![]() ![]() Not all issues that Defender for Endpoint flags for remediation support remediation through the creation of a security task for Intune.They're based on Microsoft Defender for Endpoint configurations and scan details. Vulnerabilities that are discovered aren't based on configurations from Intune. ![]() How integration worksĪfter you connect Intune to Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from managed devices. Threat & Vulnerability Management is part of Microsoft Defender for Endpoint. This integration brings a risk-based approach to the discovery and prioritization of vulnerabilities that can improve remediation response time across your environment. When you integrate Intune with Microsoft Defender for Endpoint, you can take advantage of Defender for Endpoint's threat and vulnerability management and use Intune to remediate endpoint weakness identified by Defender's vulnerability management capability.
0 Comments
Leave a Reply. |