Microsoft Defender ATP now detects jailbroken Apple devices
Platform has also simplified the onboarding experience for iOS users
Microsoft has added support for detecting jailbroken iOS devices to its Defender for Endpoint product, the enterprise version of its Windows 10 Defender protection offering.
The ability to sniff out jailbroken devices is part of a series of new breach protection features that Microsoft has added to the platform for both iOS and Android devices.
In a blog post announcing the new features, Microsoft’s Senior Program Manager Shravan Thota said that the platform can now detect and flag both managed and unmanaged jailbroken iOS devices.
- Protect your devices with these best antivirus software
- These are the best malware removal software on the market
- And here are the best endpoint protection tools
“The [jailbroken] device will then be considered as a high risk device and this risk score is shared with your app protection or device compliance policies so that you can block it from accessing corporate resources,” writes Thota.
The feature adds to the phishing protection feature the platform already extends to iOS devices.
Simplified on-boarding
Explaining the significance of the feature, Thota says Jailbroken iOS devices enable users to sideload apps from external sources besides the official App Store that can potentially be malicious. Furthermore, the jailbroken devices don’t receive critical iOS updates, which exposes them to vulnerabilities.
By flagging these jailbroken iOS devices, Microsoft Defender for Endpoint can help security teams curtail the access of these devices inside corporate networks.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Furthermore, Microsoft also announced that it has simplified the on-boarding experience for users of iOS devices.
Thota explains that the platform earlier relied on end users to provide VPN permissions to extend the anti-phishing protection capability to the device. In contrast, network admins will now be able to push fully configured VPN profiles to all enrolled devices, saving users the effort to manually define VPN related permissions.
- Here's our list of the best business smartphones available
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.