Posts

Showing posts from December, 2023

New Microsoft Defender app and bulk tagging for iOS\iPadOS using Intune

Image
  Credits: Microsoft In my recent blog about device tagging for macOS devices in Defender , I had mentioned about covering tagging feature for iOS\iPadOS platform as well. In this blog, I will cover the specifics for achieving this and my experience overall. The new Microsoft Defender apps Before we get into tagging, I want to touch base upon the recent change involving the renaming and feature offering of the MDE app both in Apple  and Google Play stores. The MDE app is now called Microsoft Defender: Security  in Apple store and is called Microsoft Defender: Antivirus in Google Play store, thus enabling All-in-one security functionality across both personal and work accounts.  Under the personal account, Microsoft Defender will function as a multidevice security app 'Microsoft Defender for individuals' allowing individuals and families to protect their data and devices by offering malware protection, timely security notifications, security tips, and recommendations. Microsof

Create and manage Microsoft Defender for Endpoint Device tags for macOS

Image
I recently worked on an implementation project for Microsoft Defender for Endpoint for macOS devices and while I will love to cover all the bells and whistles involving the setup, for now I will just focus on one particular aspect of the setup i.e. MDE device tags. What is an MDE Device Tag anyway? Tags are used primarily to label and classify devices in an environment. This helps in making the searching easy and streamlining the designating rules to specific groups or categories. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident in Defender. Here are some common uses of device tags - 1. Device Filter - One can be use a filter in the Device inventory view, or to group devices. 2. RBAC - You can create device groups in Defender using tags for the purpose of enforcing Role Based Access Control in the Defender Portal. 3. Device Grouping - You can create device groups in Def