Skip to content

Commit ec50184

Browse files
committed
Remaining files - with unused images removed.
1 parent 2fbd1f3 commit ec50184

10 files changed

Lines changed: 23 additions & 50 deletions

File tree

memdocs/intune/protect/lookout-mobile-threat-defense-connector.md

Lines changed: 9 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -84,52 +84,45 @@ When malicious apps such as malware are detected on devices, you can block devic
8484

8585
*Block when malicious apps are detected:*
8686

87-
> [!div class="mx-imgBorder"]
88-
> ![Conceptual image of policy blocking access due to malicious apps](./media/lookout-mobile-threat-defense-connector/malicious-apps-blocked.png)
87+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::
8988

9089
*Access granted on remediation:*
9190

92-
> [!div class="mx-imgBorder"]
93-
> ![Conceptual image showing access being granted to devices after remediation](./media/lookout-mobile-threat-defense-connector/malicious-apps-unblocked.png)
91+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
9492

9593
### Control access based on threat to network
9694

9795
Detect threats to your network such as man-in-the-middle attacks and protect access to WiFi networks based on the device risk.
9896

9997
*Block network access through WiFi:*
10098

101-
> [!div class="mx-imgBorder"]
102-
> ![Image showing the blocking of WiFi access based on network threats](./media/lookout-mobile-threat-defense-connector/network-wifi-blocked.png)
99+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
103100

104101
*Access granted on remediation:*
105102

106-
> [!div class="mx-imgBorder"]
107-
> ![Conceptual image of Conditional Access allowing access after remediation](./media/lookout-mobile-threat-defense-connector/network-wifi-unblocked.png)
103+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::
108104

109105
### Control access to SharePoint Online based on threat to network
110106

111107
Detect threats to your network such as Man-in-the-middle attacks, and prevent synchronization of corporate files based on the device risk.
112108

113109
*Block SharePoint Online when network threats are detected:*
114110

115-
> [!div class="mx-imgBorder"]
116-
> ![Conceptual image of blocking access to SharePoint Online](./media/lookout-mobile-threat-defense-connector/network-spo-blocked.png)
111+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
117112

118113
*Access granted on remediation:*
119114

120-
> [!div class="mx-imgBorder"]
121-
> ![Conceptual image of allowing access after the network threat is remediated](./media/lookout-mobile-threat-defense-connector/network-spo-unblocked.png)
115+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
122116

123117
### Control access on unenrolled devices based on threats from malicious apps
124118

125119
When the Lookout Mobile Threat Defense solution considers a device to be infected:
126-
> [!div class="mx-imgBorder"]
127-
> ![App protection policy blocks due to detected malware](./media/lookout-mobile-threat-defense-connector/lookout-app-policy-block.png)
120+
121+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/lookout-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::
128122

129123
Access is granted on remediation:
130124

131-
> [!div class="mx-imgBorder"]
132-
> ![Access is granted on remediation for App protection policy](./media/lookout-mobile-threat-defense-connector/lookout-app-policy-remediated.png)
125+
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/lookout-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::
133126

134127
## Next steps
135128

memdocs/intune/protect/mcafee-mobile-threat-defense-connector.md

Lines changed: 8 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -82,53 +82,45 @@ When malicious apps such as malware are detected on devices, you can block devic
8282

8383
*Block when malicious apps are detected:*
8484

85-
> [!div class="mx-imgBorder"]
86-
> ![Conceptual image of Malicious apps detected](./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-blocked.png)
85+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::
8786

8887
*Access granted on remediation:*
8988

90-
> [!div class="mx-imgBorder"]
91-
> ![Conceptual image of access granted after remediation](./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-unblocked.png)
89+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
9290

9391
### Control access based on threat to network
9492

9593
Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.
9694

9795
*Block network access through Wi-Fi:*
9896

99-
> [!div class="mx-imgBorder"]
100-
> ![Block network access through Wi-Fi](./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-blocked.png)
97+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
10198

10299
*Access granted on remediation:*
103100

104-
> [!div class="mx-imgBorder"]
105-
> ![Access granted on remediation](./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-unblocked.png)
101+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::
106102

107103
### Control access to SharePoint Online based on threat to network
108104

109105
Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.
110106

111107
*Block SharePoint Online when network threats are detected:*
112108

113-
> [!div class="mx-imgBorder"]
114-
> ![Block SharePoint Online when network threats are detected](./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-blocked.png)
109+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
115110

116111
*Access granted on remediation:*
117112

118-
> [!div class="mx-imgBorder"]
119-
> ![Access granted on remediation for SharePoint example](./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-unblocked.png)
113+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
120114

121115
### Control access on unenrolled devices based on threats from malicious apps
122116

123117
When the MVISION Mobile mobile threat defense solution considers a device to be infected:
124118

125-
> [!div class="mx-imgBorder"]
126-
> ![App protection policy blocks due to detected malware](./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-block.png)
119+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::
127120

128121
Access is granted on remediation:
129122

130-
> [!div class="mx-imgBorder"]
131-
> ![Access is granted on remediation for App protection policy](./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-remediated.png)
123+
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::
132124

133125
## Next steps
134126

-2.17 KB
Loading
Binary file not shown.
Binary file not shown.
Binary file not shown.

memdocs/intune/protect/pradeo-mobile-threat-defense-connector.md

Lines changed: 6 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -76,47 +76,35 @@ When malicious apps such as malware are detected on devices, you can block devic
7676

7777
*Block when malicious apps are detected:*
7878

79-
![Conceptual image of Malicious apps detected](./media/pradeo-mobile-threat-defense-connector/pradeo-maliciousapps-blocked.png)
79+
:::image type="content" source="./media/pradeo-mobile-threat-defense-connector/pradeo-maliciousapps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::
8080

8181
*Access granted on remediation:*
8282

83-
![Malicious apps detected access granted](./media/pradeo-mobile-threat-defense-connector/pradeo-maliciousapps-unblocked.png)
83+
:::image type="content" source="./media/pradeo-mobile-threat-defense-connector/pradeo-maliciousapps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
8484

8585
### Control access based on threat to network
8686

8787
Detect threats to your network like **Man-in-the-middle** attacks, and protect access to Wi-Fi networks based on the device risk.
8888

8989
*Block network access through Wi-Fi:*
9090

91-
![Block network access through Wi-Fi](./media/pradeo-mobile-threat-defense-connector/pradeo-network-wifi-blocked.png)
91+
:::image type="content" source="./media/pradeo-mobile-threat-defense-connector/pradeo-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::
9292

9393
*Access granted on remediation:*
9494

95-
![Conceptual image of Access granted on remediation](./media/pradeo-mobile-threat-defense-connector/pradeo-network-wifi-unblocked.png)
95+
:::image type="content" source="./media/pradeo-mobile-threat-defense-connector/pradeo-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::
9696

9797
### Control access to SharePoint Online based on threat to network
9898

9999
Detect threats to your network like **Man-in-the-middle** attacks, and prevent synchronization of corporate files based on the device risk.
100100

101101
*Block SharePoint Online when network threats are detected:*
102102

103-
![Block SharePoint Online when network threats are detected](./media/pradeo-mobile-threat-defense-connector/pradeo-network-spo-blocked.png)
103+
:::image type="content" source="./media/pradeo-mobile-threat-defense-connector/pradeo-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::
104104

105105
*Access granted on remediation:*
106106

107-
![Conceptual image of Access granted on remediation for Sharepoint example](./media/pradeo-mobile-threat-defense-connector/pradeo-network-spo-unblocked.png)
108-
109-
<!--
110-
### Control access on unenrolled devices based on threats from malicious apps
111-
112-
When the Pradeo Mobile Threat Defense solution considers a device to be infected:
113-
114-
![App protection policy blocks due to detected malware](./media/pradeo-mobile-threat-defense-connector/pradeo-app-policy-block.png)
115-
116-
Access is granted on remediation:
117-
118-
![Access is granted on remediation for App protection policy](./media/pradeo-mobile-threat-defense-connector/pradeo-app-policy-remediated.png)
119-
-->
107+
:::image type="content" source="./media/pradeo-mobile-threat-defense-connector/pradeo-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::
120108

121109
## Next steps
122110

0 commit comments

Comments
 (0)