Enable the Mobile Threat Defense connector in Intune

Note

This topic applies to all Mobile Threat Defense partners.

During Mobile Threat Defense (MTD) setup, you've configured a policy for classifying threats in your MTD partner console and you've created the device compliance policy in Intune. If you've already configured the Intune connector in the MTD partner console, you can now enable the MTD connection in Intune.

To enable the MTD connector

  1. Go to the Azure portal, and sign in with your Intune credentials. After you've successfully signed in, you see the Azure Dashboard.

  2. On the Azure Dashboard, choose All services from the left menu, then type Intune in the text box filter.

  3. Choose Intune; the Intune Dashboard opens.

  4. On the Intune Dashboard, choose Device compliance, then choose Mobile Threat Defense under the Setup section.

  5. On the Mobile Threat Defense pane, choose Add.

  6. Choose your MTD solution as the Mobile Threat Defense connector to setup from the drop-down list.

    MTD setup in Intune Azure portal

  7. Enable the toggle options according to your organization's requirements. Toggle options visible will vary depending on the MTD partner.

MTD toggle options

You can decide which MTD toggle options you need to enable according to your organization's requirements. Here are more details:

  • Connect Android 4.1+ devices to [MTD partner name] for Work MTD: When you enable this option, you can have Android 4.1+ devices reporting security risk back to Intune.

    • Mark as noncompliant if no data is received: If Intune doesn't receive data about a device on this platform from the MTD partner, consider the device noncompliant.
  • Connect iOS 8.0+ devices to [MTD partner name] for Work MTD: When you enable this option, you can have iOS 8.0+ devices reporting security risk back to Intune.

    • Mark as noncompliant if no data is received: If Intune doesn't receive data about a device on this platform from the MTD partner, consider the device noncompliant.
  • Enable App Sync for iOS Devices: Allows this Mobile Threat Defense partner to request metadata of iOS applications from Intune to use for threat analysis purposes.

  • Block unsupported OS versions: Block if the device is running an operating system less than the minimum supported version.

  • Number of days until partner is unresponsive: Number of days of inactivity before Intune considers the partner to be unresponsive because the connection is lost. Intune ignores compliance state for unresponsive MTD partners.

Important

You must add and assign the MTD apps before creating the device compliance and the conditional access policy rules. This ensures that the MTD app is ready and available for end users to install before they can get access to email or other company resources.

Tip

You can see the Connection status and the Last synchronized time between Intune and the MTD partner from the Mobile Threat Defense pane.