Rediger

Del via


Use BlackBerry Protect Mobile with Intune

You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by BlackBerry Protect Mobile (powered by Cylance AI), a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the BlackBerry Protect Mobile app.

You can configure Conditional Access policies based on a BlackBerry Protect risk assessment, enabled through Intune device compliance policies for enrolled devices. You can set up your policies to allow or block noncompliant devices from accessing corporate resources based on detected threats. For unenrolled devices, you can use app protection policies to enforce a block or selective wipe based on detected threats.

For more information about how to integrate BlackBerry UES with Microsoft Intune, see the BlackBerry UES documentation.

Supported platforms

  • Android 9.0 and later

  • iOS 13.0 and later

Prerequisites

  • Microsoft Entra ID P1

  • Microsoft Intune Plan 1 subscription

  • BlackBerry UES account with access to UES management console

How do Intune and the BlackBerry MTD connector help protect your company resources?

For Android and iOS/iPadOS, the CylancePROTECT app captures file system, network stack, device, and application telemetry where available, then sends the data to the Cylance AI Protection cloud service to assess the device's risk for mobile threats.

Sample scenarios

The following scenarios demonstrate the use of CylancePROTECT (BlackBerry) MTD when integrated with Intune:

Control access based on threats from malicious apps

When malicious apps such as malware are detected on devices, you can block devices until the threat is resolved:

  • Connecting to corporate e-mail

  • Syncing corporate files with the OneDrive for Work app

  • Accessing company apps

Block when malicious apps are detected:

Diagram of product flow for blocking access due to malicious apps.

Access granted on remediation:

Diagram of product flow for granting access when malicious apps are remediated.

Control access based on threat to network

Detect threats like Man-in-the-middle in network, and protect access to Wi-Fi networks based on the device risk.

Block network access through Wi-Fi:

Diagram of product flow for blocking access through Wi-Fi due to an alert.

Access granted on remediation:

 Diagram of product flow for granting access through Wi-Fi after the alert is remediated.

Control access to SharePoint Online based on threat to network

Detect threats like Man-in-the-middle in network, and prevent synchronization of corporate files based on the device risk.

Block SharePoint Online when network threats are detected:

Diagram of product flow for blocking access to the organizations files due to an alert.

Access granted on remediation:

Diagram of product flow for granting access to the organizations files after the alert is remediated.

Control access on unenrolled devices based on threats from malicious apps

When the BlackBerry Mobile Threat Defense solution considers a device to be infected:

Diagram of product flow for App protection policies to block access due to malware.

Access is granted on remediation:

 Diagram of product flow for App protection policies to grant access after malware is remediated.

Next steps