Skip to content

Commit 5242a11

Browse files
authored
Merge pull request #8408 from Brenduns/11017779-mtd-trend-micro
2209 - 11017779 - Core docs for Trend Micro as new MTD partner.
2 parents d959301 + a3deae8 commit 5242a11

10 files changed

Lines changed: 203 additions & 0 deletions
149 KB
Loading
134 KB
Loading
143 KB
Loading
135 KB
Loading
139 KB
Loading
154 KB
Loading

memdocs/intune/protect/mobile-threat-defense.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,5 +109,6 @@ Learn how to protect access to company resource based on device, network, and ap
109109
- [Pradeo](pradeo-mobile-threat-defense-connector.md)
110110
- [Sophos Mobile](sophos-mtd-connector.md)
111111
- [Symantec Endpoint Protection Mobile](skycure-mobile-threat-defense-connector.md)
112+
- [Trend Micro Mobile Security](trend-micro-mobile-threat-defense-connector.md)
112113
- [Wandera Mobile Threat Defense](wandera-mtd-connector.md)
113114
- [Zimperium](zimperium-mobile-threat-defense-connector.md)

memdocs/intune/protect/mtd-apps-ios-app-configuration-policy-add-assign.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,10 @@ Use the same Azure AD account previously configured in the [Symantec Endpoint Pr
157157

158158
Create the iOS app configuration policy as described in the [using iOS app configuration policy](../apps/app-configuration-policies-use-ios.md) article. For more information, see [Sophos Intercept X for Mobile iOS - Available managed settings](https://community.sophos.com/kb/133963) in the Sophos knowledge base.
159159

160+
### Trend Micro Mobile Security app configuration policy
161+
162+
See the instructions for [using Microsoft Intune app configuration policies for iOS](../apps/app-configuration-policies-use-ios.md) to add the Trend Micro Mobile Security app configuration policy.
163+
160164
### Wandera app configuration policy
161165

162166
> [!NOTE]
Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
---
2+
# required metadata
3+
4+
title: Trend Micro Mobile connector with Intune
5+
titleSuffix: Intune on Azure
6+
description: Set up the Trend Micro Mobile Threat Defense connector with Intune.
7+
keywords:
8+
author: brenduns
9+
ms.author: brenduns
10+
manager: dougeby
11+
ms.date: 09/20/2022
12+
ms.topic: how-to
13+
ms.service: microsoft-intune
14+
ms.subservice: protect
15+
ms.localizationpriority: high
16+
ms.technology:
17+
ms.assetid:
18+
19+
# optional metadata
20+
21+
#ROBOTS:
22+
#audience:
23+
#ms.devlang:
24+
ms.reviewer: aanavath
25+
#ms.suite: ems
26+
search.appverid: MET150
27+
#ms.tgt_pltfrm:
28+
#ms.custom:
29+
ms.collection: M365-identity-device-management
30+
---
31+
32+
# Use Trend Micro Mobile Security with Intune
33+
34+
Control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Trend Micro Mobile Security, a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Trend Micro Mobile Agent app.
35+
36+
You can configure Conditional Access policies based on a Trend Micro risk assessment, enabled through Intune device compliance policies for enrolled devices. You can set up your policies to allow or block noncompliant devices from accessing corporate resources based on detected threats.
37+
38+
For more information about how to integrate Trend Micro with Microsoft Intune, see [Integration with Microsoft Endpoint Manager (Intune)](http://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security/getting-started-with_003/integration-with-int.aspx) in the [Trend Micro Mobile Security documentation](https://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security.aspx).
39+
40+
> [!NOTE]
41+
> This Mobile Threat Defense vendor is not supported for unenrolled devices.
42+
43+
## Supported platforms
44+
45+
- **Android 7.0 and later**
46+
- **iOS 11.0 and later**
47+
48+
## Prerequisites
49+
50+
- Azure Active Directory Premium
51+
- Microsoft Intune subscription
52+
- Trend Micro account with administrative access to the Trend Micro Vision One console
53+
54+
## How do Intune and the Trend Micro MTD connector help protect your company resources?
55+
56+
The Trend Micro Mobile Agent app for Android and iOS/iPadOS captures file system, network stack, device, and application telemetry where available, then sends the telemetry data to the *Mobile Security* cloud service to assess the device's risk for mobile threats.
57+
58+
- **Support for enrolled devices** - Intune device compliance policy includes a rule for MTD, which can use risk assessment information from Trend Micro. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources, such as Exchange Online and SharePoint Online. Users also receive guidance from the Trend Micro Mobile Agent app installed on their devices to resolve the issue and regain access to corporate resources. To support using Trend Micro with enrolled devices:
59+
60+
- [Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)
61+
- [Create a device compliance policy that supports MTD](../protect/mtd-device-compliance-policy-create.md)
62+
- [Enable the MTD connector in Intune](../protect/mtd-connector-enable.md)
63+
64+
## Sample scenarios
65+
66+
The following scenarios demonstrate the use of Trend Micro MTD when integrated with Intune:
67+
68+
### Control access based on threats from malicious apps
69+
70+
When malicious apps such as malware are detected on devices, you can block devices until the threat is resolved:
71+
72+
- Connecting to corporate e-mail
73+
- Syncing corporate files with the OneDrive for Work app
74+
- Accessing company apps
75+
76+
*Block when malicious apps are detected:*
77+
78+
:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::
79+
80+
*Access granted on remediation:*
81+
82+
:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
83+
84+
### Control access based on threat to network
85+
86+
Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.
87+
88+
*Block network access through Wi-Fi:*
89+
90+
:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
91+
92+
*Access granted on remediation:*
93+
94+
:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated. ":::
95+
96+
### Control access to SharePoint Online based on threat to network
97+
98+
Detect threats like **Man-in-the-middle** in network and prevent synchronization of corporate files based on the device risk.
99+
100+
*Block SharePoint Online when network threats are detected:*
101+
102+
:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
103+
104+
*Access granted on remediation:*
105+
106+
:::image type="content" source="./media/trend-micro-mobile-threat-defense-connector/trend-micro-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
107+
108+
## Next steps
109+
110+
- [Integrate Trend Micro with Intune](../protect/trend-micro-mtd-connector-integration.md)
111+
- [Set up Trend Micro Mobile Agent app](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)
112+
- [Create Trend Micro device compliance policy](../protect/mtd-device-compliance-policy-create.md)
113+
- [Enable Trend Micro Mobile Security MTD connector](../protect/mtd-connector-enable.md)
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
# required metadata
3+
4+
title: Set up Trend Micro MTD integration with Intune
5+
titleSuffix: Intune on Azure
6+
description: "Trend Micro Mobile Security connector integration with Intune"
7+
keywords:
8+
author: brenduns
9+
ms.author: brenduns
10+
manager: dougeby
11+
ms.date: 09/20/2022
12+
ms.topic: how-to
13+
ms.service: microsoft-intune
14+
ms.subservice: protect
15+
ms.localizationpriority: high
16+
ms.technology:
17+
ms.assetid:
18+
19+
# optional metadata
20+
21+
#ROBOTS:
22+
#audience:
23+
24+
ms.reviewer: aanavath
25+
#ms.suite: ems
26+
search.appverid: MET150
27+
#ms.tgt_pltfrm:
28+
#ms.custom:
29+
ms.collection: M365-identity-device-management
30+
---
31+
32+
# Connect Trend Micro Mobile Security with Microsoft Intune
33+
34+
Connect the Trend Micro MTD connector to monitor and mitigate device risk levels on Intune-managed devices. Trend Micro Mobile Security works by reporting device risk levels to Microsoft Intune. Intune then uses that information to enforce the appropriate app configuration and risk assessment policies. For more information about Trend Micro Mobile Security, see [Getting Started with Mobile Security](https://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security/getting-started-with_003.aspx) in the Trend Micro documentation.
35+
36+
This article describes the requirements and steps to connect the MTD connector in your tenant.
37+
38+
## Before you begin
39+
40+
The following subscriptions and accounts are required to integrate Trend Micro Mobile Security with Microsoft Intune.
41+
42+
- Microsoft Intune subscription
43+
- Azure Active Directory (Azure AD) account with Global Administrator rights to grant the following permissions:
44+
- Sign in and read user profile
45+
- Access the directory as the signed-in user
46+
- Read directory data
47+
- Send device information to Intune
48+
- Admin sign-in credentials to access the Trend Micro Vision One management console
49+
50+
### App authorization
51+
52+
The following authorization process happens when you connect the Trend Micro Mobile Security MTD connector:
53+
54+
- Allow Trend Micro Mobile Security to communicate information related to device health state back to Intune. To grant these permissions, you must use Global Administrator credentials. Granting permissions is a one-time operation. After the permissions are granted, the Global Administrator credentials aren't needed for day-to-day operation.
55+
- Allow Trend Micro Mobile Security to sync Azure AD enrollment group membership to populate its device's database.
56+
- Allow Trend Micro Vision One management console to use Azure AD Single Sign On (SSO).
57+
- Allow Trend Micro Mobile Agent app to sign in using Azure AD SSO.
58+
59+
For more information about consent and Azure AD applications, see [Request the permissions from a directory admin](/azure/active-directory/develop/v2-permissions-and-consent#request-the-permissions-from-a-directory-admin).
60+
61+
## Set up Trend Micro MTD connector
62+
63+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) with an Intune administrator account.
64+
2. Go to **All services** > **Tenant administration**.
65+
3. Select **Connectors and tokens**.
66+
4. Under **Cross platform**, select **Mobile Threat Defense**.
67+
5. Select **Add**.
68+
6. For **Select the Mobile Threat Defense connector to setup**, choose **Trend Micro**.
69+
7. Select Open the Trend Micro admin console. Keep the Microsoft Endpoint Manager tab open for later.
70+
8. Sign in with your Azure AD account, and then follow the instructions in [Setting up Intune Integration](https://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security/getting-started-with_003/integration-with-int/setting-up-intune-in.aspx) (opens Trend Micro Mobile Security documentation) to complete setup.
71+
9. After you finish setup in the Trend Micro Vision One console, return to your tab in the Microsoft Endpoint Manager admin center.
72+
10. Under **Compliance policy evaluation**, turn on the following settings:
73+
74+
- **Connect Android devices version 7.0 and above to Trend Micro**
75+
- **Connect iOS/iPadOS devices version 11.0 and above to Trend Micro**
76+
77+
These settings allow Trend Micro Mobile Security to evaluate the devices in your organization.
78+
79+
Configure additional settings to meet your organization’s requirements.
80+
81+
11. Select **Create** to save your connector configurations.
82+
83+
## Next steps
84+
85+
- [Set up Trend Micro Mobile Agent app for enrolled devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)

0 commit comments

Comments
 (0)