Skip to content

Commit 7601844

Browse files
authored
Merge pull request #6269 from Brenduns/blackberry-early-work
2112 - 7822722 - Blackberry MTD partner
2 parents 756fc70 + 3254c8a commit 7601844

13 files changed

Lines changed: 248 additions & 2 deletions
Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
# required metadata
3+
4+
title: Blackberry Protect Mobile connector for Intune
5+
titleSuffix: Intune on Azure
6+
description: Learn about integrating Intune with Blackberry Protect Mobile (powered by Cylance AI) to control mobile device access to your corporate resources.
7+
keywords:
8+
author: brenduns
9+
ms.author: brenduns
10+
manager: dougeby
11+
ms.date: 12/16/2021
12+
ms.topic: how-to
13+
ms.service: microsoft-intune
14+
ms.subservice: protect
15+
ms.localizationpriority: high
16+
ms.technology:
17+
ms.assetid:
18+
19+
# optional metadata
20+
21+
#ROBOTS:
22+
#audience:
23+
#ms.devlang:
24+
ms.reviewer: aanavath
25+
ms.suite: ems
26+
search.appverid: MET150
27+
#ms.tgt-pltfrm:
28+
ms.custom: intune-azure
29+
ms.collection: M365-identity-device-management
30+
---
31+
32+
# Use Blackberry Protect Mobile with Intune
33+
34+
Control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by BlackBerry Protect Mobile (powered by Cylance AI), a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Blackberry Protect Mobile app.
35+
36+
You can configure Conditional Access policies based on a BlackBerry Protect risk assessment, enabled through Intune device compliance policies for enrolled devices. You can set up your policies to allow or block noncompliant devices from accessing corporate resources based on detected threats. For unenrolled devices, you can use app protection policies to enforce a block or selective wipe based on detected threats.
37+
38+
For more information about BlackBerry UES, BlackBerry Protect, and Cylance AI, see [BlackBerry UES documentation](https://docs.blackberry.com/unified-endpoint-security/blackberry-ues).
39+
40+
## Supported platforms
41+
42+
- **Android 9.0 and later**
43+
44+
- **iOS 13.0 and later**
45+
46+
## Prerequisites
47+
48+
- Azure Active Directory Premium
49+
50+
- Microsoft Intune subscription
51+
52+
- BlackBerry UES account with access to UES management console
53+
54+
## How do Intune and the BlackBerry MTD connector help protect your company resources?
55+
56+
The BlackBerry Protect Mobile app for Android and iOS/iPadOS captures file system, network stack, device, and application telemetry where available, then sends the telemetry data to the Cylance AI Protection cloud service to assess the device's risk for mobile threats.
57+
58+
- **Support for enrolled devices** - Intune device compliance policy includes a rule for MTD, which can use risk assessment information from BlackBerry Protect. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources, such as Exchange Online and SharePoint Online. Users also receive guidance from the BlackBerry Protect app installed on their devices to resolve the issue and regain access to corporate resources. To support using BlackBerry Protect with enrolled devices:
59+
- [Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)
60+
- [Create a device compliance policy that supports MTD](../protect/mtd-device-compliance-policy-create.md)
61+
- [Enable the MTD connector in Intune](../protect/mtd-connector-enable.md)
62+
63+
- **Support for unenrolled devices** - Intune can use the risk assessment data from the BlackBerry Protect app on unenrolled devices when you use Intune app protection policies. Admins can use this combination to help protect corporate data within a Microsoft Intune protected app, Admins can also issue a block or selective wipe for corporate data on those unenrolled devices. To support using BlackBerry Protect with unenrolled devices:
64+
65+
- [Add the MTD app to unenrolled devices](../protect/mtd-add-apps-unenrolled-devices.md)
66+
- [Create a Mobile Threat Defense app protection policy](../protect/mtd-app-protection-policy.md)
67+
- [Enable the MTD connector in Intune for unenrolled devices](../protect/mtd-enable-unenrolled-devices.md)
68+
69+
## Sample scenarios
70+
71+
The following scenarios demonstrate the use of Blackberry UES when integrated with Intune:
72+
73+
### Control access based on threats from malicious apps
74+
75+
When malicious apps such as malware are detected on devices, you can block devices until the threat is resolved:
76+
77+
- Connecting to corporate e-mail
78+
79+
- Syncing corporate files with the OneDrive for Work app
80+
81+
- Accessing company apps
82+
83+
*Block when malicious apps are detected:*
84+
85+
> [!div class="mx-imgBorder"]
86+
> ![Conceptual image of Malicious apps detected](./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-blocked.png)
87+
88+
*Access granted on remediation:*
89+
90+
> [!div class="mx-imgBorder"]
91+
> ![Conceptual image of access granted after remediation](./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-unblocked.png)
92+
93+
### Control access based on threat to network
94+
95+
Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.
96+
97+
*Block network access through Wi-Fi:*
98+
99+
> [!div class="mx-imgBorder"]
100+
> ![Block network access through Wi-Fi](./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-blocked.png)
101+
102+
*Access granted on remediation:*
103+
104+
> [!div class="mx-imgBorder"]
105+
> ![Access granted on remediation](./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-unblocked.png)
106+
107+
### Control access to SharePoint Online based on threat to network
108+
109+
Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.
110+
111+
*Block SharePoint Online when network threats are detected:*
112+
113+
> [!div class="mx-imgBorder"]
114+
> ![Block SharePoint Online when network threats are detected](./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-blocked.png)
115+
116+
*Access granted on remediation:*
117+
118+
> [!div class="mx-imgBorder"]
119+
> ![Access granted on remediation for SharePoint example](./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-unblocked.png)
120+
121+
## Next steps
122+
123+
- [Integrate BlackBerry Protect Mobile with Intune](blackberry-mtd-connector-integration.md)
124+
125+
- [Set up BlackBerry Protect Mobile app](mtd-apps-ios-app-configuration-policy-add-assign.md)
126+
127+
- [Create BlackBerry Protect Mobile device compliance policy](mtd-device-compliance-policy-create.md)
128+
129+
- [Enable BlackBerry Protect Mobile MTD connector](mtd-connector-enable.md)
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
# required metadata
3+
4+
title: Connect BlackBerry Protect Mobile MTD connector to Microsoft Intune
5+
titleSuffix: Microsoft Intune
6+
description: How to set up the BlackBerry Protect Mobile MTD connector in Microsoft Intune to control mobile device access to your corporate resources.
7+
keywords:
8+
author: brenduns
9+
ms.author: brenduns
10+
manager: dougeby
11+
ms.date: 12/16/2021
12+
ms.topic: how-to
13+
ms.service: microsoft-intune
14+
ms.subservice: protect
15+
ms.localizationpriority: high
16+
ms.technology:
17+
ms.assetid: 363fd280-1865-4a61-855b-eb75c3c62753
18+
19+
# optional metadata
20+
21+
#ROBOTS:
22+
#audience:
23+
24+
ms.reviewer: aanavath
25+
ms.suite: ems
26+
search.appverid: MET150
27+
#ms.tgt_pltfrm:
28+
ms.custom: intune-azure
29+
ms.collection: M365-identity-device-management
30+
---
31+
32+
# Connect BlackBerry Protect Mobile MTD connector in Microsoft Intune
33+
34+
Connect the BlackBerry Protect Mobile MTD connector to mitigate device risk levels on Intune-managed devices. When connected, BlackBerry Protect Mobile (powered by Cylance AI) reports device risk levels to Intune, and Intune uses that information to enforce app configuration and risk assessment policies configured for each risk level. This article describes the requirements and steps to connect the MTD connector in your tenant.
35+
36+
For more information about BlackBerry Protect Mobile, the MTD connector supported by Microsoft Intune, see [Key features of BlackBerry Protect Mobile](https://docs.blackberry.com/unified-endpoint-security/blackberry-ues/overview/What-is-BlackBerry-Protect-Mobile/Key-features-of-BlackBerry-Protect-Mobile)(opens BlackBerry UES docs).
37+
38+
## Before you begin
39+
40+
The following subscriptions and accounts are required to integrate UES with Microsoft Intune.
41+
42+
- Microsoft Intune subscription
43+
44+
- Azure Active Directory (Azure AD) account with Global Administrator rights to grant the following permissions:
45+
46+
- Sign in and read user profile
47+
48+
- Access the directory as the signed-in user
49+
50+
- Read directory data
51+
52+
- Send device information to Intune
53+
54+
- Admin sign-in credentials to access the UES management console
55+
56+
### BlackBerry UES app authorization
57+
58+
By integrating BlackBerry UES with Intune, you authorize the following actions in your tenant:
59+
60+
- Allow BlackBerry UES to communicate information related to device health state back to Intune. To grant these permissions, you must use Global Administrator credentials. Granting permissions is a one-time operation. After the permissions are granted, the Global Administrator credentials aren't needed for day-to-day operation.
61+
62+
- Allow BlackBerry UES to sync Azure AD enrollment group membership to populate its device's database.
63+
64+
- Allow BlackBerry UES management console to use Azure AD Single Sign On (SSO).
65+
66+
- Allow BlackBerry Protect app to sign in using Azure AD SSO.
67+
68+
For more information about consent and Azure AD applications, see [Request the permissions from a directory admin](/azure/active-directory/develop/v2-permissions-and-consent#request-the-permissions-from-a-directory-admin).
69+
70+
71+
## Set up BlackBerry Protect Mobile MTD connector
72+
73+
1. Sign in to the [Microsoft Endpoint Management admin center](https://go.microsoft.com/fwlink/?linkid=2109431) with an Intune administrator account.
74+
2. Go to **All services** > **Tenant administration**.
75+
3. Select **Connectors and tokens**.
76+
4. Under **Cross platform**, select **Mobile Threat Defense**.
77+
5. Select **Add**.
78+
6. For **Select the Mobile Threat Defense connector to setup,** choose **BlackBerry Protect Mobile**.
79+
7. Select **Open the BlackBerry Protect Mobile admin console**. Keep the Microsoft Endpoint Manager tab open for later.
80+
8. Sign in with your Azure AD account, and then follow the instructions in [Integrating UES with Intune to respond to mobile threats](https://docs.blackberry.com/en/unified-endpoint-security/blackberry-ues) (opens BlackBerry UES docs) to complete setup.
81+
9. After you finish setup in the UES management console, return to your tab in the Microsoft Endpoint Manager admin center.
82+
10. Under **MDM Compliance Policy Settings**, turn on the following settings:
83+
* **Connect Android devices to BlackBerry Protect Mobile**
84+
* **Connect iOS devices to BlackBerry Protect Mobile**
85+
These settings allow BlackBerry Protect Mobile to evaluate the devices in your organization.
86+
11. Select **Create** to save your connector configurations.
87+
88+
## Next steps
89+
90+
- [Set up BlackBerry Protect app for enrolled devices](mtd-apps-ios-app-configuration-policy-add-assign.md)
91+
- [Set up BlackBerry Protect app for unenrolled devices](mtd-add-apps-unenrolled-devices.md)
137 KB
Loading
128 KB
Loading
203 KB
Loading
225 KB
Loading
135 KB
Loading
129 KB
Loading
130 KB
Loading
141 KB
Loading

0 commit comments

Comments
 (0)