Skip to content

Latest commit

 

History

History
88 lines (68 loc) · 4.27 KB

sophos-mtd-connector.md

File metadata and controls

88 lines (68 loc) · 4.27 KB
title titleSuffix description keywords author ms.author manager ms.date ms.topic ms.service ms.localizationpriority ms.technology ms.assetid search.appverid ms.collection
Set up Sophos Mobile integration with Intune
Intune on Azure
How to set up the Sophos Mobile solution with Microsoft Intune to control mobile device access to your corporate resources.
brenduns
brenduns
dougeby
04/30/2019
conceptual
microsoft-intune
high
MET150
M365-identity-device-management

Sophos Mobile Threat Defense connector with Intune

You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Sophos Mobile, a Mobile Threat Defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Sophos Mobile app. You can configure Conditional Access policies based on Sophos Mobile risk assessment enabled through Intune device compliance policies, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats.

How do Intune and Sophos Mobile help protect your company resources?

Sophos Mobile app for Android and iOS captures file system, network stack, device, and application telemetry where available, and then sends the telemetry data to the Sophos Mobile cloud service to assess the device's risk for mobile threats. The Intune device compliance policy includes a rule for Sophos Mobile Threat Defense, which is based on the Sophos Mobile risk assessment. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Sophos Mobile app installed in their devices to resolve the issue and regain access to corporate resources.

Sample scenarios

Here are some common scenarios.

Control access based on threats from malicious apps

When malicious apps such as malware are detected on devices, you can block devices from the following actions until the threat is resolved:

  • Connecting to corporate e-mail
  • Syncing corporate files with the OneDrive for Work app
  • Accessing company apps

Block when malicious apps are detected:

Conceptual image of Malicious apps detected

Access granted on remediation:
Conceptual image of access granted after remediation

Control access based on threat to network

Detect threats to your network like Man-in-the-middle attacks, and protect access to Wi-Fi networks based on the device risk.

Block network access through Wi-Fi:
Block network access through Wi-Fi

Access granted on remediation:
Access granted on remediation

Control access to SharePoint Online based on threat to network

Detect threats to your network like Man-in-the-middle attacks, and prevent synchronization of corporate files based on the device risk.

Block SharePoint Online when network threats are detected:
Block SharePoint Online when network threats are detected

Access granted on remediation:
Access granted on remediation for Sharepoint example

Supported platforms

  • Android 5.0 and later
  • iOS 11.0 and later

Prerequisites

  • Azure Active Directory Premium
  • Microsoft Intune subscription
  • Sophos Mobile Threat Defense subscription

For more information, see the Sophos website.

Next steps