|
| 1 | +--- |
| 2 | +# required metadata |
| 3 | + |
| 4 | +title: Trend Micro Mobile connector with Intune |
| 5 | +titleSuffix: Intune on Azure |
| 6 | +description: Set up the Trend Micro Mobile Threat Defense connector with Intune. |
| 7 | +keywords: |
| 8 | +author: brenduns |
| 9 | +ms.author: brenduns |
| 10 | +manager: dougeby |
| 11 | +ms.date: 09/20/2022 |
| 12 | +ms.topic: how-to |
| 13 | +ms.service: microsoft-intune |
| 14 | +ms.subservice: protect |
| 15 | +ms.localizationpriority: high |
| 16 | +ms.technology: |
| 17 | +ms.assetid: |
| 18 | + |
| 19 | +# optional metadata |
| 20 | + |
| 21 | +#ROBOTS: |
| 22 | +#audience: |
| 23 | +#ms.devlang: |
| 24 | +ms.reviewer: aanavath |
| 25 | +#ms.suite: ems |
| 26 | +search.appverid: MET150 |
| 27 | +#ms.tgt_pltfrm: |
| 28 | +#ms.custom: |
| 29 | +ms.collection: M365-identity-device-management |
| 30 | +--- |
| 31 | + |
| 32 | +# Use Trend Micro Mobile Security with Intune |
| 33 | + |
| 34 | +Control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Trend Micro Mobile Security, a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Trend Micro Mobile Agent app. |
| 35 | + |
| 36 | +You can configure Conditional Access policies based on a Trend Micro risk assessment, enabled through Intune device compliance policies for enrolled devices. You can set up your policies to allow or block noncompliant devices from accessing corporate resources based on detected threats. |
| 37 | + |
| 38 | +For more information about how to integrate Trend Micro with Microsoft Intune, see [Integration with Microsoft Endpoint Manager (Intune)](http://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security/getting-started-with_003/integration-with-int.aspx) in the [Trend Micro Mobile Security documentation](https://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security.aspx). |
| 39 | + |
| 40 | +> [!NOTE] |
| 41 | +> This Mobile Threat Defense vendor is not supported for unenrolled devices. |
| 42 | +
|
| 43 | +## Supported platforms |
| 44 | + |
| 45 | +- **Android 7.0 and later** |
| 46 | +- **iOS 11.0 and later** |
| 47 | + |
| 48 | +## Prerequisites |
| 49 | + |
| 50 | +- Azure Active Directory Premium |
| 51 | +- Microsoft Intune subscription |
| 52 | +- Trend Micro account with administrative access to the Trend Micro Vision One console |
| 53 | + |
| 54 | +## How do Intune and the Trend Micro MTD connector help protect your company resources? |
| 55 | + |
| 56 | +The Trend Micro Mobile Agent app for Android and iOS/iPadOS captures file system, network stack, device, and application telemetry where available, then sends the telemetry data to the *Mobile Security* cloud service to assess the device's risk for mobile threats. |
| 57 | + |
| 58 | +- **Support for enrolled devices** - Intune device compliance policy includes a rule for MTD, which can use risk assessment information from Trend Micro. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources, such as Exchange Online and SharePoint Online. Users also receive guidance from the Trend Micro Mobile Agent app installed on their devices to resolve the issue and regain access to corporate resources. To support using Trend Micro with enrolled devices: |
| 59 | + |
| 60 | + - [Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md) |
| 61 | + - [Create a device compliance policy that supports MTD](../protect/mtd-device-compliance-policy-create.md) |
| 62 | + - [Enable the MTD connector in Intune](../protect/mtd-connector-enable.md) |
| 63 | + |
| 64 | +## Sample scenarios |
| 65 | + |
| 66 | +The following scenarios demonstrate the use of Trend Micro MTD when integrated with Intune: |
| 67 | + |
| 68 | +### Control access based on threats from malicious apps |
| 69 | + |
| 70 | +When malicious apps such as malware are detected on devices, you can block devices until the threat is resolved: |
| 71 | + |
| 72 | +- Connecting to corporate e-mail |
| 73 | +- Syncing corporate files with the OneDrive for Work app |
| 74 | +- Accessing company apps |
| 75 | + |
| 76 | +*Block when malicious apps are detected:* |
| 77 | + |
| 78 | +:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps."::: |
| 79 | + |
| 80 | +*Access granted on remediation:* |
| 81 | + |
| 82 | +:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated."::: |
| 83 | + |
| 84 | +### Control access based on threat to network |
| 85 | + |
| 86 | +Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk. |
| 87 | + |
| 88 | +*Block network access through Wi-Fi:* |
| 89 | + |
| 90 | +:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert."::: |
| 91 | + |
| 92 | +*Access granted on remediation:* |
| 93 | + |
| 94 | +:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated. "::: |
| 95 | + |
| 96 | +### Control access to SharePoint Online based on threat to network |
| 97 | + |
| 98 | +Detect threats like **Man-in-the-middle** in network and prevent synchronization of corporate files based on the device risk. |
| 99 | + |
| 100 | +*Block SharePoint Online when network threats are detected:* |
| 101 | + |
| 102 | +:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert."::: |
| 103 | + |
| 104 | +*Access granted on remediation:* |
| 105 | + |
| 106 | +:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated."::: |
| 107 | + |
| 108 | +## Next steps |
| 109 | + |
| 110 | +- [Integrate Trend Micro with Intune](../protect/trend-micro-mtd-connector-integration.md) |
| 111 | +- [Set up Trend Micro Mobile Agent app](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md) |
| 112 | +- [Create Trend Micro device compliance policy](../protect/mtd-device-compliance-policy-create.md) |
| 113 | +- [Enable Trend Micro Mobile Security MTD connector](../protect/mtd-connector-enable.md) |
0 commit comments