![]() Users also receive guidance from the Harmony Mobile Protect app installed in their devices to resolve the issue and regain access to corporate resources. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. The Intune device compliance policy includes a rule for Check Point Harmony Mobile Threat Defense, which is based on the Check Point Harmony risk assessment. How do Intune and Check Point Harmony Mobile help protect your company resources?Ĭheck Point Harmony Mobile app for Android and iOS/iPadOS captures file system, network stack, device and application telemetry where available, then sends the telemetry data to the Check Point Harmony cloud service to assess the device's risk for mobile threats. Supported platformsĬheck Point Harmony Mobile Threat Defense subscription ![]() ![]() This Mobile Threat Defense vendor is not supported for unenrolled devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |