Skip to content

Commit 2fbd1f3

Browse files
committed
Edits to image tags, to add boarder and update alt text.
1 parent f69e162 commit 2fbd1f3

7 files changed

Lines changed: 63 additions & 90 deletions

memdocs/intune/protect/better-mobile-threat-defense-connector.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -81,44 +81,45 @@ When malicious apps such as malware are detected on devices, you can block devic
8181

8282
Block when malicious apps are detected:
8383

84-
![Image that shows malicious apps detected](./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-blocked.png)
84+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::
8585

8686
Access is granted on remediation:
8787

88-
![Malicious apps detected access granted](./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-unblocked.png)
88+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
8989

9090
### Control access based on threat to network
9191

9292
Detect threats to your network like **Man-in-the-middle** attacks, and protect access to Wi-Fi networks based on the device risk.
9393

9494
Block network access through Wi-Fi:
9595

96-
![Block network access through Wi-Fi](./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-blocked.png)
96+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
9797

9898
Access is granted on remediation:
9999

100-
![Image that shows access granted on remediation](./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-unblocked.png)
100+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::
101101

102102
### Control access to SharePoint Online based on threat to network
103103

104104
Detect threats to your network like **Man-in-the-middle** attacks, and prevent synchronization of corporate files based on the device risk.
105105

106106
Block SharePoint Online when network threats are detected:
107107

108-
![Block SharePoint Online when network threats are detected](./media/better-mobile-threat-defense-connector/better-mobile-network-spo-blocked.png)
108+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
109109

110110
Access granted on remediation:
111111

112-
![Access granted on remediation for Sharepoint example](./media/better-mobile-threat-defense-connector/better-mobile-network-spo-unblocked.png)
112+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
113113

114114
### Control access on unenrolled devices based on threats from malicious apps
115115

116116
When the BETTER Mobile Threat Defense solution considers a device to be infected:
117-
![App protection policy blocks due to detected malware](./media/better-mobile-threat-defense-connector/better-mobile-app-policy-block.png)
117+
118+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::
118119

119120
Access is granted on remediation:
120121

121-
![Access is granted on remediation for App protection policy](./media/better-mobile-threat-defense-connector/better-mobile-app-policy-remediated.png)
122+
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::
122123

123124
## Next steps
124125

memdocs/intune/protect/blackberry-mobile-threat-defense-connector.md

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -79,41 +79,35 @@ When malicious apps such as malware are detected on devices, you can block devic
7979

8080
*Block when malicious apps are detected:*
8181

82-
> [!div class="mx-imgBorder"]
83-
> ![Conceptual image of Malicious apps detected](./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-blocked.png)
82+
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::
8483

8584
*Access granted on remediation:*
8685

87-
> [!div class="mx-imgBorder"]
88-
> ![Conceptual image of access granted after remediation](./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-unblocked.png)
86+
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
8987

9088
### Control access based on threat to network
9189

9290
Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.
9391

9492
*Block network access through Wi-Fi:*
9593

96-
> [!div class="mx-imgBorder"]
97-
> ![Block network access through Wi-Fi](./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-blocked.png)
94+
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
9895

9996
*Access granted on remediation:*
10097

101-
> [!div class="mx-imgBorder"]
102-
> ![Access granted on remediation](./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-unblocked.png)
98+
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated. ":::
10399

104100
### Control access to SharePoint Online based on threat to network
105101

106102
Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.
107103

108104
*Block SharePoint Online when network threats are detected:*
109105

110-
> [!div class="mx-imgBorder"]
111-
> ![Block SharePoint Online when network threats are detected](./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-blocked.png)
106+
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
112107

113108
*Access granted on remediation:*
114109

115-
> [!div class="mx-imgBorder"]
116-
> ![Access granted on remediation for SharePoint example](./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-unblocked.png)
110+
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
117111

118112
## Next steps
119113

memdocs/intune/protect/checkpoint-sandblast-mobile-mobile-threat-defense-connector.md

Lines changed: 9 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -73,52 +73,44 @@ When malicious apps such as malware are detected on devices, you can block devic
7373

7474
*Block when malicious apps are detected:*
7575

76-
> [!div class="mx-imgBorder"]
77-
> ![Check Point MTD block when malicious apps are detected](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.PNG)
76+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.png" alt-text="Product flow for blocking access due to malicious apps.":::
7877

7978
*Access granted on remediation:*
8079

81-
> [!div class="mx-imgBorder"]
82-
> ![Check Point MTD access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.PNG)
83-
80+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
8481
### Control access based on threat to network
8582

8683
Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.
8784

8885
*Block network access through Wi-Fi:*
8986

90-
> [!div class="mx-imgBorder"]
91-
> ![Check Point MTD block network access through Wi-Fi](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.PNG)
87+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
9288

9389
*Access granted on remediation:*
9490

95-
> [!div class="mx-imgBorder"]
96-
> ![Check Point MTD Wi-Fi access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.PNG)
91+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::
9792

9893
### Control access to SharePoint Online based on threat to network
9994

10095
Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.
10196

10297
*Block SharePoint Online when network threats are detected:*
10398

104-
> [!div class="mx-imgBorder"]
105-
> ![Check Point MTD block SharePoint Online access](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.PNG)
99+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
106100

107101
*Access granted on remediation:*
108102

109-
> [!div class="mx-imgBorder"]
110-
> ![Check Point MTD SharePoint Online access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.PNG)
103+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
111104

112105
### Control access on unenrolled devices based on threats from malicious apps
113106

114107
When the Check Point Harmony Mobile Threat Defense solution considers a device to be infected:
115-
> [!div class="mx-imgBorder"]
116-
> ![App protection policy blocks due to detected malware](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-block.png)
108+
109+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::
117110

118111
Access is granted on remediation:
119112

120-
> [!div class="mx-imgBorder"]
121-
> ![Access is granted on remediation for App protection policy](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-remediated.png)
113+
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::
122114

123115
## Next steps
124116

memdocs/intune/protect/skycure-mobile-threat-defense-connector.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -92,44 +92,44 @@ When malicious apps such as malware are detected on devices, you can block devic
9292

9393
*Block when malicious apps are detected:*
9494

95-
![Conceptual image of Malicious apps detected](./media/skycure-mobile-threat-defense-connector/symantec-arch-1.png)
95+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-arch-1.png" alt-text="Product flow for blocking access due to malicious apps.":::
9696

9797
*Access granted on remediation:*
9898

99-
![Image of Access granted on remediation after malicious apps detected](./media/skycure-mobile-threat-defense-connector/symantec-arch-2.png)
99+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-arch-2.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
100100

101101
### Control access based on threat to network
102102

103103
Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.
104104

105105
*Block network access through Wi-Fi:*
106106

107-
![Block network access through Wi-Fi](./media/skycure-mobile-threat-defense-connector/symantec-arch-3.png)
107+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-arch-3.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
108108

109109
*Access granted on remediation:*
110110

111-
![Access granted on remediation](./media/skycure-mobile-threat-defense-connector/symantec-arch-4.png)
112-
111+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-arch-4.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated. ":::
113112
### Control access to SharePoint Online based on threat to network
114113

115114
Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.
116115

117116
*Block SharePoint Online when network threats are detected:*
118117

119-
![Block SharePoint Online when network threats are detected](./media/skycure-mobile-threat-defense-connector/symantec-arch-5.png)
118+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-arch-5.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
120119

121120
*Access granted on remediation:*
122121

123-
![Access granted on remediation for Sharepoint example](./media/skycure-mobile-threat-defense-connector/symantec-arch-6.png)
122+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-arch-6.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
124123

125124
### Control access on unenrolled devices based on threats from malicious apps
126125

127126
When the Symantec Endpoint Protection Mobile Threat Defense solution considers a device to be infected:
128-
![App protection policy blocks due to detected malware](./media/skycure-mobile-threat-defense-connector/symantec-app-policy-block.png)
127+
128+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::
129129

130130
Access is granted on remediation:
131131

132-
![Access is granted on remediation for App protection policy](./media/skycure-mobile-threat-defense-connector/symantec-app-policy-remediated.png)
132+
:::image type="content" source="./media/skycure-mobile-threat-defense-connector/symantec-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::
133133

134134
## Next steps
135135

memdocs/intune/protect/sophos-mtd-connector.md

Lines changed: 13 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -70,44 +70,38 @@ When malicious apps such as malware are detected on devices, you can block devic
7070

7171
*Block when malicious apps are detected*:
7272

73-
![Conceptual image of Malicious apps detected](./media/sophos-mtd-connector/sophos-malicious-apps-blocked.png)
73+
:::image type="content" source="./media/sophos-mtd-connector/sophos-malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::
7474

7575
*Access granted on remediation*:
76-
![Conceptual image of access granted after remediation](./media/sophos-mtd-connector/sophos-malicious-apps-unblocked.png)
76+
77+
:::image type="content" source="./media/sophos-mtd-connector/sophos-malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
7778

7879
### Control access based on threat to network
7980

8081
Detect threats to your network like Man-in-the-middle attacks, and protect access to Wi-Fi networks based on the device risk.
8182

8283
*Block network access through Wi-Fi*:
83-
![Block network access through Wi-Fi](./media/sophos-mtd-connector/sophos-network-wifi-blocked.png)
8484

85-
*Access granted on remediation*:
86-
![Access granted on remediation](./media/sophos-mtd-connector/sophos-network-wifi-unblocked.png)
85+
:::image type="content" source="./media/sophos-mtd-connector/sophos-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
8786

88-
### Control access to SharePoint Online based on threat to network
87+
![Block network access through Wi-Fi]()
8988

90-
Detect threats to your network like Man-in-the-middle attacks, and prevent synchronization of corporate files based on the device risk.
89+
*Access granted on remediation*:
9190

92-
*Block SharePoint Online when network threats are detected*:
91+
:::image type="content" source="./media/sophos-mtd-connector/sophos-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated. ":::
9392

94-
![Block SharePoint Online when network threats are detected](./media/sophos-mtd-connector/sophos-network-spo-blocked.png)
9593

96-
*Access granted on remediation*:
97-
98-
![Access granted on remediation for Sharepoint example](./media/sophos-mtd-connector/sophos-network-spo-unblocked.png)
94+
### Control access to SharePoint Online based on threat to network
9995

100-
<!--
101-
### Control access on unenrolled devices based on threats from malicious apps
96+
Detect threats to your network like Man-in-the-middle attacks, and prevent synchronization of corporate files based on the device risk.
10297

103-
When the Sophos Mobile Threat Defense solution considers a device to be infected:
98+
*Block SharePoint Online when network threats are detected*:
10499

105-
![App protection policy blocks due to detected malware](./media/sophos-mtd-connector/sophos-mobile-app-policy-block.png)
100+
:::image type="content" source="./media/sophos-mtd-connector/sophos-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
106101

107-
Access is granted on remediation:
102+
*Access granted on remediation*:
108103

109-
![Access is granted on remediation for App protection policy](./media/sophos-mtd-connector/sophos-mobile-app-policy-remediated.png)
110-
-->
104+
:::image type="content" source="./media/sophos-mtd-connector/sophos-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
111105

112106
## Next steps
113107

0 commit comments

Comments
 (0)