The Aurora Endpoint Security administrator account that you use to connect to Intune must have an Intune license.
In the management console, on the menu bar, click Settings > Connectors.
Click Add Connection > Microsoft Intune.
Specify your Entra tenant ID. Click Next.
Specify your administrator credentials for Entra.
Follow the prompts for administrator consent. If required, coordinate with your organization's Intune administrator to grant consent for the Aurora Protect Mobile MTD connector in the Microsoft Intune admin center.
On the App Configuration Policies screen, turn on the OS platforms that you want the Intune integration to apply to and complete the following steps for each platform. Note that all Intune managed devices that you want to use this feature must be included in an app configuration policy. If you want to create app configuration policies later, click Cancel.
Optionally, change the name of the policy. Do not change the target app.
If you want the policy to apply to all groups from the Intune instance, turn on All groups.
If you want the policy to apply to specific groups from the Intune instance, click . Search for and select groups and click Add.
Click Save. If you added an app configuration policy for Android, follow any administrator consent prompts that display.
The app configuration policies that you create are visible in the Intune admin center.
If you haven't done so yet, configure the risk assessment settings in the Aurora Protect Mobile policy that is assigned to users to map threats detected by the Aurora Protect Mobile app to the desired risk levels.
In the Intune admin center, edit the Aurora Protect Mobile MTD connector and turn on the compliance policy options to connect Android and iOS devices to Aurora Protect.
Aurora Endpoint DefenseAurora Endpoint SecurityInstallation or ConfigurationPublic