Mobile Network Protection in Microsoft Defender for Endpoint on Android & iOS now in Public Preview

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Tech Community.

The way organizations conduct business has changed dramatically over the past few years, with employees working from home or following a hybrid work model. This shift has made users more reliant on network connections for both personal and work commitments. This increased need for connecting to digital networks, while often convenient, has made users more prone to security risks.  Noting this trend, organizations are realizing the critical role that securing your network plays in managing the day-to-day operations and resilience of their business, especially when it comes to keeping their employees and data safe.

 

As the world continues to make sense of the digital transformation, networks are becoming increasingly complex and provide a unique avenue for nefarious activity if left unattended. To combat this, Microsoft offers a mobile network protection feature in Defender for Endpoint that helps organizations identify, assess, and remediate endpoint weaknesses with the help of robust threat intelligence.

 

We are delighted to announce that users can now benefit from this new feature on both Android and iOS platforms with Microsoft Defender for Endpoint.

This feature will provide:

  • Protection against rogue Wi-Fi-related threats and rogue hardware like pineapple devices
  • Notifications when a Wi-Fi-related threat is detected
  • An in-app guided experience to connect to secure networks
  • Remediation options to change networks when a network is determined as unsecure or suspicious
  • A medium priority alert when a suspicious network is detected, and an informational alert when an open network is detected.

How to configure mobile network protection:


This feature provides flexibility for admins on Android by offering the following admin controls:

  • Enable and disable the Network Protection feature
  • Trust flow for allow-listing certificates on Android

How to test out the mobile network protection:

iOS

  • Upon successful login, users need to grant pre-existing onboarding permissions storage and allow notification permission to enable for Endpoint to notify them when a threat is found.
  • Upon successful onboarding, users will see a new card and a tab labeled “Network Protection”. If Wi-Fi is OFF – In-app messaging will guide users to turn on the Wi-Fi from within the app. Once the Wi-Fi has been enabled, the Wi-Fi networks are scanned for threats and the scan results determine the device state

Note: for more information on the iOS configuration, please reference our documentation.

Android:

  • Users need to enable location permissions; this enables Defender for Endpoint to scan their networks and alert the users when there are WIFI-related threats. If the location permissions are denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
  • Once the app is installed on the device, users will see a new card and a tab labeled “Network Protection”.
  • If Wi-Fi is OFF – In-app messaging will guide users to turn on the Wi-Fi from within the app. Once the Wi-Fi has been enabled, the Wi-Fi networks are scanned for threats and the scan results determine the device state.

Note: for more information on the Android configuration, please reference our documentation.

 

Keep in mind

  • Microsoft strongly recommends enabling location permissions on Android devices. This setting can help protect against network-related threats.
  • Microsoft does not collect location information from users.

 

We want to hear your feedback! Tell us about your experience using Microsoft Defender for Endpoint’s latest Mobile Network Protection feature on your iOS and Android devices. If you have not started protecting your network connections, try it today, and let us know what you think.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.