Skip to content

Commit 8559999

Browse files
authored
Merge pull request #1019 from denisebmsft/docs-editor/mdb-mtd-1721854298
Update mdb-mtd.md
2 parents 073a706 + b5383c6 commit 8559999

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-business/mdb-mtd.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of mobile threat defense in Defender for Business.
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 06/19/2024
7+
ms.date: 07/23/2024
88
ms.topic: conceptual
99
ms.service: defender-business
1010
ms.localizationpriority: medium
@@ -37,17 +37,17 @@ The following table summarizes the capabilities that are included in mobile thre
3737
| **Microsoft Defender Vulnerability Management**<br/>Vulnerability assessment of onboarded mobile devices. Includes vulnerability assessments for operating systems and apps for Android and iOS. <br/>See [Use your vulnerability management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md). | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | See note 1 (below) |
3838
| **Network Protection** <br/>Protection against rogue Wi-Fi related threats and rogue certificates. <br/>Network protection is turned on by default with [next-generation protection](mdb-next-generation-protection.md). <br/>As part of mobile threat defense, network protection also includes the ability to allow root certification authority and private root certification authority certificates in Intune. It also establishes trust with endpoints. | See note 2 (below) | See note 2 (below) |
3939
| **Unified alerting** <br/>Alerts from all platforms are listed in the unified Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). In the navigation pane, choose **Incidents**). <br/>See [View and manage incidents in Microsoft Defender for Business](mdb-view-manage-incidents.md) | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
40-
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
40+
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>- Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
4141
| **Privacy controls** <br/>Configure privacy in threat reports by controlling the data sent by Defender for Business. Privacy controls are available for admin and end users, and for both enrolled and unenrolled devices. | Requires Intune | Requires Intune |
4242
| **Integration with Microsoft Tunnel** <br/>Integration with [Microsoft Tunnel](/mem/intune/protect/microsoft-tunnel-overview), a VPN gateway solution for Intune. | Requires Intune VPN Tunnel <br/>(see note 3 below) | Requires Intune VPN Tunnel <br/>(see note 3 below) |
4343

4444
> [!NOTE]
45-
> 1. Intune is required for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
45+
> 1. Intune is used for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
4646
>
47-
> 2. Intune is required to configure or manage an allow list of root certification authority and private root certification authority certificates.
47+
> 1. Use Intune to configure or manage an allow list of root certification authority and private root certification authority certificates.
4848
>
4949
> 3. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
50-
>
50+
5151

5252
## How to get mobile threat defense capabilities
5353

0 commit comments

Comments
 (0)