Microsoft Defender for Endpoint now spots unfixed bugs on iOS and Android


Microsoft’s Defender for Endpoint support for detecting known security vulnerabilities in Android and iOS devices is now available.

The Threat and Vulnerability Management feature allows administrators to monitor known but unfixed bugs in Android and installed apps. The feature can spot bugs in iOS, but not yet in installed apps, Microsoft says in a blog post.

Microsoft Defender for Endpoint, formerly Defender Advanced Threat Protection, helps administrators protect company-issued managed mobile devices, as well as unmanaged devices.

Manage threats on Android and iOS

Mobile Threat and Vulnerability Management is part of Defender for Endpoint mobile threat defense (MTD), which can monitor for malware, jailbroken iPhones, and help implement level-conditioned access management to corporate resources. device security.

Vulnerability management capabilities are richer for Android devices, as they allow to assess the vulnerabilities of Android operating system versions of embedded devices, as well as applications installed on these devices.

For Android Enterprise with a work profile, only apps installed on the work profile are supported for trial.

For other BYOD (bring your own device) modes, application vulnerability assessment is not available. Vulnerability Assessment is available for iOS and iPadOS. App Vulnerability Assessment on iOS devices will be available in a later release, according to Microsoft.

Enhanced capabilities for unmanaged devices

This mobile feature leverages Defender for Endpoint’s vulnerability assessments for networking devices, such as Cisco IOS, IOS-XE, NX-OS, as well as Juniper’s JUNOS, HPE’s ArubaOS, and Palo Alto Networks’ PAN-OS .

Microsoft has also enhanced the capabilities of Defender for Endpoint to discover unmanaged mobile devices, PCs, and network devices that connect to the corporate network.

Defender for Endpoint MTD vulnerability assessments in Microsoft 365 Defender provide security teams with an inventory of devices. This provides an overview of each device’s name, risk level, exposure level, operating system, activity status, and integration status.

The Vulnerability Management Dashboard provides an overall exposure score for specific vulnerabilities and recommended actions.

Source: ZDNet.com





Source link -97