Microsoft Defender ATP now detects jailbroken Apple devices

Platform has also simplified the onboarding experience for iOS users

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Microsofthas added support for detecting jailbrokeniOS devicesto its Defender for Endpoint product, the enterprise version of itsWindows 10 Defenderprotection offering.

The ability to sniff out jailbroken devices is part of a series of new breach protection features that Microsoft has added to the platform for both iOS andAndroid devices.

In ablog postannouncing the new features, Microsoft’s Senior Program Manager Shravan Thota said that the platform can now detect and flag both managed and unmanaged jailbroken iOS devices.

“The [jailbroken] device will then be considered as a high risk device and this risk score is shared with your app protection or device compliance policies so that you can block it from accessing corporate resources,” writes Thota.

The feature adds to thephishingprotection feature the platform already extends to iOS devices.

Simplified on-boarding

Simplified on-boarding

Explaining the significance of the feature, Thota says Jailbroken iOS devices enable users to sideload apps from external sources besides the officialApp Storethat can potentially be malicious. Furthermore, the jailbroken devices don’t receive critical iOS updates, which exposes them to vulnerabilities.

By flagging these jailbroken iOS devices, Microsoft Defender for Endpoint can help security teams curtail the access of these devices inside corporate networks.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Furthermore, Microsoft also announced that it has simplified the on-boarding experience for users of iOS devices.

Thota explains that the platform earlier relied on end users to provideVPNpermissions to extend the anti-phishing protection capability to the device. In contrast, network admins will now be able to push fully configured VPN profiles to all enrolled devices, saving users the effort to manually define VPN related permissions.

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

This new phishing strategy utilizes GitHub comments to distribute malware

Should your VPN always be on?

LG Electronics sets ambitious B2B revenue goal to offset declining consumer demand