, offering protection, detection, investigation, and response capabilities.
What’s New?
Microsoft Defender for Endpoint is now available for iOS devices managed through Intune. This development represents a significant step forward in the realm of device security.
Onboarding Process
To use Microsoft Defender for Endpoint on iOS devices, you need to onboard them to the service and assign licenses to users. This blog post will guide you through the onboarding process.
“Microsoft Defender for Endpoint is a unified endpoint security platform that provides protection, detection, investigation, and response capabilities.”
Major Updates
The major update here is the recently announced support of Microsoft Defender for Endpoint on Intune managed iOS/iPadOS devices. This update expands the security capabilities of Microsoft Defender for Endpoint to a wider range of devices.
Assigning Licenses
Before you can start using Microsoft Defender for Endpoint on your iOS devices, you need to assign licenses to users. This is a crucial step in the onboarding process.
“To use Microsoft Defender for Endpoint on iOS devices, you need to onboard them to the service and assign licenses to users.”
What’s Important to Know
It’s important to know that this new feature is designed to enhance the security of your iOS devices. By onboarding your devices to Microsoft Defender for Endpoint, you can take full advantage of its protection, detection, investigation, and response capabilities.
From the Core Infrastructure and Security Blog