Skip to content

Commit

Permalink
Merge pull request #8313 from Brenduns/mtd-image-fixes-all
Browse files Browse the repository at this point in the history
Image updates for Intune console Branding, and shrarper Graphics for …
  • Loading branch information
Angela Fleischmann authored Aug 25, 2022
2 parents c53a716 + c26cb8a commit 2ae62f8
Show file tree
Hide file tree
Showing 90 changed files with 86 additions and 140 deletions.
17 changes: 9 additions & 8 deletions memdocs/intune/protect/better-mobile-threat-defense-connector.md
Original file line number Diff line number Diff line change
Expand Up @@ -81,44 +81,45 @@ When malicious apps such as malware are detected on devices, you can block devic

Block when malicious apps are detected:

![Image that shows malicious apps detected](./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-blocked.png)
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::

Access is granted on remediation:

![Malicious apps detected access granted](./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-unblocked.png)
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-maliciousapps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::

### Control access based on threat to network

Detect threats to your network like **Man-in-the-middle** attacks, and protect access to Wi-Fi networks based on the device risk.

Block network access through Wi-Fi:

![Block network access through Wi-Fi](./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-blocked.png)
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::

Access is granted on remediation:

![Image that shows access granted on remediation](./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-unblocked.png)
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::

### Control access to SharePoint Online based on threat to network

Detect threats to your network like **Man-in-the-middle** attacks, and prevent synchronization of corporate files based on the device risk.

Block SharePoint Online when network threats are detected:

![Block SharePoint Online when network threats are detected](./media/better-mobile-threat-defense-connector/better-mobile-network-spo-blocked.png)
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::

Access granted on remediation:

![Access granted on remediation for Sharepoint example](./media/better-mobile-threat-defense-connector/better-mobile-network-spo-unblocked.png)
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::

### Control access on unenrolled devices based on threats from malicious apps

When the BETTER Mobile Threat Defense solution considers a device to be infected:
![App protection policy blocks due to detected malware](./media/better-mobile-threat-defense-connector/better-mobile-app-policy-block.png)

:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::

Access is granted on remediation:

![Access is granted on remediation for App protection policy](./media/better-mobile-threat-defense-connector/better-mobile-app-policy-remediated.png)
:::image type="content" source="./media/better-mobile-threat-defense-connector/better-mobile-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::

## Next steps

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -79,41 +79,35 @@ When malicious apps such as malware are detected on devices, you can block devic

*Block when malicious apps are detected:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of Malicious apps detected](./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-blocked.png)
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of access granted after remediation](./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-unblocked.png)
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::

### Control access based on threat to network

Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.

*Block network access through Wi-Fi:*

> [!div class="mx-imgBorder"]
> ![Block network access through Wi-Fi](./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-blocked.png)
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Access granted on remediation](./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-unblocked.png)
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated. ":::

### Control access to SharePoint Online based on threat to network

Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.

*Block SharePoint Online when network threats are detected:*

> [!div class="mx-imgBorder"]
> ![Block SharePoint Online when network threats are detected](./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-blocked.png)
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Access granted on remediation for SharePoint example](./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-unblocked.png)
:::image type="content" source="./media/blackberry-mobile-threat-defense-connector/blackberry-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::

## Next steps

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -73,52 +73,44 @@ When malicious apps such as malware are detected on devices, you can block devic

*Block when malicious apps are detected:*

> [!div class="mx-imgBorder"]
> ![Check Point MTD block when malicious apps are detected](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.PNG)
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.png" alt-text="Product flow for blocking access due to malicious apps.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Check Point MTD access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.PNG)
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.png" alt-text="Product flow for granting access when malicious apps are remediated.":::
### Control access based on threat to network

Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.

*Block network access through Wi-Fi:*

> [!div class="mx-imgBorder"]
> ![Check Point MTD block network access through Wi-Fi](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.PNG)
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Check Point MTD Wi-Fi access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.PNG)
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::

### Control access to SharePoint Online based on threat to network

Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.

*Block SharePoint Online when network threats are detected:*

> [!div class="mx-imgBorder"]
> ![Check Point MTD block SharePoint Online access](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.PNG)
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Check Point MTD SharePoint Online access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.PNG)
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::

### Control access on unenrolled devices based on threats from malicious apps

When the Check Point Harmony Mobile Threat Defense solution considers a device to be infected:
> [!div class="mx-imgBorder"]
> ![App protection policy blocks due to detected malware](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-block.png)

:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::

Access is granted on remediation:

> [!div class="mx-imgBorder"]
> ![Access is granted on remediation for App protection policy](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-remediated.png)
:::image type="content" source="./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::

## Next steps

Expand Down
25 changes: 9 additions & 16 deletions memdocs/intune/protect/lookout-mobile-threat-defense-connector.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,52 +84,45 @@ When malicious apps such as malware are detected on devices, you can block devic

*Block when malicious apps are detected:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of policy blocking access due to malicious apps](./media/lookout-mobile-threat-defense-connector/malicious-apps-blocked.png)
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Conceptual image showing access being granted to devices after remediation](./media/lookout-mobile-threat-defense-connector/malicious-apps-unblocked.png)
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::

### Control access based on threat to network

Detect threats to your network such as man-in-the-middle attacks and protect access to WiFi networks based on the device risk.

*Block network access through WiFi:*

> [!div class="mx-imgBorder"]
> ![Image showing the blocking of WiFi access based on network threats](./media/lookout-mobile-threat-defense-connector/network-wifi-blocked.png)
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of Conditional Access allowing access after remediation](./media/lookout-mobile-threat-defense-connector/network-wifi-unblocked.png)
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::

### Control access to SharePoint Online based on threat to network

Detect threats to your network such as Man-in-the-middle attacks, and prevent synchronization of corporate files based on the device risk.

*Block SharePoint Online when network threats are detected:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of blocking access to SharePoint Online](./media/lookout-mobile-threat-defense-connector/network-spo-blocked.png)
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of allowing access after the network threat is remediated](./media/lookout-mobile-threat-defense-connector/network-spo-unblocked.png)
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::

### Control access on unenrolled devices based on threats from malicious apps

When the Lookout Mobile Threat Defense solution considers a device to be infected:
> [!div class="mx-imgBorder"]
> ![App protection policy blocks due to detected malware](./media/lookout-mobile-threat-defense-connector/lookout-app-policy-block.png)

:::image type="content" source="./media/lookout-mobile-threat-defense-connector/lookout-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::

Access is granted on remediation:

> [!div class="mx-imgBorder"]
> ![Access is granted on remediation for App protection policy](./media/lookout-mobile-threat-defense-connector/lookout-app-policy-remediated.png)
:::image type="content" source="./media/lookout-mobile-threat-defense-connector/lookout-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::

## Next steps

Expand Down
24 changes: 8 additions & 16 deletions memdocs/intune/protect/mcafee-mobile-threat-defense-connector.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,53 +82,45 @@ When malicious apps such as malware are detected on devices, you can block devic

*Block when malicious apps are detected:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of Malicious apps detected](./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-blocked.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-blocked.png" alt-text="Product flow for blocking access due to malicious apps.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Conceptual image of access granted after remediation](./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-unblocked.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-malicious-apps-unblocked.png" alt-text="Product flow for granting access when malicious apps are remediated.":::

### Control access based on threat to network

Detect threats like **Man-in-the-middle** in network, and protect access to Wi-Fi networks based on the device risk.

*Block network access through Wi-Fi:*

> [!div class="mx-imgBorder"]
> ![Block network access through Wi-Fi](./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-blocked.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-blocked.png" alt-text="Product flow for blocking access through Wi-Fi due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Access granted on remediation](./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-unblocked.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-wifi-unblocked.png" alt-text=" Product flow for granting access through Wi-Fi after the alert is remediated.":::

### Control access to SharePoint Online based on threat to network

Detect threats like **Man-in-the-middle** in network, and prevent synchronization of corporate files based on the device risk.

*Block SharePoint Online when network threats are detected:*

> [!div class="mx-imgBorder"]
> ![Block SharePoint Online when network threats are detected](./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-blocked.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-blocked.png" alt-text="Product flow for blocking access to the organizations files due to an alert.":::

*Access granted on remediation:*

> [!div class="mx-imgBorder"]
> ![Access granted on remediation for SharePoint example](./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-unblocked.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-network-spo-unblocked.png" alt-text="Product flow for granting access to the organizations files after the alert is remediated.":::

### Control access on unenrolled devices based on threats from malicious apps

When the MVISION Mobile mobile threat defense solution considers a device to be infected:

> [!div class="mx-imgBorder"]
> ![App protection policy blocks due to detected malware](./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-block.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-block.png" alt-text="Product flow for App protection policies to block access due to malware.":::

Access is granted on remediation:

> [!div class="mx-imgBorder"]
> ![Access is granted on remediation for App protection policy](./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-remediated.png)
:::image type="content" source="./media/mcafee-mobile-threat-defense-connector/mcafee-mobile-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated.":::

## Next steps

Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Diff not rendered.
Loading

0 comments on commit 2ae62f8

Please sign in to comment.