Pete explains how to block or limit access to risky managed devices.
- [Instructor] The idea of shadow IT prevention…is to manage our risk and protect our corporate data.…Since we've talked about the importance of manage devices…I want to talk for a moment about how…Windows Defender Advanced Threat Protection…and Microsoft Intune can work together…in device compliance scenarios where we need…to limit access in high risk situations.…Now Windows Defender ATP can resolve security events…like the one I'll describe to you here.…So I'll log into my Windows Defender ATP portal…at securitycenter.windows.com…and I'm using my standard kinetECO account…and let's say someone sends a word attachment…with embedded malicious code to a user…in your org, the user opens the attachment,…enables the content an elevated privilege attack starts…and an attacker from a remote machine then…has admin rights to your victims devices…and they can begin moving laterally in your environment…across similar devices, so with Windows Defender ATP…in place we can stop some of those…active attacks in their tracks.…
Share this video
Embed this video
Video: Controlling access to noncompliant devices