What does these settings/connectors do in real time or what are use cases of those for mobile devices when we implement App protection policy via Intune?

Vinod Survase 4,736 Reputation points
2023-09-20T11:37:54.84+00:00

What does these settings/connectors do in real time or what are use cases of those for mobile devices when we implement App protection policy via Intune?

User's image

Microsoft Intune Security
Microsoft Intune Security
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
411 questions
Microsoft Intune Configuration
Microsoft Intune Configuration
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Configuration: The process of arranging or setting up computer systems, hardware, or software.
1,879 questions
Microsoft Intune Application management
Microsoft Intune Application management
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Application management: The process of creating, configuring, managing, and monitoring applications.
935 questions
Microsoft Intune Enrollment
Microsoft Intune Enrollment
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Enrollment: The process of requesting, receiving, and installing a certificate.
1,346 questions
Microsoft Intune
Microsoft Intune
A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.
4,963 questions
0 comments No comments
{count} votes

Accepted answer
  1. ZhoumingDuan-MSFT 12,410 Reputation points Microsoft Vendor
    2023-09-21T02:40:54.08+00:00

    @Vinod Survase, Thanks for posting in Q&A.

    According to your description, I know that you want to know what does these settings/connectors do when we implement App protection policy via Intune.

    Based on my researching, when you enabled support for Microsoft Defender for Endpoint in Intune, you established a service-to-service connection between Intune and Microsoft Defender for Endpoint. And then it enables collection of data about device risk levels. When you enable app protection policy evaluation, the app protection policies use the Device Threat Level rule will evaluate devices including data from this connector.

    Here is a link with more information about app protection evaluation:

    Configure Microsoft Defender for Endpoint in Microsoft Intune | Microsoft Learn

    Thanks for your kind understanding.

    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.